Malware Analysis Report

2024-11-30 13:20

Sample ID 241122-cvh42asmgx
Target systemuser32.exe
SHA256 ffba2de6237d1542f5b596e5f44be49ea9183253193d598ff0ca328ad6131d1a
Tags
discovery execution pyinstaller gurcu milleniumrat persistence rat spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

ffba2de6237d1542f5b596e5f44be49ea9183253193d598ff0ca328ad6131d1a

Threat Level: Known bad

The file systemuser32.exe was found to be: Known bad.

Malicious Activity Summary

discovery execution pyinstaller gurcu milleniumrat persistence rat spyware stealer

Gurcu family

MilleniumRat

Suspicious use of NtCreateUserProcessOtherParentProcess

Milleniumrat family

Gurcu, WhiteSnake

Reads user/profile data of web browsers

Executes dropped EXE

Checks computer location settings

Loads dropped DLL

Looks up external IP address via web service

Legitimate hosting services abused for malware hosting/C2

Command and Scripting Interpreter: PowerShell

Adds Run key to start application

Enumerates processes with tasklist

Suspicious use of SetThreadContext

Drops file in System32 directory

Browser Information Discovery

Unsigned PE

Detects Pyinstaller

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Suspicious use of SetWindowsHookEx

Delays execution with timeout.exe

Checks processor information in registry

Modifies registry key

Uses Task Scheduler COM API

Suspicious behavior: EnumeratesProcesses

Suspicious use of WriteProcessMemory

Scheduled Task/Job: Scheduled Task

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-22 02:23

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-22 02:23

Reported

2024-11-22 02:26

Platform

win7-20240903-en

Max time kernel

142s

Max time network

124s

Command Line

C:\Windows\Explorer.EXE

Signatures

Command and Scripting Interpreter: PowerShell

execution
Description Indicator Process Target
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A raw.githubusercontent.com N/A N/A
N/A raw.githubusercontent.com N/A N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A ip-api.com N/A N/A

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 2332 set thread context of 2904 N/A C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe C:\Windows\System32\conhost.exe

Detects Pyinstaller

pyinstaller
Description Indicator Process Target
N/A N/A N/A N/A

Enumerates physical storage devices

Scheduled Task/Job: Scheduled Task

persistence execution
Description Indicator Process Target
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\ChromeUpdate.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\tasklist.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\tasklist.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\tasklist.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\tasklist.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\tasklist.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\tasklist.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\tasklist.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\tasklist.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\tasklist.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\tasklist.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\tasklist.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\tasklist.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\tasklist.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2844 wrote to memory of 1908 N/A C:\Users\Admin\AppData\Local\Temp\systemuser32.exe C:\Users\Admin\AppData\Roaming\MSUpdate.exe
PID 2844 wrote to memory of 1908 N/A C:\Users\Admin\AppData\Local\Temp\systemuser32.exe C:\Users\Admin\AppData\Roaming\MSUpdate.exe
PID 2844 wrote to memory of 1908 N/A C:\Users\Admin\AppData\Local\Temp\systemuser32.exe C:\Users\Admin\AppData\Roaming\MSUpdate.exe
PID 2844 wrote to memory of 2196 N/A C:\Users\Admin\AppData\Local\Temp\systemuser32.exe C:\Users\Admin\AppData\Roaming\ChromeUpdate.exe
PID 2844 wrote to memory of 2196 N/A C:\Users\Admin\AppData\Local\Temp\systemuser32.exe C:\Users\Admin\AppData\Roaming\ChromeUpdate.exe
PID 2844 wrote to memory of 2196 N/A C:\Users\Admin\AppData\Local\Temp\systemuser32.exe C:\Users\Admin\AppData\Roaming\ChromeUpdate.exe
PID 2844 wrote to memory of 2580 N/A C:\Users\Admin\AppData\Local\Temp\systemuser32.exe C:\Users\Admin\AppData\Roaming\systemuser.exe
PID 2844 wrote to memory of 2580 N/A C:\Users\Admin\AppData\Local\Temp\systemuser32.exe C:\Users\Admin\AppData\Roaming\systemuser.exe
PID 2844 wrote to memory of 2580 N/A C:\Users\Admin\AppData\Local\Temp\systemuser32.exe C:\Users\Admin\AppData\Roaming\systemuser.exe
PID 1908 wrote to memory of 2180 N/A C:\Users\Admin\AppData\Roaming\MSUpdate.exe C:\Users\Admin\AppData\Roaming\MSUpdate.exe
PID 1908 wrote to memory of 2180 N/A C:\Users\Admin\AppData\Roaming\MSUpdate.exe C:\Users\Admin\AppData\Roaming\MSUpdate.exe
PID 1908 wrote to memory of 2180 N/A C:\Users\Admin\AppData\Roaming\MSUpdate.exe C:\Users\Admin\AppData\Roaming\MSUpdate.exe
PID 2196 wrote to memory of 2408 N/A C:\Users\Admin\AppData\Roaming\ChromeUpdate.exe C:\Windows\System32\cmd.exe
PID 2196 wrote to memory of 2408 N/A C:\Users\Admin\AppData\Roaming\ChromeUpdate.exe C:\Windows\System32\cmd.exe
PID 2196 wrote to memory of 2408 N/A C:\Users\Admin\AppData\Roaming\ChromeUpdate.exe C:\Windows\System32\cmd.exe
PID 2408 wrote to memory of 2084 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\chcp.com
PID 2408 wrote to memory of 2084 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\chcp.com
PID 2408 wrote to memory of 2084 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\chcp.com
PID 2408 wrote to memory of 1220 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\tasklist.exe
PID 2408 wrote to memory of 1220 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\tasklist.exe
PID 2408 wrote to memory of 1220 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\tasklist.exe
PID 2408 wrote to memory of 1208 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\find.exe
PID 2408 wrote to memory of 1208 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\find.exe
PID 2408 wrote to memory of 1208 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\find.exe
PID 2408 wrote to memory of 1696 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\timeout.exe
PID 2408 wrote to memory of 1696 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\timeout.exe
PID 2408 wrote to memory of 1696 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\timeout.exe
PID 2408 wrote to memory of 2104 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\tasklist.exe
PID 2408 wrote to memory of 2104 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\tasklist.exe
PID 2408 wrote to memory of 2104 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\tasklist.exe
PID 2408 wrote to memory of 1452 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\find.exe
PID 2408 wrote to memory of 1452 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\find.exe
PID 2408 wrote to memory of 1452 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\find.exe
PID 2408 wrote to memory of 912 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\timeout.exe
PID 2408 wrote to memory of 912 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\timeout.exe
PID 2408 wrote to memory of 912 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\timeout.exe
PID 2408 wrote to memory of 968 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\tasklist.exe
PID 2408 wrote to memory of 968 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\tasklist.exe
PID 2408 wrote to memory of 968 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\tasklist.exe
PID 2408 wrote to memory of 700 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\find.exe
PID 2408 wrote to memory of 700 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\find.exe
PID 2408 wrote to memory of 700 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\find.exe
PID 2408 wrote to memory of 324 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\timeout.exe
PID 2408 wrote to memory of 324 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\timeout.exe
PID 2408 wrote to memory of 324 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\timeout.exe
PID 2408 wrote to memory of 2972 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\tasklist.exe
PID 2408 wrote to memory of 2972 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\tasklist.exe
PID 2408 wrote to memory of 2972 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\tasklist.exe
PID 2408 wrote to memory of 1464 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\find.exe
PID 2408 wrote to memory of 1464 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\find.exe
PID 2408 wrote to memory of 1464 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\find.exe
PID 2408 wrote to memory of 3020 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\timeout.exe
PID 2408 wrote to memory of 3020 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\timeout.exe
PID 2408 wrote to memory of 3020 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\timeout.exe
PID 2408 wrote to memory of 2948 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\tasklist.exe
PID 2408 wrote to memory of 2948 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\tasklist.exe
PID 2408 wrote to memory of 2948 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\tasklist.exe
PID 2408 wrote to memory of 2960 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\find.exe
PID 2408 wrote to memory of 2960 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\find.exe
PID 2408 wrote to memory of 2960 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\find.exe
PID 2408 wrote to memory of 564 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\timeout.exe
PID 2408 wrote to memory of 564 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\timeout.exe
PID 2408 wrote to memory of 564 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\timeout.exe
PID 2408 wrote to memory of 2984 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\tasklist.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Windows\Explorer.EXE

C:\Windows\Explorer.EXE

C:\Users\Admin\AppData\Local\Temp\systemuser32.exe

"C:\Users\Admin\AppData\Local\Temp\systemuser32.exe"

C:\Users\Admin\AppData\Roaming\MSUpdate.exe

"C:\Users\Admin\AppData\Roaming\MSUpdate.exe"

C:\Users\Admin\AppData\Roaming\ChromeUpdate.exe

"C:\Users\Admin\AppData\Roaming\ChromeUpdate.exe"

C:\Users\Admin\AppData\Roaming\systemuser.exe

"C:\Users\Admin\AppData\Roaming\systemuser.exe"

C:\Users\Admin\AppData\Roaming\MSUpdate.exe

"C:\Users\Admin\AppData\Roaming\MSUpdate.exe"

C:\Windows\System32\cmd.exe

"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmpAA82.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmpAA82.tmp.bat

C:\Windows\system32\chcp.com

chcp 65001

C:\Windows\system32\tasklist.exe

Tasklist /fi "PID eq 2196"

C:\Windows\system32\find.exe

find ":"

C:\Windows\system32\timeout.exe

Timeout /T 1 /Nobreak

C:\Windows\system32\tasklist.exe

Tasklist /fi "PID eq 2196"

C:\Windows\system32\find.exe

find ":"

C:\Windows\system32\timeout.exe

Timeout /T 1 /Nobreak

C:\Windows\system32\tasklist.exe

Tasklist /fi "PID eq 2196"

C:\Windows\system32\find.exe

find ":"

C:\Windows\system32\timeout.exe

Timeout /T 1 /Nobreak

C:\Windows\system32\tasklist.exe

Tasklist /fi "PID eq 2196"

C:\Windows\system32\find.exe

find ":"

C:\Windows\system32\timeout.exe

Timeout /T 1 /Nobreak

C:\Windows\system32\tasklist.exe

Tasklist /fi "PID eq 2196"

C:\Windows\system32\find.exe

find ":"

C:\Windows\system32\timeout.exe

Timeout /T 1 /Nobreak

C:\Windows\system32\tasklist.exe

Tasklist /fi "PID eq 2196"

C:\Windows\system32\find.exe

find ":"

C:\Windows\system32\timeout.exe

Timeout /T 1 /Nobreak

C:\Windows\system32\tasklist.exe

Tasklist /fi "PID eq 2196"

C:\Windows\system32\find.exe

find ":"

C:\Windows\system32\timeout.exe

Timeout /T 1 /Nobreak

C:\Windows\system32\tasklist.exe

Tasklist /fi "PID eq 2196"

C:\Windows\system32\find.exe

find ":"

C:\Windows\system32\timeout.exe

Timeout /T 1 /Nobreak

C:\Windows\system32\tasklist.exe

Tasklist /fi "PID eq 2196"

C:\Windows\system32\find.exe

find ":"

C:\Windows\system32\timeout.exe

Timeout /T 1 /Nobreak

C:\Windows\system32\tasklist.exe

Tasklist /fi "PID eq 2196"

C:\Windows\system32\find.exe

find ":"

C:\Windows\system32\timeout.exe

Timeout /T 1 /Nobreak

C:\Windows\system32\tasklist.exe

Tasklist /fi "PID eq 2196"

C:\Windows\system32\find.exe

find ":"

C:\Windows\system32\timeout.exe

Timeout /T 1 /Nobreak

C:\Windows\system32\tasklist.exe

Tasklist /fi "PID eq 2196"

C:\Windows\system32\find.exe

find ":"

C:\Windows\system32\timeout.exe

Timeout /T 1 /Nobreak

C:\Windows\system32\tasklist.exe

Tasklist /fi "PID eq 2196"

C:\Windows\system32\find.exe

find ":"

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#ikwps#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -RunLevel 'Highest' -Force; }

C:\Windows\system32\schtasks.exe

"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /tn GoogleUpdateTaskMachineQC /tr 'C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe'

C:\Windows\System32\schtasks.exe

C:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"

C:\Windows\system32\taskeng.exe

taskeng.exe {4AC8D07D-52F7-498B-A3D6-9D194BA999A4} S-1-5-21-3533259084-2542256011-65585152-1000:XPAJOTIY\Admin:Interactive:[1]

C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe

C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#ikwps#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -RunLevel 'Highest' -Force; }

C:\Windows\system32\schtasks.exe

"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /tn GoogleUpdateTaskMachineQC /tr 'C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe'

C:\Windows\System32\conhost.exe

C:\Windows\System32\conhost.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 ip-api.com udp
US 208.95.112.1:80 ip-api.com tcp
US 8.8.8.8:53 raw.githubusercontent.com udp
US 185.199.109.133:443 raw.githubusercontent.com tcp

Files

memory/2844-0-0x000007FEF5CC3000-0x000007FEF5CC4000-memory.dmp

memory/2844-1-0x0000000000BB0000-0x0000000002054000-memory.dmp

\Users\Admin\AppData\Roaming\MSUpdate.exe

MD5 79d19e7b20c0a9f3ac172041dcf84c97
SHA1 2e8a9c7d1aac017c1fabae50677e5bedea55c16d
SHA256 6080208516fa0312f72202ff528cf3ae055fcec32049191c8b4043bdb52bf072
SHA512 1d3fa42566c332501300da43e462a68341f9fc5aa5328d1b57cbb947e9b3e3eaa86d3368f52e82e3294fff63dc53587fda070967fa9a533dc4f9497a71e72e35

C:\Users\Admin\AppData\Roaming\ChromeUpdate.exe

MD5 13165ad820f4c960ca30489c75eaec42
SHA1 224d3c7b789cab09bf2204301019679e74741843
SHA256 f7e01a09ea6ec0deb57329451fba093f42fda8852189fde628da155a841761e7
SHA512 d6b350c4a000a3b29ebf2e649696e71f4e5d7a796636643354534a2911b5e73a8721ad8bf1d37cb990fb1d5c760c23b2db6550cd48e2d7c756c08753b8c15be7

\Users\Admin\AppData\Roaming\systemuser.exe

MD5 d62541056c52c0e1c88554fc7c58bd14
SHA1 4528261354cba0ef81a61ca2d7bc550fc5553f45
SHA256 6b02de0fe2eb386db9a8fcb66b29a1ffd6116a525d4b27afb45e274c0e0d8a90
SHA512 75c34e0a08bb06c2a8ca4418d8510e122c980a5da57cb8ffb24611020ef383d8abb05645f4564d137320afe78cecded3444d67896a4592943199c0244339ffc3

memory/2196-183-0x0000000000E80000-0x0000000001422000-memory.dmp

memory/2196-252-0x000007FEF5CC0000-0x000007FEF66AC000-memory.dmp

\Users\Admin\AppData\Local\Temp\Costura\A54E036D2DCD19384E8EA53862E0DD8F\64\sqlite.interop.dll

MD5 65ccd6ecb99899083d43f7c24eb8f869
SHA1 27037a9470cc5ed177c0b6688495f3a51996a023
SHA256 aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4
SHA512 533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d

memory/2196-374-0x000007FEF5CC0000-0x000007FEF66AC000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI19082\python312.dll

MD5 b243d61f4248909bc721674d70a633de
SHA1 1d2fb44b29c4ac3cfd5a7437038a0c541fce82fc
SHA256 93488fa7e631cc0a2bd808b9eee8617280ee9b6ff499ab424a1a1cbf24d77dc7
SHA512 10460c443c7b9a6d7e39ad6e2421b8ca4d8329f1c4a0ff5b71ce73352d2e9438d45f7d59edb13ce30fad3b4f260bd843f4d9b48522d448310d43e0988e075fcb

C:\Users\Admin\AppData\Local\Temp\tmpAA82.tmp.bat

MD5 b77807bd44bf844325cf3ad282ff6394
SHA1 ff71cfa52687236b340f51b99ba0b14d23444d5d
SHA256 bd8cd7ed03dfdfc712cc4e0dcf089d7db41896327e109a746e17e49ae419728d
SHA512 757eceac51fa5d39537bd9af3fcb40c95d129cdcc9384bee5a618bfcc16550fe29a307dc366d58eee5a885340b384d6c27532f2ad200945cf8dd08f698d57815

memory/2196-976-0x000007FEF5CC0000-0x000007FEF66AC000-memory.dmp

memory/2580-977-0x000000013F8E0000-0x000000013FD5D000-memory.dmp

memory/1792-1927-0x000000001B3A0000-0x000000001B682000-memory.dmp

memory/1792-1928-0x0000000002310000-0x0000000002318000-memory.dmp

memory/2580-1931-0x000000013F8E0000-0x000000013FD5D000-memory.dmp

memory/2332-1935-0x000000013F8D0000-0x000000013FD4D000-memory.dmp

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

MD5 bc3c55cb3e22c99d447126b6a26ff676
SHA1 e5ccd8249ea75df8a159fb9bc269f23610a26ea0
SHA256 8bb354f659b47a3bf7f9dba668653a0ceb27505fd78858e2e42ed3a4e0c57b7f
SHA512 08c444ee392045e958c67021265527967a2afe5e82d2c849b7ea61887f2b7b6253618f057b5b338f6cfed7d5391f14cc9e0ebd733e654981bf1874c988ba829d

memory/2308-1945-0x0000000001D50000-0x0000000001D58000-memory.dmp

memory/2308-1944-0x000000001B570000-0x000000001B852000-memory.dmp

memory/2332-1948-0x000000013F8D0000-0x000000013FD4D000-memory.dmp

memory/2904-1949-0x0000000140000000-0x0000000140029000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-11-22 02:23

Reported

2024-11-22 02:26

Platform

win10v2004-20241007-en

Max time kernel

143s

Max time network

150s

Command Line

C:\Windows\Explorer.EXE

Signatures

Gurcu family

gurcu

Gurcu, WhiteSnake

stealer gurcu

MilleniumRat

rat stealer milleniumrat

Milleniumrat family

milleniumrat

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\systemuser32.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Roaming\ChromeUpdate.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe N/A

Reads user/profile data of web browsers

spyware stealer

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ChromeUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\GoogleChromeUpdateLog\\Update.exe" C:\Windows\system32\reg.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CLPPTH = "C:\\Users\\Admin\\AppData\\Roaming\\CLPPTH\\clppth.exe" C:\Users\Admin\AppData\Roaming\MSUpdate.exe N/A

Command and Scripting Interpreter: PowerShell

execution
Description Indicator Process Target
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A raw.githubusercontent.com N/A N/A
N/A raw.githubusercontent.com N/A N/A
N/A raw.githubusercontent.com N/A N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A ip-api.com N/A N/A
N/A api.ipify.org N/A N/A
N/A api.ipify.org N/A N/A

Enumerates processes with tasklist

discovery
Description Indicator Process Target
N/A N/A C:\Windows\system32\tasklist.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 4048 set thread context of 4824 N/A C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe C:\Windows\System32\conhost.exe

Browser Information Discovery

discovery

Detects Pyinstaller

pyinstaller
Description Indicator Process Target
N/A N/A N/A N/A

Enumerates physical storage devices

Checks processor information in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe N/A

Delays execution with timeout.exe

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\timeout.exe N/A

Modifies registry key

Description Indicator Process Target
N/A N/A C:\Windows\system32\reg.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\ChromeUpdate.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\ChromeUpdate.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\ChromeUpdate.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\ChromeUpdate.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\ChromeUpdate.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\ChromeUpdate.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\ChromeUpdate.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\ChromeUpdate.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\ChromeUpdate.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\ChromeUpdate.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\ChromeUpdate.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\ChromeUpdate.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\ChromeUpdate.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\ChromeUpdate.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\ChromeUpdate.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\ChromeUpdate.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\ChromeUpdate.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\ChromeUpdate.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\ChromeUpdate.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\ChromeUpdate.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\ChromeUpdate.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\ChromeUpdate.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\ChromeUpdate.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\systemuser.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\systemuser.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\systemuser.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\systemuser.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\ChromeUpdate.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\tasklist.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: 33 N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: 34 N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: 35 N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: 36 N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: 33 N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: 34 N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: 35 N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: 36 N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: 33 N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2040 wrote to memory of 2388 N/A C:\Users\Admin\AppData\Local\Temp\systemuser32.exe C:\Users\Admin\AppData\Roaming\MSUpdate.exe
PID 2040 wrote to memory of 2388 N/A C:\Users\Admin\AppData\Local\Temp\systemuser32.exe C:\Users\Admin\AppData\Roaming\MSUpdate.exe
PID 2040 wrote to memory of 956 N/A C:\Users\Admin\AppData\Local\Temp\systemuser32.exe C:\Users\Admin\AppData\Roaming\ChromeUpdate.exe
PID 2040 wrote to memory of 956 N/A C:\Users\Admin\AppData\Local\Temp\systemuser32.exe C:\Users\Admin\AppData\Roaming\ChromeUpdate.exe
PID 2040 wrote to memory of 4500 N/A C:\Users\Admin\AppData\Local\Temp\systemuser32.exe C:\Users\Admin\AppData\Roaming\systemuser.exe
PID 2040 wrote to memory of 4500 N/A C:\Users\Admin\AppData\Local\Temp\systemuser32.exe C:\Users\Admin\AppData\Roaming\systemuser.exe
PID 2388 wrote to memory of 2464 N/A C:\Users\Admin\AppData\Roaming\MSUpdate.exe C:\Users\Admin\AppData\Roaming\MSUpdate.exe
PID 2388 wrote to memory of 2464 N/A C:\Users\Admin\AppData\Roaming\MSUpdate.exe C:\Users\Admin\AppData\Roaming\MSUpdate.exe
PID 956 wrote to memory of 4688 N/A C:\Users\Admin\AppData\Roaming\ChromeUpdate.exe C:\Windows\System32\cmd.exe
PID 956 wrote to memory of 4688 N/A C:\Users\Admin\AppData\Roaming\ChromeUpdate.exe C:\Windows\System32\cmd.exe
PID 4688 wrote to memory of 3044 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\chcp.com
PID 4688 wrote to memory of 3044 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\chcp.com
PID 4688 wrote to memory of 2496 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\tasklist.exe
PID 4688 wrote to memory of 2496 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\tasklist.exe
PID 4688 wrote to memory of 2920 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\find.exe
PID 4688 wrote to memory of 2920 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\find.exe
PID 4688 wrote to memory of 4420 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\timeout.exe
PID 4688 wrote to memory of 4420 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\timeout.exe
PID 4688 wrote to memory of 652 N/A C:\Windows\System32\cmd.exe C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe
PID 4688 wrote to memory of 652 N/A C:\Windows\System32\cmd.exe C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe
PID 652 wrote to memory of 4204 N/A C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe C:\Windows\System32\cmd.exe
PID 652 wrote to memory of 4204 N/A C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe C:\Windows\System32\cmd.exe
PID 4204 wrote to memory of 4332 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\reg.exe
PID 4204 wrote to memory of 4332 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\reg.exe
PID 4048 wrote to memory of 4824 N/A C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe C:\Windows\System32\conhost.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Windows\Explorer.EXE

C:\Windows\Explorer.EXE

C:\Users\Admin\AppData\Local\Temp\systemuser32.exe

"C:\Users\Admin\AppData\Local\Temp\systemuser32.exe"

C:\Users\Admin\AppData\Roaming\MSUpdate.exe

"C:\Users\Admin\AppData\Roaming\MSUpdate.exe"

C:\Users\Admin\AppData\Roaming\ChromeUpdate.exe

"C:\Users\Admin\AppData\Roaming\ChromeUpdate.exe"

C:\Users\Admin\AppData\Roaming\systemuser.exe

"C:\Users\Admin\AppData\Roaming\systemuser.exe"

C:\Users\Admin\AppData\Roaming\MSUpdate.exe

"C:\Users\Admin\AppData\Roaming\MSUpdate.exe"

C:\Windows\System32\cmd.exe

"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmpAE03.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmpAE03.tmp.bat

C:\Windows\system32\chcp.com

chcp 65001

C:\Windows\system32\tasklist.exe

Tasklist /fi "PID eq 956"

C:\Windows\system32\find.exe

find ":"

C:\Windows\system32\timeout.exe

Timeout /T 1 /Nobreak

C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe

"C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe"

C:\Windows\System32\cmd.exe

"C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f

C:\Windows\system32\reg.exe

reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#ikwps#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -RunLevel 'Highest' -Force; }

C:\Windows\System32\schtasks.exe

C:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"

C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe

C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#ikwps#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -RunLevel 'Highest' -Force; }

C:\Windows\System32\conhost.exe

C:\Windows\System32\conhost.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 241.150.49.20.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 ip-api.com udp
US 208.95.112.1:80 ip-api.com tcp
US 8.8.8.8:53 68.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 1.112.95.208.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 api.ipify.org udp
US 172.67.74.152:443 api.ipify.org tcp
US 8.8.8.8:53 152.74.67.172.in-addr.arpa udp
US 8.8.8.8:53 raw.githubusercontent.com udp
US 185.199.109.133:443 raw.githubusercontent.com tcp
US 8.8.8.8:53 133.109.199.185.in-addr.arpa udp
US 208.95.112.1:80 ip-api.com tcp
US 185.199.109.133:443 raw.githubusercontent.com tcp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 google.com udp
US 8.8.8.8:53 api.telegram.org udp
NL 149.154.167.220:443 api.telegram.org tcp
NL 149.154.167.220:443 api.telegram.org tcp
US 8.8.8.8:53 220.167.154.149.in-addr.arpa udp
NL 149.154.167.220:443 api.telegram.org tcp
US 8.8.8.8:53 197.87.175.4.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 122.164.16.2.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp

Files

memory/2040-0-0x00007FFB69683000-0x00007FFB69685000-memory.dmp

memory/2040-1-0x0000000000040000-0x00000000014E4000-memory.dmp

C:\Users\Admin\AppData\Roaming\MSUpdate.exe

MD5 79d19e7b20c0a9f3ac172041dcf84c97
SHA1 2e8a9c7d1aac017c1fabae50677e5bedea55c16d
SHA256 6080208516fa0312f72202ff528cf3ae055fcec32049191c8b4043bdb52bf072
SHA512 1d3fa42566c332501300da43e462a68341f9fc5aa5328d1b57cbb947e9b3e3eaa86d3368f52e82e3294fff63dc53587fda070967fa9a533dc4f9497a71e72e35

C:\Users\Admin\AppData\Roaming\ChromeUpdate.exe

MD5 13165ad820f4c960ca30489c75eaec42
SHA1 224d3c7b789cab09bf2204301019679e74741843
SHA256 f7e01a09ea6ec0deb57329451fba093f42fda8852189fde628da155a841761e7
SHA512 d6b350c4a000a3b29ebf2e649696e71f4e5d7a796636643354534a2911b5e73a8721ad8bf1d37cb990fb1d5c760c23b2db6550cd48e2d7c756c08753b8c15be7

C:\Users\Admin\AppData\Roaming\systemuser.exe

MD5 d62541056c52c0e1c88554fc7c58bd14
SHA1 4528261354cba0ef81a61ca2d7bc550fc5553f45
SHA256 6b02de0fe2eb386db9a8fcb66b29a1ffd6116a525d4b27afb45e274c0e0d8a90
SHA512 75c34e0a08bb06c2a8ca4418d8510e122c980a5da57cb8ffb24611020ef383d8abb05645f4564d137320afe78cecded3444d67896a4592943199c0244339ffc3

memory/956-258-0x00007FFB69680000-0x00007FFB6A141000-memory.dmp

memory/956-257-0x0000022CE4F20000-0x0000022CE54C2000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\Costura\A54E036D2DCD19384E8EA53862E0DD8F\64\sqlite.interop.dll

MD5 65ccd6ecb99899083d43f7c24eb8f869
SHA1 27037a9470cc5ed177c0b6688495f3a51996a023
SHA256 aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4
SHA512 533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d

memory/956-335-0x0000022CFF9C0000-0x0000022CFFA36000-memory.dmp

memory/956-975-0x00007FFB69680000-0x00007FFB6A141000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI23882\python312.dll

MD5 b243d61f4248909bc721674d70a633de
SHA1 1d2fb44b29c4ac3cfd5a7437038a0c541fce82fc
SHA256 93488fa7e631cc0a2bd808b9eee8617280ee9b6ff499ab424a1a1cbf24d77dc7
SHA512 10460c443c7b9a6d7e39ad6e2421b8ca4d8329f1c4a0ff5b71ce73352d2e9438d45f7d59edb13ce30fad3b4f260bd843f4d9b48522d448310d43e0988e075fcb

memory/956-977-0x0000022CE70F0000-0x0000022CE710E000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI23882\VCRUNTIME140.dll

MD5 862f820c3251e4ca6fc0ac00e4092239
SHA1 ef96d84b253041b090c243594f90938e9a487a9a
SHA256 36585912e5eaf83ba9fea0631534f690ccdc2d7ba91537166fe53e56c221e153
SHA512 2f8a0f11bccc3a8cb99637deeda0158240df0885a230f38bb7f21257c659f05646c6b61e993f87e0877f6ba06b347ddd1fc45d5c44bc4e309ef75ed882b82e4e

C:\Users\Admin\AppData\Local\Temp\_MEI23882\libffi-8.dll

MD5 0f8e4992ca92baaf54cc0b43aaccce21
SHA1 c7300975df267b1d6adcbac0ac93fd7b1ab49bd2
SHA256 eff52743773eb550fcc6ce3efc37c85724502233b6b002a35496d828bd7b280a
SHA512 6e1b223462dc124279bfca74fd2c66fe18b368ffbca540c84e82e0f5bcbea0e10cc243975574fa95ace437b9d8b03a446ed5ee0c9b1b094147cefaf704dfe978

C:\Users\Admin\AppData\Local\Temp\_MEI23882\_tkinter.pyd

MD5 ed2305190284e384a31337094c9f5239
SHA1 eb8faebf9fe9438541ca65b9892badc2233a405d
SHA256 2cad195ba200cd94702403559323c7abf3772a20203a11beae03770a04437de2
SHA512 139c83ebf748720e64c7a6a8f00f45755d17cd8f754cadc0804ece5753c02e5c95210a8b96a92fff89148ba34568f8b1bd6c33d1d3ba7a75f881446956876893

C:\Users\Admin\AppData\Local\Temp\_MEI23882\pyarmor_runtime_000000\pyarmor_runtime.pyd

MD5 bf7ec0b82a738169c915eedbff1a3d62
SHA1 3fc649aa591215724379edb1b24043d9547be3c6
SHA256 f9f67929fdf5568227c1b3e16649956378638165f5e99d345f0df2faa904b926
SHA512 6284ffcb332c04e3712a999a5a435c6e39aaf4214016f9a269f2afe3dfd1b1e18ce6ba87e7609936fb0cc6484137b2ac0677f48774d8e6d67c976efc6a666b05

C:\Users\Admin\AppData\Local\Temp\_MEI23882\select.pyd

MD5 7e871444ca23860a25b888ee263e2eaf
SHA1 aa43c9d3abdb1aabda8379f301f8116d0674b590
SHA256 dca5e6d39c5094ce599143cb82f6d8470f0c2a4ce4443499e73f32ed13333fd0
SHA512 2e260d3123f7ca612901513b90fe40739e85248da913297d4cca3b2ebd398d9697880d148830e168e474ebfc3d30ede10668c7316ed7668f8b39da7bca59e57d

C:\Users\Admin\AppData\Local\Temp\_MEI23882\libssl-3.dll

MD5 4ff168aaa6a1d68e7957175c8513f3a2
SHA1 782f886709febc8c7cebcec4d92c66c4d5dbcf57
SHA256 2e4d35b681a172d3298caf7dc670451be7a8ba27c26446efc67470742497a950
SHA512 c372b759b8c7817f2cbb78eccc5a42fa80bdd8d549965bd925a97c3eebdce0335fbfec3995430064dead0f4db68ebb0134eb686a0be195630c49f84b468113e3

C:\Users\Admin\AppData\Local\Temp\_MEI23882\_ssl.pyd

MD5 eea3e12970e28545a964a95da7e84e0b
SHA1 c3ccac86975f2704dabc1ffc3918e81feb3b9ac1
SHA256 61f00b0543464bba61e0bd1128118326c9bd0cdc592854dd1a31c3d6d8df2b83
SHA512 9bd5c83e7e0ab24d6be40a31ac469a0d9b4621a2a279a5f3ab2fc6401a08c54aec421bc9461aed533a0211d7dbda0c264c5f05aeb39138403da25c8cda0339e6

C:\Users\Admin\AppData\Local\Temp\_MEI23882\libcrypto-3.dll

MD5 123ad0908c76ccba4789c084f7a6b8d0
SHA1 86de58289c8200ed8c1fc51d5f00e38e32c1aad5
SHA256 4e5d5d20d6d31e72ab341c81e97b89e514326c4c861b48638243bdf0918cfa43
SHA512 80fae0533ba9a2f5fa7806e86f0db8b6aab32620dde33b70a3596938b529f3822856de75bddb1b06721f8556ec139d784bc0bb9c8da0d391df2c20a80d33cb04

C:\Users\Admin\AppData\Local\Temp\_MEI23882\tk86t.dll

MD5 6ddb534ef5c74627802ceef0c90b38f3
SHA1 ffa3b78435e7a121ba6a3de32a7c3950a3f1cb28
SHA256 f44fa94865d17e4f0266c8f9a1dd89825d8a0c6c3a63cf4192fc08c8796acabf
SHA512 0cf66eeaa3aef2c7da560c370865bbd84ac2e94536bf751907bf42f36c05b5d0c46f883b1f35daf9e21e8eec1a7fcad439e21a23e114ab0a3a0daf39e8c95eb0

C:\Users\Admin\AppData\Local\Temp\_MEI23882\_lzma.pyd

MD5 e3e7e99b3c2ea56065740b69f1a0bc12
SHA1 79fa083d6e75a18e8b1e81f612acb92d35bb2aea
SHA256 b095fa2eac97496b515031fbea5737988b18deee86a11f2784f5a551732ddc0c
SHA512 35cbc30b1ccdc4f5cc9560fc0149373ccd9399eb9297e61d52e6662bb8c56c6a7569d8cfad85aeb057c10558c9352ae086c0467f684fdcf72a137eadf563a909

C:\Users\Admin\AppData\Local\Temp\_MEI23882\_tk_data\menu.tcl

MD5 b7daa21c1c192b8cb5b86cbd7b2ce068
SHA1 ae8abf9017f37ccdf5d0d15de66bb124a7482ba0
SHA256 312af944a276cdbf1ee00757ef141595670984f7f13e19922c25643a040f5339
SHA512 b619e3b8be5ec4545e97b7a7a7f7fecc2aafa58438f9ca3819f644720cf5ff5c44da12ac25988570e595d97cad799f87d93c24d5e67a7a953b9f5312952fbeb6

C:\Users\Admin\AppData\Local\Temp\_MEI23882\_tk_data\spinbox.tcl

MD5 eaa36f0aa69ae19ddbdd0448fbad9d4d
SHA1 eb0adb4f4d937bac2f17480adaf6f948262e754d
SHA256 747889c3086c917a34554a9dc495bc0c08a03fd3a5828353ed2a64b97f376835
SHA512 c8368f19ec6842ed67073b9fc9c9274107e643324cb23b28c54df63fb720f63b043281b30dbea053d08481b0442a87465f715a8aa0711b01ce83ff7b9f8a4f4c

C:\Users\Admin\AppData\Local\Temp\_MEI23882\_tk_data\scrlbar.tcl

MD5 5249cd1e97e48e3d6dec15e70b9d7792
SHA1 612e021ba25b5e512a0dfd48b6e77fc72894a6b9
SHA256 eec90404f702d3cfbfaec0f13bf5ed1ebeb736bee12d7e69770181a25401c61f
SHA512 e4e0ab15eb9b3118c30cd2ff8e5af87c549eaa9b640ffd809a928d96b4addefb9d25efdd1090fbd0019129cdf355bb2f277bc7194001ba1d2ed4a581110ceafc

C:\Users\Admin\AppData\Local\Temp\_MEI23882\_tk_data\scale.tcl

MD5 d45202d3d2d052d4c6bfe8d1322aab39
SHA1 8cdf184ac2e9299b2b2a107a64e9d1803aa298de
SHA256 0747a387fdd1b2c7135eceae7b392ed52e1d1ebf3ffa90febe886dbc0981eb74
SHA512 27b005f955bae00d15c4492e7bd3ebdc5ee3bf9c164c418198b4bd185709c8810aa6cf76cbcc07eeb4c1d20f8c76ef8df8b219563c18b88c94954c910bff575d

C:\Users\Admin\AppData\Local\Temp\_MEI23882\_tk_data\panedwindow.tcl

MD5 286c01a1b12261bc47f5659fd1627abd
SHA1 4ca36795cab6dfe0bbba30bb88a2ab71a0896642
SHA256 aa4f87e41ac8297f51150f2a9f787607690d01793456b93f0939c54d394731f9
SHA512 d54d5a89b7408a9724a1ca1387f6473bdad33885194b2ec5a524c7853a297fd65ce2a57f571c51db718f6a00dce845de8cf5f51698f926e54ed72cdc81bcfe54

C:\Users\Admin\AppData\Local\Temp\_MEI23882\_tk_data\listbox.tcl

MD5 804e6dce549b2e541986c0ce9e75e2d1
SHA1 c44ee09421f127cf7f4070a9508f22709d06d043
SHA256 47c75f9f8348bf8f2c086c57b97b73741218100ca38d10b8abdf2051c95b9801
SHA512 029426c4f659848772e6bb1d8182eb03d2b43adf68fcfcc1ea1c2cc7c883685deda3fffda7e071912b9bda616ad7af2e1cb48ce359700c1a22e1e53e81cae34b

C:\Users\Admin\AppData\Local\Temp\_MEI23882\_tk_data\entry.tcl

MD5 007f42fbcdc57652ac8381f11af7fb67
SHA1 1bb1b0fcad6f5633d1beb8903112f180b1c4ba7f
SHA256 65ba33a1e0b21e8e074780a51189cee6fd9926c85273e9e7633987fc212a17b2
SHA512 a27089719adafc48b5abb905e40d0c6a0a2507526223d72c1cff36ab7c15362c6f0b8ee5775181ba1730852802afa64631ee3720e624b630e3274bfb32f6a59a

C:\Users\Admin\AppData\Local\Temp\_MEI23882\_tk_data\button.tcl

MD5 aeb53f7f1506cdfdfe557f54a76060ce
SHA1 ebb3666ee444b91a0d335da19c8333f73b71933b
SHA256 1f5dd8d81b26f16e772e92fd2a22accb785004d0ed3447e54f87005d9c6a07a5
SHA512 acdad4df988df6b2290fc9622e8eaccc31787fecdc98dcca38519cb762339d4d3fb344ae504b8c7918d6f414f4ad05d15e828df7f7f68f363bec54b11c9b7c43

C:\Users\Admin\AppData\Local\Temp\_MEI23882\_tk_data\icons.tcl

MD5 995a0a8f7d0861c268aead5fc95a42ea
SHA1 21e121cf85e1c4984454237a646e58ec3c725a72
SHA256 1264940e62b9a37967925418e9d0dc0befd369e8c181b9bab3d1607e3cc14b85
SHA512 db7f5e0bc7d5c5f750e396e645f50a3e0cde61c9e687add0a40d0c1aa304ddfbceeb9f33ad201560c6e2b051f2eded07b41c43d00f14ee435cdeee73b56b93c7

C:\Users\Admin\AppData\Local\Temp\_MEI23882\_tcl_data\opt0.4\pkgIndex.tcl

MD5 07532085501876dcc6882567e014944c
SHA1 6bc7a122429373eb8f039b413ad81c408a96cb80
SHA256 6a4abd2c519a745325c26fb23be7bbf95252d653a24806eb37fd4aa6a6479afe
SHA512 0d604e862f3a1a19833ead99aaf15a9f142178029ab64c71d193cee4901a0196c1eeddc2bce715b7fa958ac45c194e63c77a71e4be4f9aedfd5b44cf2a726e76

C:\Users\Admin\AppData\Local\Temp\_MEI23882\_tcl_data\http1.0\pkgIndex.tcl

MD5 a387908e2fe9d84704c2e47a7f6e9bc5
SHA1 f3c08b3540033a54a59cb3b207e351303c9e29c6
SHA256 77265723959c092897c2449c5b7768ca72d0efcd8c505bddbb7a84f6aa401339
SHA512 7ac804d23e72e40e7b5532332b4a8d8446c6447bb79b4fe32402b13836079d348998ea0659802ab0065896d4f3c06f5866c6b0d90bf448f53e803d8c243bbc63

C:\Users\Admin\AppData\Local\Temp\_MEI23882\_tk_data\pkgIndex.tcl

MD5 8a0517a7a4c70111080ed934329e2bc5
SHA1 5b465e0d3500a8f04ee1c705662032f44e2ed0d2
SHA256 a5d208887a94832328c3a33928a80f3b46aa205c20db4f050a47d940e94071b4
SHA512 d9f502a006a5e0514fd61426818ad1f4168e449588f9d383d6b0bf87a18be82c420863a9a28e1beb441284a0b1bc2a0b3d3276a0fe3196341aec15a27920de5d

C:\Users\Admin\AppData\Local\Temp\_MEI23882\_tcl_data\package.tcl

MD5 ddb0ab9842b64114138a8c83c4322027
SHA1 eccacdc2ccd86a452b21f3cf0933fd41125de790
SHA256 f46ab61cdebe3aa45fa7e61a48930d64a0d0e7e94d04d6bf244f48c36cafe948
SHA512 c0cf718258b4d59675c088551060b34ce2bc8638958722583ac2313dc354223bfef793b02f1316e522a14c7ba9bed219531d505de94dc3c417fc99d216a01463

C:\Users\Admin\AppData\Local\Temp\_MEI23882\tcl8\8.5\msgcat-1.6.1.tm

MD5 bd4ff2a1f742d9e6e699eeee5e678ad1
SHA1 811ad83aff80131ba73abc546c6bd78453bf3eb9
SHA256 6774519f179872ec5292523f2788b77b2b839e15665037e097a0d4edddd1c6fb
SHA512 b77e4a68017ba57c06876b21b8110c636f9ba1dd0ba9d7a0c50096f3f6391508cf3562dd94aceaf673113dbd336109da958044aefac0afb0f833a652e4438f43

C:\Users\Admin\AppData\Local\Temp\_MEI23882\_tcl_data\tm.tcl

MD5 215262a286e7f0a14f22db1aa7875f05
SHA1 66b942ba6d3120ef8d5840fcdeb06242a47491ff
SHA256 4b7ed9fd2363d6876092db3f720cbddf97e72b86b519403539ba96e1c815ed8f
SHA512 6ecd745d7da9d826240c0ab59023c703c94b158ae48c1410faa961a8edb512976a4f15ae8def099b58719adf0d2a9c37e6f29f54d39c1ab7ee81fa333a60f39b

C:\Users\Admin\AppData\Local\Temp\_MEI23882\_tk_data\tk.tcl

MD5 184d05201893b2042d3fa6140fcf277c
SHA1 aad67797864456749adf0c4a1c0be52f563c8fb8
SHA256 1d5e7518afc1382e36bf13fc5196c8a7cd93a4e9d24acf445522564245a489b0
SHA512 291bdf793cabc5ec27e8265a8a313fe0f4acab4db6ce507a46488a83eef72cd43cf5815762b22d1c8d64a9eedea927e109f937e6573058e5493b1354dd449cb3

C:\Users\Admin\AppData\Local\Temp\_MEI23882\_tcl_data\auto.tcl

MD5 08edf746b4a088cb4185c165177bd604
SHA1 395cda114f23e513eef4618da39bb86d034124bf
SHA256 517204ee436d08efc287abc97433c3bffcaf42ec6592a3009b9fd3b985ad772c
SHA512 c1727e265a6b0b54773c886a1bce73512e799ba81a4fceeeb84cdc33f5505a5e0984e96326a78c46bf142bc4652a80e213886f60eb54adf92e4dffe953c87f6b

C:\Users\Admin\AppData\Local\Temp\_MEI23882\_tcl_data\tclIndex

MD5 c62fb22f4c9a3eff286c18421397aaf4
SHA1 4a49b8768cff68f2effaf21264343b7c632a51b2
SHA256 ddf7e42def37888ad0a564aa4f8ca95f4eec942cebebfca851d35515104d5c89
SHA512 558d401cb6af8ce3641af55caebc9c5005ab843ee84f60c6d55afbbc7f7129da9c58c2f55c887c3159107546fa6bc13ffc4cca63ea8841d7160b8aa99161a185

C:\Users\Admin\AppData\Local\Temp\_MEI23882\_tcl_data\init.tcl

MD5 fe92c81bb4acdda00761c695344d5f1e
SHA1 a87e1516fbd1f9751ec590273925cbc5284b16bd
SHA256 7a103a85413988456c2ad615c879bbcb4d91435bcfbbe23393e0eb52b56af6e2
SHA512 c983076e420614d12ab2a7342f6f74dd5dcdad21c7c547f660e73b74b3be487a560abd73213df3f58be3d9dbd061a12d2956ca85a58d7b9d9e40d9fa6e6c25eb

C:\Users\Admin\AppData\Local\Temp\_MEI23882\_bz2.pyd

MD5 fe499b0a9f7f361fa705e7c81e1011fa
SHA1 cc1c98754c6dab53f5831b05b4df6635ad3f856d
SHA256 160b5218c2035cccbaab9dc4ca26d099f433dcb86dbbd96425c933dc796090df
SHA512 60520c5eb5ccc72ae2a4c0f06c8447d9e9922c5f9f1f195757362fc47651adcc1cdbfef193ae4fec7d7c1a47cf1d9756bd820be996ae145f0fbbbfba327c5742

C:\Users\Admin\AppData\Local\Temp\_MEI23882\_tcl_data\encoding\cp1252.enc

MD5 e9117326c06fee02c478027cb625c7d8
SHA1 2ed4092d573289925a5b71625cf43cc82b901daf
SHA256 741859cf238c3a63bbb20ec6ed51e46451372bb221cfff438297d261d0561c2e
SHA512 d0a39bc41adc32f2f20b1a0ebad33bf48dfa6ed5cc1d8f92700cdd431db6c794c09d9f08bb5709b394acf54116c3a1e060e2abcc6b503e1501f8364d3eebcd52

C:\Users\Admin\AppData\Local\Temp\_MEI23882\zlib1.dll

MD5 2849986dadc875a7a92889eced861a36
SHA1 c723d5e55deb07699f2fc83999b07bd9dab1182e
SHA256 84cc14c704067bffd2b4dd411abe752eb492431814cf9ac13417d061a3db0ec3
SHA512 b8376fe9ead1f43eebbaee92e649ba528b3eb2d2b774534f46511ea0a1da743438e03bb793b9bc02a59fbadd5ae32e537c29522dd205d2a4d3e584357fa1bdd6

C:\Users\Admin\AppData\Local\Temp\_MEI23882\tcl86t.dll

MD5 bed46aa40c392c9068aed5f94857d398
SHA1 227561d5f6a592dedd7a8b0ffe0c284f9bbf23e8
SHA256 22a1746363151a19e02f92f9b7bc4849038783be34c04f311a11df69fdc1a039
SHA512 04850421617366faeaa711fd28dcf58ff1bc5aa2b0cb962fbfc47b5ae645b3726f3decc19d0b36b23c6b00210badeefc67f83ba6f0a81d6de57dc27001ac19be

C:\Users\Admin\AppData\Local\Temp\_MEI23882\_socket.pyd

MD5 632336eeead53cfad22eb57f795d5657
SHA1 62f5f73d21b86cd3b73b68e5faec032618196745
SHA256 ce3090fff8575b21287df5fc69ae98806646fc302eefadf85e369ad3debad92b
SHA512 77965b45060545e210cdb044f25e5fd68d6a9150caf1cad7645dbafcf1ce8e1ccbdf8436fbdcbf5f9c293321c8916e114de30ed8897c7db72df7f8d1f98dfb55

C:\Users\Admin\AppData\Local\Temp\_MEI23882\_hashlib.pyd

MD5 0abfee1db6c16e8ddaff12cd3e86475b
SHA1 b2dda9635ede4f2841912cc50cb3ae67eea89fe7
SHA256 b4cec162b985d34ab768f66e8fa41ed28dc2f273fde6670eeace1d695789b137
SHA512 0a5cae4e3442af1d62b65e8bf91e0f2a61563c2b971bbf008bfb2de0f038ee472e7bfcc88663dc503b2712e92e6a7e6a5f518ddab1fab2eb435d387b740d2d44

C:\Users\Admin\AppData\Local\Temp\_MEI23882\_decimal.pyd

MD5 82321fb8245333842e1c31f874329170
SHA1 81abb1d3d5c55db53e8aca9bdf74f2dec0aba1a3
SHA256 b7f9603f98ef232a2c5bce7001d842c01d76ed35171afbd898e6d17facf38b56
SHA512 0cf932ee0d1242ea9377d054adcd71fdd7ec335abbac865e82987e3979e24cead6939cca19da63a08e08ac64face16950edce7918e02bfc7710f09645fd2fa19

C:\Users\Admin\AppData\Local\Temp\_MEI23882\unicodedata.pyd

MD5 098cc6ad04199442c3e2a60e1243c2dc
SHA1 4c92c464a8e1e56e1c4d77cd30a0da474a026aaf
SHA256 64a162d6b11ba10cb11509f3cc445f17beb7acfd064f030b4d59faa1c9894b29
SHA512 73c28488b42a0bc2f0d2861fed3f5dcccf8959ce19d3121c13c998db496f2822deb40f36f86240c8d3954fd2dc2ba5d63c8a125b62324dcd92fb6c8ba49ff170

memory/956-1040-0x0000022CE5930000-0x0000022CE593A000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI23882\_ctypes.pyd

MD5 302ddf5f83b5887ab9c4b8cc4e40b7a6
SHA1 0aa06af65d072eb835c8d714d0f0733dc2f47e20
SHA256 8250b4c102abd1dba49fc5b52030caa93ca34e00b86cee6547cc0a7f22326807
SHA512 5ddc2488fa192d8b662771c698a63faaf109862c8a4dd0df10fb113aef839d012df58346a87178aff9a1b369f82d8ae7819cef4aad542d8bd3f91327feace596

C:\Users\Admin\AppData\Local\Temp\_MEI23882\base_library.zip

MD5 bed03063e08a571088685625544ce144
SHA1 56519a1b60314ec43f3af0c5268ecc4647239ba3
SHA256 0d960743dbf746817b61ff7dd1c8c99b4f8c915de26946be56118cd6bedaebdc
SHA512 c136e16db86f94b007db42a9bf485a7c255dcc2843b40337e8f22a67028117f5bd5d48f7c1034d7446bb45ea16e530f1216d22740ddb7fab5b39cc33d4c6d995

memory/956-1044-0x00007FFB69680000-0x00007FFB6A141000-memory.dmp

memory/2464-1048-0x00007FFB78A60000-0x00007FFB78A8A000-memory.dmp

memory/2464-1047-0x00000000648C0000-0x000000006496A000-memory.dmp

memory/4500-1046-0x00007FF786F10000-0x00007FF78738D000-memory.dmp

memory/652-1049-0x0000028847130000-0x000002884719A000-memory.dmp

memory/652-1051-0x00000288471A0000-0x0000028847252000-memory.dmp

memory/652-1052-0x0000028847250000-0x00000288472A0000-memory.dmp

memory/652-1053-0x00000288472A0000-0x00000288472C2000-memory.dmp

memory/652-1055-0x0000028847310000-0x000002884734A000-memory.dmp

memory/652-1056-0x00000288472D0000-0x00000288472F6000-memory.dmp

memory/652-1057-0x0000028847F60000-0x000002884828E000-memory.dmp

memory/652-1076-0x0000028848490000-0x00000288484A2000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ntxcfwnw.p5u.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/4500-1103-0x00007FF786F10000-0x00007FF78738D000-memory.dmp

memory/4048-1106-0x00007FF6B5020000-0x00007FF6B549D000-memory.dmp

memory/4048-1129-0x00007FF6B5020000-0x00007FF6B549D000-memory.dmp

memory/4824-1132-0x00007FF6E29D0000-0x00007FF6E29F9000-memory.dmp