Resubmissions

16-12-2024 05:27

241216-f5kx6awmh1 10

14-12-2024 20:23

241214-y6jqlasrhy 10

14-12-2024 20:22

241214-y51bysvmbk 10

14-12-2024 20:13

241214-yzc98svkfr 10

14-12-2024 13:14

241214-qgw1masrcy 10

14-12-2024 13:12

241214-qfk7qsvlaq 3

12-12-2024 18:19

241212-wymq6ssnat 10

12-12-2024 18:16

241212-www7tssmet 10

Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    16-12-2024 05:27

General

  • Target

    New Text Document mod.exe

  • Size

    8KB

  • MD5

    69994ff2f00eeca9335ccd502198e05b

  • SHA1

    b13a15a5bea65b711b835ce8eccd2a699a99cead

  • SHA256

    2e2e035ece4accdee838ecaacdc263fa526939597954d18d1320d73c8bf810c2

  • SHA512

    ced53147894ed2dfc980bcb50767d9734ba8021f85842a53bb4bb4c502d51b4e9884f5f74c4dd2b70b53cafbe2441376675f7bd0f19bb20a3becb091a34fb9f3

  • SSDEEP

    96:y7ov9wc1dN1Unh3EHJ40CUJCrQt0LpCBIW12nEtgpH9GIkQYQoBNw9fnmK5iLjTv:yZyTFJfCB20LsBIW12n/eIkQ2BNg5S1

Malware Config

Extracted

Family

meduza

C2

193.3.19.151

Attributes
  • anti_dbg

    true

  • anti_vm

    true

  • build_name

    hellres

  • extensions

    .txt; .doc; .xlsx

  • grabber_max_size

    4.194304e+06

  • port

    15666

  • self_destruct

    false

Extracted

Family

xworm

Version

5.0

C2

45.141.26.234:7000

Mutex

2XLzSYLZvUJjDK3V

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    Java Update (32bit).exe

aes.plain

Extracted

Family

redline

Botnet

fvcxcx

C2

185.81.68.147:1912

Extracted

Family

metasploit

Version

metasploit_stager

C2

176.122.27.90:8888

Signatures

  • Detect Xworm Payload 2 IoCs
  • Meduza

    Meduza is a crypto wallet and info stealer written in C++.

  • Meduza Stealer payload 3 IoCs
  • Meduza family
  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Metasploit family
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Redline family
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 25 IoCs
  • Loads dropped DLL 52 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses Microsoft Outlook profiles 1 TTPs 5 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Detects Pyinstaller 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 29 IoCs
  • Suspicious use of AdjustPrivilegeToken 36 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\New Text Document mod.exe
    "C:\Users\Admin\AppData\Local\Temp\New Text Document mod.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2916
    • C:\Users\Admin\AppData\Local\Temp\a\frnd.exe
      "C:\Users\Admin\AppData\Local\Temp\a\frnd.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2880
      • C:\Users\Admin\AppData\Local\Temp\a\frnd.exe
        "C:\Users\Admin\AppData\Local\Temp\a\frnd.exe"
        3⤵
        • Executes dropped EXE
        PID:2752
    • C:\Users\Admin\AppData\Local\Temp\a\hellres.exe
      "C:\Users\Admin\AppData\Local\Temp\a\hellres.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Accesses Microsoft Outlook profiles
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • outlook_office_path
      • outlook_win_path
      PID:2592
    • C:\Users\Admin\AppData\Local\Temp\a\duschno.exe
      "C:\Users\Admin\AppData\Local\Temp\a\duschno.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1356
    • C:\Users\Admin\AppData\Local\Temp\a\resp.exe
      "C:\Users\Admin\AppData\Local\Temp\a\resp.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1388
    • C:\Users\Admin\AppData\Local\Temp\a\frnd1.exe
      "C:\Users\Admin\AppData\Local\Temp\a\frnd1.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1992
      • C:\Users\Admin\AppData\Local\Temp\a\frnd1.exe
        "C:\Users\Admin\AppData\Local\Temp\a\frnd1.exe"
        3⤵
        • Executes dropped EXE
        PID:1216
      • C:\Users\Admin\AppData\Local\Temp\a\frnd1.exe
        "C:\Users\Admin\AppData\Local\Temp\a\frnd1.exe"
        3⤵
        • Executes dropped EXE
        PID:2660
      • C:\Users\Admin\AppData\Local\Temp\a\frnd1.exe
        "C:\Users\Admin\AppData\Local\Temp\a\frnd1.exe"
        3⤵
        • Executes dropped EXE
        PID:2440
      • C:\Users\Admin\AppData\Local\Temp\a\frnd1.exe
        "C:\Users\Admin\AppData\Local\Temp\a\frnd1.exe"
        3⤵
        • Executes dropped EXE
        PID:2032
      • C:\Users\Admin\AppData\Local\Temp\a\frnd1.exe
        "C:\Users\Admin\AppData\Local\Temp\a\frnd1.exe"
        3⤵
        • Executes dropped EXE
        PID:1880
    • C:\Users\Admin\AppData\Local\Temp\a\zx.exe
      "C:\Users\Admin\AppData\Local\Temp\a\zx.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1368
      • C:\Users\Admin\AppData\Local\Temp\a\zx.exe
        "C:\Users\Admin\AppData\Local\Temp\a\zx.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:292
    • C:\Users\Admin\AppData\Local\Temp\a\TPB-1.exe
      "C:\Users\Admin\AppData\Local\Temp\a\TPB-1.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      PID:1536
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\a\TPB-1.exe" & rd /s /q "C:\ProgramData\OP8QIECJ5XBI" & exit
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2088
        • C:\Windows\SysWOW64\timeout.exe
          timeout /t 10
          4⤵
          • System Location Discovery: System Language Discovery
          • Delays execution with timeout.exe
          PID:1936
    • C:\Users\Admin\AppData\Local\Temp\a\TestExe.exe
      "C:\Users\Admin\AppData\Local\Temp\a\TestExe.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2768
    • C:\Users\Admin\AppData\Local\Temp\a\x.exe
      "C:\Users\Admin\AppData\Local\Temp\a\x.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2832
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\a\x.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:688
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'x.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2316
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\Java Update (32bit).exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2188
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Java Update (32bit).exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2420
    • C:\Users\Admin\AppData\Local\Temp\a\PDFReader.exe
      "C:\Users\Admin\AppData\Local\Temp\a\PDFReader.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      PID:2400
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:264
    • C:\Users\Admin\AppData\Local\Temp\a\system32.exe
      "C:\Users\Admin\AppData\Local\Temp\a\system32.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2924
      • C:\Users\Admin\AppData\Local\Temp\a\system32.exe
        "C:\Users\Admin\AppData\Local\Temp\a\system32.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:1780
    • C:\Users\Admin\AppData\Local\Temp\a\fcxcx.exe
      "C:\Users\Admin\AppData\Local\Temp\a\fcxcx.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1584
    • C:\Users\Admin\AppData\Local\Temp\a\Update.exe
      "C:\Users\Admin\AppData\Local\Temp\a\Update.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2004
    • C:\Users\Admin\AppData\Local\Temp\a\main.exe
      "C:\Users\Admin\AppData\Local\Temp\a\main.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:4048
      • C:\Users\Admin\AppData\Local\Temp\a\main.exe
        "C:\Users\Admin\AppData\Local\Temp\a\main.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:2708
    • C:\Users\Admin\AppData\Local\Temp\a\tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\a\tmp.exe"
      2⤵
      • Executes dropped EXE
      PID:4428

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Java Update (32bit).exe

    Filesize

    40KB

    MD5

    f9a6811d7a9d5e06d73a68fc729ce66c

    SHA1

    c882143d5fde4b2e7edb5a9accb534ba17d754ef

    SHA256

    c583d0a367ecffa74b82b78116bbb04b7c92bed0300ed1c3adc4ef3250fbb9cc

    SHA512

    4dec52f0d1927306deda677fea46d103b052aaa5f7d7f49abe59a3618110ee542c2db385158a393970751fcc9687efe44a860d6330ed474c0c849369c0da56df

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    759dcba68c8e3997a1a408a455bb92f4

    SHA1

    875931a81d00d4d3676520a48cb22e881a35e70a

    SHA256

    29559b41e33625c91ad4524875e69a48c2fea9b5eba1ba88149d1fd2ed38c781

    SHA512

    783e8571366ab8930c0d94c44642f8a982590b2bc13ba9ce9508f700057a64f2e01399d80d0222612837829e3e7603f42d6ae69801eef2221b16defdda63a291

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    771a258e04b48c822904a4c9d2857a53

    SHA1

    893eca28975f2e423854e718c94f63dd2a574ce8

    SHA256

    7848762cec505a3cb438525dcf65820cce90c49a8b1d4fcca199d0122cc8ddca

    SHA512

    1ccfe1472a259f331ed9c64a9017b6bcc4c2a4ca1e33024d7b6e3e3cc5e6edfaa1f38102bc7d5722517d94ee40755c65dd432e4eddaabae310eb3511a0b1ea7c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d4f6089abd2f7bb5d06fa9a69e627c84

    SHA1

    a4ad09f795828884b571778da767b188ba3eb4b9

    SHA256

    327b7608965a0095dc0452c265963c45a9d6a62d788203a4d5c49addd50ed1e4

    SHA512

    efbaf73ecf31a66b11c4053a3d038dbbf57f24aa77446ced4ff385d56071687044818430dbc548970552654caaeea19a0fce013037bb149123a1c11167a293ca

  • C:\Users\Admin\AppData\Local\Temp\CabC8AE.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarC8C0.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\_MEI13682\base_library.zip

    Filesize

    821KB

    MD5

    f4981249047e4b7709801a388e2965af

    SHA1

    42847b581e714a407a0b73e5dab019b104ec9af2

    SHA256

    b191e669b1c715026d0732cbf8415f1ff5cfba5ed9d818444719d03e72d14233

    SHA512

    e8ef3fb3c9d5ef8ae9065838b124ba4920a3a1ba2d4174269cad05c1f318bc9ff80b1c6a6c0f3493e998f0587ef59be0305bc92e009e67b82836755470bc1b13

  • C:\Users\Admin\AppData\Local\Temp\_MEI13682\libffi-7.dll

    Filesize

    32KB

    MD5

    4424baf6ed5340df85482fa82b857b03

    SHA1

    181b641bf21c810a486f855864cd4b8967c24c44

    SHA256

    8c1f7f64579d01fedfde07e0906b1f8e607c34d5e6424c87abe431a2322eba79

    SHA512

    8adb94893ada555de2e82f006ab4d571fad8a1b16ac19ca4d2efc1065677f25d2de5c981473fabd0398f6328c1be1ebd4d36668ea67f8a5d25060f1980ee7e33

  • C:\Users\Admin\AppData\Local\Temp\a\PDFReader.exe

    Filesize

    2.5MB

    MD5

    ddce3b9704d1e4236548b1a458317dd0

    SHA1

    a48a65dbcba5a65d89688e1b4eac0deef65928c8

    SHA256

    972f3d714d2a17e1e4d524c97cf8a283728dc8cf8ea4f2c39bf005cfcd3e71ce

    SHA512

    5e99897810377570cc29f0a066d4f31e05790b10d8a479dd8e358477cc7317bccd4d67c5936edfdca5f6385bd0587ba43b626bfc919cb12330facf3fa8893e86

  • C:\Users\Admin\AppData\Local\Temp\a\TPB-1.exe

    Filesize

    203KB

    MD5

    8ba8994283713a778391d7607a039989

    SHA1

    86e2cc10ae3a8a7040bc5958c45e680fbdbd1c19

    SHA256

    5746d38d3f64fd37ad4aa158d119eec1378e6298bd105323d5ffc791b9f5e88a

    SHA512

    5b74b96cec6ce7424604c9903656dd8b26178b09ce76cf68cdbba2d39b28010c001c6818ac3fea9418ffa6c3a57a952c2b6afa5c53af5ca52157a940a734dee3

  • C:\Users\Admin\AppData\Local\Temp\a\Update.exe

    Filesize

    302KB

    MD5

    02701f8d91714c583decdd43635ff407

    SHA1

    855b8eeffcd217735d1ba6395bbb6647140ecca4

    SHA256

    41ba86941c72b5e160359e4b851251350958ca56e1d5aa897f0917eb51c5bd2e

    SHA512

    42930c89943297413933857c8ceac9eec924ce3093fd78da8f75930abdda540407781caf2fe32d4e7019cbd20171485a9d6389b4c03b0600edbaac597577c599

  • C:\Users\Admin\AppData\Local\Temp\a\frnd1.exe

    Filesize

    4.7MB

    MD5

    8ceaf0f122909e63199c9f21f45e5098

    SHA1

    5ff6ef7983db06cd0ecf4e622db3b7a541c2a6a6

    SHA256

    36fbd1bed8e9cbccb8a2d0cb4530a0669faa97fac45efb44c9635e8ba1552d5e

    SHA512

    f56eecda400f58e9d632bac9d73fb510670c28aa6ba6ba2c422045bba567b9d33450e7dcc883a7f5ae2aa971d1751b1b31ff217d9736c3a5ca6f0a3edbf98870

  • C:\Users\Admin\AppData\Local\Temp\a\hellres.exe

    Filesize

    1.2MB

    MD5

    2511d20918fe5495f4cec12ed8e010df

    SHA1

    1a1d3f5c67f93021868e9fa4682f576f482ba86e

    SHA256

    0ab815e72b9490ff95cc216c08aa6503d1610e052793d433732a3b28c25c5d71

    SHA512

    849994cd3e0aa394041f0f23908fdc2440366685c3a3035c224cf1048f7eb73f6c30ac670de72b9a276fe080e965fba3b500d0c49dab91892683377b9db90402

  • C:\Users\Admin\AppData\Local\Temp\a\tmp.exe

    Filesize

    7KB

    MD5

    459976dc3440b9fe9614d2e7c246af02

    SHA1

    ea72df634719681351c66aea8b616349bf4b1cba

    SHA256

    d459bd8e6ababe027af56fc683181351be1d4ad230da087e742aaef5c0979811

    SHA512

    368d943206bb8475b218aefd9483c6bedeef53742366a7f87fe638f848c118097b99122bc6245538b92255d586c45d0de54dbd399a4c401d19fb87d5f8ecc400

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\W0PCFUXOWN09W1D0CMBQ.temp

    Filesize

    7KB

    MD5

    7a1425f30e4c6769962825f15eaf2661

    SHA1

    7e101fc3e786a4c02487c866fd9d685a35f2ce0b

    SHA256

    7f4e663c15c7fba87690cf33363f6d5618574412cedff073b8b87842b0cad696

    SHA512

    f4aa6a6e934f15c1eda094b00b3fef467e994c36b5ac74c9d960cb2174ba110d49e07252b38480f3955893d1e73f88b7ed16a5f5c2c96ac85fff9cbd0481c407

  • \Users\Admin\AppData\Local\Temp\_MEI13682\VCRUNTIME140.dll

    Filesize

    87KB

    MD5

    0e675d4a7a5b7ccd69013386793f68eb

    SHA1

    6e5821ddd8fea6681bda4448816f39984a33596b

    SHA256

    bf5ff4603557c9959acec995653d052d9054ad4826df967974efd2f377c723d1

    SHA512

    cae69a90f92936febde67dacd6ce77647cb3b3ed82bb66463cd9047e90723f633aa2fc365489de09fecdc510be15808c183b12e6236b0893af19633f6a670e66

  • \Users\Admin\AppData\Local\Temp\_MEI13682\_ctypes.pyd

    Filesize

    120KB

    MD5

    f1e33a8f6f91c2ed93dc5049dd50d7b8

    SHA1

    23c583dc98aa3f6b8b108db5d90e65d3dd72e9b4

    SHA256

    9459d246df7a3c638776305cf3683946ba8db26a7de90df8b60e1be0b27e53c4

    SHA512

    229896da389d78cbdf2168753ed7fcc72d8e0e62c6607a3766d6d47842c0abd519ac4f5d46607b15e7ba785280f9d27b482954e931645337a152b8a54467c6a5

  • \Users\Admin\AppData\Local\Temp\_MEI13682\api-ms-win-core-file-l1-2-0.dll

    Filesize

    19KB

    MD5

    f0c73f7454a5ce6fb8e3d795fdb0235d

    SHA1

    acdd6c5a359421d268b28ddf19d3bcb71f36c010

    SHA256

    2a59dd891533a028fae7a81e690e4c28c9074c2f327393fab17329affe53fd7b

    SHA512

    bd6cf4e37c3e7a1a3b36f42858af1b476f69caa4ba1fd836a7e32220e5eff7ccc811c903019560844af988a7c77cc41dc6216c0c949d8e04516a537da5821a3e

  • \Users\Admin\AppData\Local\Temp\_MEI13682\api-ms-win-core-file-l2-1-0.dll

    Filesize

    19KB

    MD5

    7d4d4593b478b4357446c106b64e61f8

    SHA1

    8a4969c9e59d7a7485c8cc5723c037b20dea5c9d

    SHA256

    0a6e2224cde90a0d41926e8863f9956848ffbf19848e8855bd08953112afc801

    SHA512

    7bc9c473705ec98ba0c1da31c295937d97710cedefc660f6a5cb0512bae36ad23bebb2f6f14df7ce7f90ec3f817b02f577317fdd514560aab22cb0434d8e4e0b

  • \Users\Admin\AppData\Local\Temp\_MEI13682\api-ms-win-core-localization-l1-2-0.dll

    Filesize

    21KB

    MD5

    1d75e7b9f68c23a195d408cf02248119

    SHA1

    62179fc9a949d238bb221d7c2f71ba7c1680184c

    SHA256

    67ebe168b7019627d68064043680674f9782fda7e30258748b29412c2b3d4c6b

    SHA512

    c2ee84a9aeac34f7b51426d12f87bb35d8c3238bb26a6e14f412ea485e5bd3b8fb5b1231323d4b089cf69d8180a38ddd7fd593cc52cbdf250125ad02d66eea9d

  • \Users\Admin\AppData\Local\Temp\_MEI13682\api-ms-win-core-processthreads-l1-1-1.dll

    Filesize

    19KB

    MD5

    d6ad0f2652460f428c0e8fc40b6f6115

    SHA1

    1a5152871abc5cf3d4868a218de665105563775e

    SHA256

    4ef09fa6510eeebb4855b6f197b20a7a27b56368c63cc8a3d1014fa4231ab93a

    SHA512

    ceafeee932919bc002b111d6d67b7c249c85d30da35dfbcebd1f37db51e506ac161e4ee047ff8f7bf0d08da6a7f8b97e802224920bd058f8e790e6fa0ee48b22

  • \Users\Admin\AppData\Local\Temp\_MEI13682\api-ms-win-core-timezone-l1-1-0.dll

    Filesize

    19KB

    MD5

    eab486e4719b916cad05d64cd4e72e43

    SHA1

    876c256fb2aeb0b25a63c9ee87d79b7a3c157ead

    SHA256

    05fe96faa8429992520451f4317fbceba1b17716fa2caf44ddc92ede88ce509d

    SHA512

    c50c3e656cc28a2f4f6377ba24d126bdc248a3125dca490994f8cace0a4903e23346ae937bb5b0a333f7d39ece42665ae44fde2fd5600873489f3982151a0f5d

  • \Users\Admin\AppData\Local\Temp\_MEI13682\api-ms-win-crt-conio-l1-1-0.dll

    Filesize

    20KB

    MD5

    22bfe210b767a667b0f3ed692a536e4e

    SHA1

    88e0ff9c141d8484b5e34eaaa5e4be0b414b8adf

    SHA256

    f1a2499cc238e52d69c63a43d1e61847cf852173fe95c155056cfbd2cb76abc3

    SHA512

    cbea3c690049a73b1a713a2183ff15d13b09982f8dd128546fd3db264af4252ccd390021dee54435f06827450da4bd388bd6ff11b084c0b43d50b181c928fd25

  • \Users\Admin\AppData\Local\Temp\_MEI13682\api-ms-win-crt-convert-l1-1-0.dll

    Filesize

    23KB

    MD5

    da5e087677c8ebbc0062eac758dfed49

    SHA1

    ca69d48efa07090acb7ae7c1608f61e8d26d3985

    SHA256

    08a43a53a66d8acb2e107e6fc71213cedd180363055a2dc5081fe5a837940dce

    SHA512

    6262e9a0808d8f64e5f2dfad5242cd307e2f5eaa78f0a768f325e65c98db056c312d79f0b3e63c74e364af913a832c1d90f4604fe26cc5fb05f3a5a661b12573

  • \Users\Admin\AppData\Local\Temp\_MEI13682\api-ms-win-crt-environment-l1-1-0.dll

    Filesize

    19KB

    MD5

    33a0fe1943c5a325f93679d6e9237fee

    SHA1

    737d2537d602308fc022dbc0c29aa607bcdec702

    SHA256

    5af7aa065ffdbf98d139246e198601bfde025d11a6c878201f4b99876d6c7eac

    SHA512

    cab7fcaa305a9ace1f1cc7077b97526bebc0921adf23273e74cd42d7fe99401d4f7ede8ecb9847b6734a13760b9ebe4dbd2465a3db3139ed232dbef68fb62c54

  • \Users\Admin\AppData\Local\Temp\_MEI13682\api-ms-win-crt-filesystem-l1-1-0.dll

    Filesize

    21KB

    MD5

    633dca52da4ebaa6f4bf268822c6dc88

    SHA1

    1ebfc0f881ce338d2f66fcc3f9c1cbb94cdc067e

    SHA256

    424fd5d3d3297a8ab1227007ef8ded5a4f194f24bd573a5211be71937aa55d22

    SHA512

    ed058525ee7b4cc7e12561c7d674c26759a4301322ff0b3239f3183911ce14993614e3199d8017b9bfde25c8cb9ac0990d318bb19f3992624b39ec0f084a8df1

  • \Users\Admin\AppData\Local\Temp\_MEI13682\api-ms-win-crt-heap-l1-1-0.dll

    Filesize

    20KB

    MD5

    43bf2037bfd3fb60e1fedac634c6f86e

    SHA1

    959eebe41d905ad3afa4254a52628ec13613cf70

    SHA256

    735703c0597da278af8a6359fc051b9e657627f50ad5b486185c2ef328ad571b

    SHA512

    7042846c009efea45ca5fafdc08016eca471a8c54486ba03f212abba47467f8744e9546c8f33214620f97dbcc994e3002788ad0db65b86d8a3e4ff0d8a9d0d05

  • \Users\Admin\AppData\Local\Temp\_MEI13682\api-ms-win-crt-locale-l1-1-0.dll

    Filesize

    19KB

    MD5

    d51bc845c4efbfdbd68e8ccffdad7375

    SHA1

    c82e580ec68c48e613c63a4c2f9974bb59182cf6

    SHA256

    89d9f54e6c9ae1cb8f914da1a2993a20de588c18f1aaf4d66efb20c3a282c866

    SHA512

    2e353cf58ad218c3e068a345d1da6743f488789ef7c6b96492d48571dc64df8a71ad2db2e5976cfd04cf4b55455e99c70c7f32bd2c0f4a8bed1d29c2dafc17b0

  • \Users\Admin\AppData\Local\Temp\_MEI13682\api-ms-win-crt-math-l1-1-0.dll

    Filesize

    28KB

    MD5

    487f72d0cf7dc1d85fa18788a1b46813

    SHA1

    0aabff6d4ee9a2a56d40ee61e4591d4ba7d14c0d

    SHA256

    560baf1b87b692c284ccbb82f2458a688757231b315b6875482e08c8f5333b3d

    SHA512

    b7f4e32f98bfdcf799331253faebb1fb08ec24f638d8526f02a6d9371c8490b27d03db3412128ced6d2bbb11604247f3f22c8380b1bf2a11fb3bb92f18980185

  • \Users\Admin\AppData\Local\Temp\_MEI13682\api-ms-win-crt-process-l1-1-0.dll

    Filesize

    20KB

    MD5

    54a8fca040976f2aac779a344b275c80

    SHA1

    ea1f01d6dcdf688eb0f21a8cb8a38f03bc777883

    SHA256

    7e90e7acc69aca4591ce421c302c7f6cdf8e44f3b4390f66ec43dff456ffea29

    SHA512

    cb20bed4972e56f74de1b7bc50dc1e27f2422dbb302aecb749018b9f88e3e4a67c9fc69bbbb8c4b21d49a530cc8266172e7d237650512aafb293cdfe06d02228

  • \Users\Admin\AppData\Local\Temp\_MEI13682\api-ms-win-crt-runtime-l1-1-0.dll

    Filesize

    23KB

    MD5

    21b509d048418922b92985696710afca

    SHA1

    c499dd098aab8c7e05b8b0fd55f994472d527203

    SHA256

    fe7336d2fb3b13a00b5b4ce055a84f0957daefdace94f21b88e692e54b678ac3

    SHA512

    c517b02d4e94cf8360d98fd093bca25e8ae303c1b4500cf4cf01f78a7d7ef5f581b99a0371f438c6805a0b3040a0e06994ba7b541213819bd07ec8c6251cb9bb

  • \Users\Admin\AppData\Local\Temp\_MEI13682\api-ms-win-crt-stdio-l1-1-0.dll

    Filesize

    25KB

    MD5

    120a5dc2682cd2a838e0fc0efd45506e

    SHA1

    8710be5d5e9c878669ff8b25b67fb2deb32cd77a

    SHA256

    c14f0d929a761a4505628c4eb5754d81b88aa1fdad2154a2f2b0215b983b6d89

    SHA512

    4330edf9b84c541e5ed3bb672548f35efa75c6b257c3215fc29ba6e152294820347517ec9bd6bde38411efa9074324a276cf0d7d905ed5dd88e906d78780760c

  • \Users\Admin\AppData\Local\Temp\_MEI13682\api-ms-win-crt-string-l1-1-0.dll

    Filesize

    25KB

    MD5

    f22faca49e4d5d80ec26ed31e7ecd0e0

    SHA1

    473bcbfb78e6a63afd720b5cbe5c55d9495a3d88

    SHA256

    1eb30ea95dae91054a33a12b1c73601518d28e3746db552d7ce120da589d4cf4

    SHA512

    c8090758435f02e3659d303211d78102c71754ba12b0a7e25083fd3529b3894dc3ab200b02a2899418cc6ed3b8f483d36e6c2bf86ce2a34e5fd9ad0483b73040

  • \Users\Admin\AppData\Local\Temp\_MEI13682\api-ms-win-crt-time-l1-1-0.dll

    Filesize

    21KB

    MD5

    2fd0da47811b8ed4a0abdf9030419381

    SHA1

    46e3f21a9bd31013a804ba45dc90cc22331a60d1

    SHA256

    de81c4d37833380a1c71a5401de3ab4fe1f8856fc40d46d0165719a81d7f3924

    SHA512

    2e6f900628809bfd908590fe1ea38e0e36960235f9a6bbccb73bbb95c71bfd10f75e1df5e8cf93a682e4ada962b06c278afc9123ab5a4117f77d1686ff683d6f

  • \Users\Admin\AppData\Local\Temp\_MEI13682\python38.dll

    Filesize

    4.0MB

    MD5

    d2a8a5e7380d5f4716016777818a32c5

    SHA1

    fb12f31d1d0758fe3e056875461186056121ed0c

    SHA256

    59ab345c565304f638effa7c0236f26041fd06e35041a75988e13995cd28ace9

    SHA512

    ad1269d1367f587809e3fbe44af703c464a88fa3b2ae0bf2ad6544b8ed938e4265aab7e308d999e6c8297c0c85c608e3160796325286db3188a3edf040a02ab7

  • \Users\Admin\AppData\Local\Temp\_MEI13682\ucrtbase.dll

    Filesize

    1021KB

    MD5

    4e326feeb3ebf1e3eb21eeb224345727

    SHA1

    f156a272dbc6695cc170b6091ef8cd41db7ba040

    SHA256

    3c60056371f82e4744185b6f2fa0c69042b1e78804685944132974dd13f3b6d9

    SHA512

    be9420a85c82eeee685e18913a7ff152fcead72a90ddcc2bcc8ab53a4a1743ae98f49354023c0a32b3a1d919bda64b5d455f6c3a49d4842bbba4aa37c1d05d67

  • \Users\Admin\AppData\Local\Temp\a\duschno.exe

    Filesize

    1.2MB

    MD5

    c6813da66eba357d0deaa48c2f7032b8

    SHA1

    6812e46c51f823ff0b0ee17bfce0af72f857af66

    SHA256

    1420f60f053c3ea5605239ee431e5f487245108b1c01be75d16b5246156fa178

    SHA512

    19391c6b12ba8f34a5faf326f8986ef8de4729d614d72bf438c6efa569b3505159ca55f580fe2a02642e5e7a0f1b38a7a9db9f0d66d67ba548d84c230183159e

  • \Users\Admin\AppData\Local\Temp\a\frnd.exe

    Filesize

    4.1MB

    MD5

    298f1cd4f1804f025564bdb392538183

    SHA1

    cc6cac6c7e6be5f6b00a3714c856c1155b6d7e17

    SHA256

    8d5fd6e273be8cea765bc75fd9af3db49e58578305cb9d08fa357709f0b7ce35

    SHA512

    6eead00ed3d0c5c9b829191d025095c1468697169c388dac0a1325d955737311ab7db21ddbf1dae723f13801b78d63f98ba9725ab3affffe1011cee4e71c4535

  • \Users\Admin\AppData\Local\Temp\a\resp.exe

    Filesize

    1.2MB

    MD5

    bee040fc0caf73ee0cb2e55d4c703f22

    SHA1

    6bf7f1fa9dcf930190cabfba9abde2e7faab486f

    SHA256

    940d413dd95bc28d5c724d814f2cd1ecca005d2cb58ed28788d9c07d962d829b

    SHA512

    ec45afc4a8626dc813462a3c65b57a75f96233e9e66a0d9d60953fa2e29ec1a1c48c9ccf00f8f0e0ad3ff37e8c98c673c5b2309ff77475896ec57897d73551b2

  • \Users\Admin\AppData\Local\Temp\a\zx.exe

    Filesize

    5.6MB

    MD5

    bb0be25bdd2121fa0bddf6ac59d4fa8d

    SHA1

    c24f80b6344ecc9d6daacf5f838f0a279b146c13

    SHA256

    50f3af8a4b14a6e63cdc7817ecb482d7045458b43d786d580b51e8f12d762106

    SHA512

    6c7b69845cc483a06c68b319b87345240a2288c6183adfdbaaedcb3489af6e80247456bb31529b3981c86a05bb13ea958b1e90b012071fcc7b9267c8b54f0dab

  • memory/264-732-0x0000000000B50000-0x0000000000C10000-memory.dmp

    Filesize

    768KB

  • memory/264-740-0x0000000000B50000-0x0000000000C10000-memory.dmp

    Filesize

    768KB

  • memory/264-2541-0x0000000000CF0000-0x0000000000D46000-memory.dmp

    Filesize

    344KB

  • memory/264-2542-0x00000000009A0000-0x00000000009EC000-memory.dmp

    Filesize

    304KB

  • memory/264-746-0x0000000000B50000-0x0000000000C10000-memory.dmp

    Filesize

    768KB

  • memory/264-748-0x0000000000B50000-0x0000000000C10000-memory.dmp

    Filesize

    768KB

  • memory/264-750-0x0000000000B50000-0x0000000000C10000-memory.dmp

    Filesize

    768KB

  • memory/264-752-0x0000000000B50000-0x0000000000C10000-memory.dmp

    Filesize

    768KB

  • memory/264-754-0x0000000000B50000-0x0000000000C10000-memory.dmp

    Filesize

    768KB

  • memory/264-756-0x0000000000B50000-0x0000000000C10000-memory.dmp

    Filesize

    768KB

  • memory/264-758-0x0000000000B50000-0x0000000000C10000-memory.dmp

    Filesize

    768KB

  • memory/264-760-0x0000000000B50000-0x0000000000C10000-memory.dmp

    Filesize

    768KB

  • memory/264-762-0x0000000000B50000-0x0000000000C10000-memory.dmp

    Filesize

    768KB

  • memory/264-764-0x0000000000B50000-0x0000000000C10000-memory.dmp

    Filesize

    768KB

  • memory/264-766-0x0000000000B50000-0x0000000000C10000-memory.dmp

    Filesize

    768KB

  • memory/264-768-0x0000000000B50000-0x0000000000C10000-memory.dmp

    Filesize

    768KB

  • memory/264-717-0x0000000000150000-0x00000000001EA000-memory.dmp

    Filesize

    616KB

  • memory/264-715-0x0000000000150000-0x00000000001EA000-memory.dmp

    Filesize

    616KB

  • memory/264-714-0x0000000000150000-0x00000000001EA000-memory.dmp

    Filesize

    616KB

  • memory/264-713-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/264-711-0x0000000000150000-0x00000000001EA000-memory.dmp

    Filesize

    616KB

  • memory/264-718-0x0000000000B50000-0x0000000000C16000-memory.dmp

    Filesize

    792KB

  • memory/264-730-0x0000000000B50000-0x0000000000C10000-memory.dmp

    Filesize

    768KB

  • memory/264-728-0x0000000000B50000-0x0000000000C10000-memory.dmp

    Filesize

    768KB

  • memory/264-726-0x0000000000B50000-0x0000000000C10000-memory.dmp

    Filesize

    768KB

  • memory/264-724-0x0000000000B50000-0x0000000000C10000-memory.dmp

    Filesize

    768KB

  • memory/264-722-0x0000000000B50000-0x0000000000C10000-memory.dmp

    Filesize

    768KB

  • memory/264-720-0x0000000000B50000-0x0000000000C10000-memory.dmp

    Filesize

    768KB

  • memory/264-719-0x0000000000B50000-0x0000000000C10000-memory.dmp

    Filesize

    768KB

  • memory/264-744-0x0000000000B50000-0x0000000000C10000-memory.dmp

    Filesize

    768KB

  • memory/264-742-0x0000000000B50000-0x0000000000C10000-memory.dmp

    Filesize

    768KB

  • memory/264-770-0x0000000000B50000-0x0000000000C10000-memory.dmp

    Filesize

    768KB

  • memory/264-738-0x0000000000B50000-0x0000000000C10000-memory.dmp

    Filesize

    768KB

  • memory/264-736-0x0000000000B50000-0x0000000000C10000-memory.dmp

    Filesize

    768KB

  • memory/264-734-0x0000000000B50000-0x0000000000C10000-memory.dmp

    Filesize

    768KB

  • memory/264-772-0x0000000000B50000-0x0000000000C10000-memory.dmp

    Filesize

    768KB

  • memory/264-774-0x0000000000B50000-0x0000000000C10000-memory.dmp

    Filesize

    768KB

  • memory/688-425-0x000000001B6A0000-0x000000001B982000-memory.dmp

    Filesize

    2.9MB

  • memory/688-426-0x00000000028E0000-0x00000000028E8000-memory.dmp

    Filesize

    32KB

  • memory/1536-174-0x0000000000400000-0x000000000064B000-memory.dmp

    Filesize

    2.3MB

  • memory/1536-701-0x0000000000400000-0x000000000064B000-memory.dmp

    Filesize

    2.3MB

  • memory/1584-702-0x0000000000E20000-0x0000000000E72000-memory.dmp

    Filesize

    328KB

  • memory/1780-654-0x000007FEEF830000-0x000007FEEFC9E000-memory.dmp

    Filesize

    4.4MB

  • memory/1992-2688-0x0000000005D70000-0x0000000005FAA000-memory.dmp

    Filesize

    2.2MB

  • memory/1992-2689-0x00000000009E0000-0x0000000000A02000-memory.dmp

    Filesize

    136KB

  • memory/1992-108-0x0000000000380000-0x0000000000836000-memory.dmp

    Filesize

    4.7MB

  • memory/2316-431-0x000000001B680000-0x000000001B962000-memory.dmp

    Filesize

    2.9MB

  • memory/2316-432-0x0000000001E50000-0x0000000001E58000-memory.dmp

    Filesize

    32KB

  • memory/2752-66-0x000007FFFFFD8000-0x000007FFFFFD9000-memory.dmp

    Filesize

    4KB

  • memory/2768-277-0x0000000000B40000-0x0000000000B50000-memory.dmp

    Filesize

    64KB

  • memory/2832-315-0x0000000000AB0000-0x0000000000AC0000-memory.dmp

    Filesize

    64KB

  • memory/2916-80-0x000007FEF5CD0000-0x000007FEF66BC000-memory.dmp

    Filesize

    9.9MB

  • memory/2916-0-0x000007FEF5CD3000-0x000007FEF5CD4000-memory.dmp

    Filesize

    4KB

  • memory/2916-74-0x000007FEF5CD3000-0x000007FEF5CD4000-memory.dmp

    Filesize

    4KB

  • memory/2916-2-0x000007FEF5CD0000-0x000007FEF66BC000-memory.dmp

    Filesize

    9.9MB

  • memory/2916-1-0x0000000000CB0000-0x0000000000CB8000-memory.dmp

    Filesize

    32KB

  • memory/2916-2741-0x0000000140000000-0x0000000140005000-memory.dmp

    Filesize

    20KB

  • memory/2916-2740-0x0000000140000000-0x0000000140005000-memory.dmp

    Filesize

    20KB

  • memory/2916-2744-0x0000000140000000-0x0000000140005000-memory.dmp

    Filesize

    20KB

  • memory/2916-2745-0x0000000140000000-0x0000000140005000-memory.dmp

    Filesize

    20KB

  • memory/4428-2742-0x0000000140000000-0x0000000140004278-memory.dmp

    Filesize

    16KB