Analysis

  • max time kernel
    135s
  • max time network
    146s
  • platform
    windows10-ltsc_2021_x64
  • resource
    win10ltsc2021-20250314-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250314-enlocale:en-usos:windows10-ltsc_2021-x64system
  • submitted
    04/04/2025, 16:14

General

  • Target

    runner.exe

  • Size

    22KB

  • MD5

    9a69ca248eb8201fa463914ad24cf890

  • SHA1

    52833d514ab20ce3bb2d9a37c07bd93ea0f4f82e

  • SHA256

    807f40d1f7f6291184bb95f73a72456aae52a12d665b45b40bf0b664c49ddf06

  • SHA512

    29ceb1dfcfaba2e79cbd7867afc053eb054e5c1d68c77f702472018f979f85de3003c02fda9e39e216569b142bb2b09b76f8eaffb7e9926869a6cbb1c714fe76

  • SSDEEP

    384:oybnj2M7f7i/ww+/frgeI0/GZ0hYkp1KTdmpasWUOS5BEvNWmkZB20qyM9KzXrQT:z6W/GTY9VI3XB

Malware Config

Extracted

Family

xenorat

C2

visit-dose.gl.at.ply.gg

Mutex

Xeno_rat_nd8912d

Attributes
  • delay

    5000

  • install_path

    temp

  • port

    64494

  • startup_name

    Update

Signatures

  • Deletes Windows Defender Definitions 2 TTPs 1 IoCs

    Uses mpcmdrun utility to delete all AV definitions.

  • Detect XenoRat Payload 2 IoCs
  • XenorRat

    XenorRat is a remote access trojan written in C#.

  • Xenorat family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Using powershell.exe command.

  • Downloads MZ/PE file 2 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 18 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • UPX packed file 38 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\runner.exe
    "C:\Users\Admin\AppData\Local\Temp\runner.exe"
    1⤵
    • Downloads MZ/PE file
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1172
    • C:\Users\Admin\AppData\Local\Temp\setup.exe
      "C:\Users\Admin\AppData\Local\Temp\setup.exe"
      2⤵
      • Executes dropped EXE
      PID:4844
    • C:\Users\Admin\AppData\Local\Temp\setupp.exe
      "C:\Users\Admin\AppData\Local\Temp\setupp.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4324
      • C:\Users\Admin\AppData\Local\Temp\XenoManager\setupp.exe
        "C:\Users\Admin\AppData\Local\Temp\XenoManager\setupp.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:5604
        • C:\Windows\SysWOW64\schtasks.exe
          "schtasks.exe" /Create /TN "Update" /XML "C:\Users\Admin\AppData\Local\Temp\tmpCBEB.tmp" /F
          4⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:2528
    • C:\Users\Admin\AppData\Local\Temp\setuppp.exe
      "C:\Users\Admin\AppData\Local\Temp\setuppp.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:6060
      • C:\Users\Admin\AppData\Local\Temp\setuppp.exe
        "C:\Users\Admin\AppData\Local\Temp\setuppp.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:4256
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\setuppp.exe'"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3944
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\setuppp.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2728
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1148
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4532
          • C:\Program Files\Windows Defender\MpCmdRun.exe
            "C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All
            5⤵
            • Deletes Windows Defender Definitions
            PID:984
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1016
          • C:\Windows\system32\tasklist.exe
            tasklist /FO LIST
            5⤵
            • Enumerates processes with tasklist
            • Suspicious use of AdjustPrivilegeToken
            PID:6116
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2092
          • C:\Windows\System32\Wbem\WMIC.exe
            wmic csproduct get uuid
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3728
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1712
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService
    1⤵
    • Checks processor information in registry
    • Modifies registry class
    PID:4152

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_MEI60602\VCRUNTIME140.dll

    Filesize

    117KB

    MD5

    862f820c3251e4ca6fc0ac00e4092239

    SHA1

    ef96d84b253041b090c243594f90938e9a487a9a

    SHA256

    36585912e5eaf83ba9fea0631534f690ccdc2d7ba91537166fe53e56c221e153

    SHA512

    2f8a0f11bccc3a8cb99637deeda0158240df0885a230f38bb7f21257c659f05646c6b61e993f87e0877f6ba06b347ddd1fc45d5c44bc4e309ef75ed882b82e4e

  • C:\Users\Admin\AppData\Local\Temp\_MEI60602\_ctypes.pyd

    Filesize

    64KB

    MD5

    fc40d41aff12417142c0256e536b4a1a

    SHA1

    237157d6af4ec643c4d8480cf3d332951a791cc1

    SHA256

    0712d9412ea0d276c9a726765c072e00146f5aea853818d177b1a5b425839641

    SHA512

    b7625a5325a5b184b1733931dc3857ea5c118d85a506875dcb6b195c2372723b9c6cf80e4688c0fc1383ea063c9d831dd4c0e10ec429dd0f363aa678b1c99f6b

  • C:\Users\Admin\AppData\Local\Temp\_MEI60602\api-ms-win-core-console-l1-1-0.dll

    Filesize

    21KB

    MD5

    a59cdb8c2e18e5f9c78a153a5f7d1081

    SHA1

    87e982d7f326c54eca5f807a6abdee37b1bfb693

    SHA256

    c890c11170b631a674f340557339c90c2f2116c2d78c8ecfa91427ff121a5ec2

    SHA512

    237d49de19e0ee6306390ca6ed3daa419c3e2536483ec5139b681c5a10af47cd00bb5ebe343c410960666d5967598a2157ce382661a7ab8815c3d066bf217317

  • C:\Users\Admin\AppData\Local\Temp\_MEI60602\api-ms-win-core-datetime-l1-1-0.dll

    Filesize

    21KB

    MD5

    09d1019df17765997fc44e9cbd8f3a17

    SHA1

    baf12379094586b5f5836a4029f46bc3f0ffacba

    SHA256

    30d3f727c1b397a6b59f3f3e58e812b4ab8aea4088e5d2c59dd832c17965229c

    SHA512

    cd1e6758852c04f4999e9037017ecd0ed6d7d61b1b1f156879168e43c0fc2c650cd9f06eaaf79f558a3a4a97dc2ebdfbc2f91493170202f87485177c75d2397b

  • C:\Users\Admin\AppData\Local\Temp\_MEI60602\api-ms-win-core-debug-l1-1-0.dll

    Filesize

    21KB

    MD5

    ea331a567f2681f12e2667ebf165bcc9

    SHA1

    08ad1eec998908077c231e540951482acc26d666

    SHA256

    7db2d8e3c7b9fd6da8093dd175426ed9f5e5134718592660ee15a48bbda321d7

    SHA512

    aec7d1475b76acfc61efa0198328379b7e0aec12015e126e7133c7661e5dfff1eb5ad4c25758867ca879f2614b65a82cfefcb402af33d21319febd26abe5a142

  • C:\Users\Admin\AppData\Local\Temp\_MEI60602\api-ms-win-core-errorhandling-l1-1-0.dll

    Filesize

    21KB

    MD5

    b270f9d1756e10c6b715d5a857aeae24

    SHA1

    4ee30e5efee805c30b11003d04584556438aba45

    SHA256

    b935aebf33146212ed71f85b7b25e2db98fdc2d94e94fb6306169ddf5e76c5d6

    SHA512

    c322c829cdbe9a5974133965daa21c10ad104190275bf5da730c81492cad0daded18bb72a8630e037f93ec0883d401665d46c436d7c15735aad9c56d2176ea6f

  • C:\Users\Admin\AppData\Local\Temp\_MEI60602\api-ms-win-core-fibers-l1-1-0.dll

    Filesize

    21KB

    MD5

    55c70289466fb22f744015137b535270

    SHA1

    0e96732dfa79ef8b836f08d30277659ce93391ce

    SHA256

    fa7ce3865afec1cc640488a6c63d6245586326937f3551ffb63c08a9af27ee9e

    SHA512

    cc4db4d66d2a51fbcf1668b52ae861d8694f9be3e808fd6de32b6392e85b0655872c6f07e038d868473c8e643d44770f30425ee8aec38b6bd42693b3a7b2aa8c

  • C:\Users\Admin\AppData\Local\Temp\_MEI60602\api-ms-win-core-file-l1-1-0.dll

    Filesize

    25KB

    MD5

    301b5e8fd36ea1e0b1820439121cb02d

    SHA1

    7f1b2470a7d7eba5bcec2196c15ea1970f01074c

    SHA256

    3d55993fbaeda346059c41b27750ca79508ddf0e52ab880b9610f062c86ced9a

    SHA512

    597b3f52d19cb92375241c56ea8a5ed9d0b9d75f5a3e3f6bf09ab064a82355292c9c1b6ae61ee854fe7bdae0ff32f5d1f17be784ab5e1772d9287c579217606b

  • C:\Users\Admin\AppData\Local\Temp\_MEI60602\api-ms-win-core-file-l1-2-0.dll

    Filesize

    21KB

    MD5

    33f2eeb40f245d3114df277f00d3160c

    SHA1

    54ebdde675d1f921988a404deef6c52bcfd5ac9d

    SHA256

    12bce3364b96571e89a8bec10ecaa3131959b40d2f6a8bec13086919020ee054

    SHA512

    4ef5653c3f781f0d7b999c89a48172cd8c4321cb54f3cf4aa9f0c116821f328e408f8bc91fb051723a813f6c3c8c16f2944fef5bf4a7e016898ae8bd994ab9ce

  • C:\Users\Admin\AppData\Local\Temp\_MEI60602\api-ms-win-core-file-l2-1-0.dll

    Filesize

    20KB

    MD5

    50abf0a7ee67f00f247bada185a7661c

    SHA1

    0cddac9ac4db3bf10a11d4b79085ef9cb3fb84a1

    SHA256

    f957a4c261506484b53534a9be8931c02ec1a349b3f431a858f8215cecfec3f7

    SHA512

    c2694bb5d103baff1264926a04d2f0fe156b8815a23c3748412a81cc307b71a9236a0e974b5549321014065e393d10228a0f0004df9ba677f03b5d244a64b528

  • C:\Users\Admin\AppData\Local\Temp\_MEI60602\api-ms-win-core-handle-l1-1-0.dll

    Filesize

    21KB

    MD5

    80f6510845d42f30d749735a13bdb403

    SHA1

    bb791b8cc208d4cea1a689cbd7c8dfacede31a4b

    SHA256

    da99f3f67fa9cba5b709583ca00a52fa3fa7d3e381007cdab7e3efab72002711

    SHA512

    f08f0bf4d80b6024719bc90bdad72ad54ec8c2783426113cb644d8168cc34eda4cc1908ba314cbf785219674adabc67a87e105ccbcc51b72a4a4e897d3cbc2a3

  • C:\Users\Admin\AppData\Local\Temp\_MEI60602\api-ms-win-core-heap-l1-1-0.dll

    Filesize

    21KB

    MD5

    bff05ac451a36f424bd3128e0ebf3761

    SHA1

    441948279fcdd11f1a89b7697edc85a9237feb11

    SHA256

    950e038433add25bfc1078202286545cb71b085094099cd0ee55e1d8ae618370

    SHA512

    951253be619b0ad74252679b8ae2b08a5545af7b3cd83a0b5a5b4a8a32037f24ca9fb09c2e2c97db7070f541b54ce277fc2936ebd780769c12a89b52dd5c1708

  • C:\Users\Admin\AppData\Local\Temp\_MEI60602\api-ms-win-core-interlocked-l1-1-0.dll

    Filesize

    21KB

    MD5

    1827ede42ec548f117d0e5b0b8ebb62c

    SHA1

    04e9b71096e661920716318691378fa118521bb2

    SHA256

    36f62388de7b5853d61f8e675eabee6a2b573af562d9510e60ff534b67c96e42

    SHA512

    96b39c49c81a6f7503e9bc29a47337f52382629f39d5eb3310dbf6dc9a845cb64544ab243d4a17d0ebc11e5dfb235a85887792c5167ecdfcc029dab4004ac903

  • C:\Users\Admin\AppData\Local\Temp\_MEI60602\api-ms-win-core-libraryloader-l1-1-0.dll

    Filesize

    21KB

    MD5

    9954502efe7958129c994c82222b30e5

    SHA1

    38a4965988384018b0f17a9c8c703fbabbf4b877

    SHA256

    7ef40dc1fea2e48689eb32d16604d202eba0a9fd71666550c316588c7723ee11

    SHA512

    5bf829df780ca4e8ccba41f598d88cf29e85fc92ad3c40f161fcd4ccd201c695bd102b4977de6027dfae015824b8a21d499b6bdd8f0bee69775eb23e7ae2dad4

  • C:\Users\Admin\AppData\Local\Temp\_MEI60602\api-ms-win-core-localization-l1-2-0.dll

    Filesize

    21KB

    MD5

    f5716e905c45e27ab2bcde0f962c22be

    SHA1

    72a196c93f43d00da7791c9bc6334a93dc8c6e16

    SHA256

    f0384cdc9015ccf808b27d89aab47ff62d77701f9d8ef96096a1b213204ef41d

    SHA512

    fe43857608600f8a3450f52f5b4f6a69ee0edcafe26440257d064bc434aaf3f2d3be581a3b3985e45dc1919adfa438369f64b8f91d962d210cc2ab0b51f74c4c

  • C:\Users\Admin\AppData\Local\Temp\_MEI60602\api-ms-win-core-memory-l1-1-0.dll

    Filesize

    21KB

    MD5

    a0773d7c8f56917a4362e110b75c9373

    SHA1

    949c0860bdb1e2abc8e6d8d0ff66749bf0dd3f3a

    SHA256

    58dcd77041d0485323b7d8f53f5e36bc25475ec33ce91a7888400a87e8e91d43

    SHA512

    57b45e54163576db86044c9e33008dc904b20e03fdab7dc77e7a131837fe5dea6a880a60dd07f2f10d9d18bfe44e0a1dde518217b6c43370cbf8cf2e02a52640

  • C:\Users\Admin\AppData\Local\Temp\_MEI60602\api-ms-win-core-namedpipe-l1-1-0.dll

    Filesize

    21KB

    MD5

    50ba37af65e4d00ac6780dbfd085d768

    SHA1

    38c05da765f9761180dc6cca17fc672733290b21

    SHA256

    57b40bf135fe4e436c7abd5cefd6270eeec2cc1d349e708a61cfd03fec189f81

    SHA512

    f99631e652fe42fd53b1e1e6fbdd25de2e0e200e400d4a8391ab03d52d64b0e693db8c016faeb36d15742a3474f643e0bfec7a7140d3ba99fcb81d4af4372fd9

  • C:\Users\Admin\AppData\Local\Temp\_MEI60602\api-ms-win-core-processenvironment-l1-1-0.dll

    Filesize

    21KB

    MD5

    0b08b84cb09772d04d41e1a715dd093c

    SHA1

    00e675da42fd2a93ef8b93eef0c3533ccd70b4aa

    SHA256

    6bd7d7c2b67d10240e214e381a5f9b6a017de372d7ef71e60157e8daf1d0c9de

    SHA512

    1b47c5b5a64dfeb9136515cf63c49f0c9e1c84fc4ba3fc9036cd98dc2cbbfc011a319afe202c13d8f49f788cdbc2982496b9c6eb7b8e10f626e700e480b2fd2c

  • C:\Users\Admin\AppData\Local\Temp\_MEI60602\api-ms-win-core-processthreads-l1-1-0.dll

    Filesize

    21KB

    MD5

    4f948b56cbdd7977ec77e3b4f47c3fd4

    SHA1

    182446bc0b0268ffe4cd0161e29c1dbfc8b3b405

    SHA256

    336e1a29182d1d3235f99e5921515fb30bac5002d3ff42ad62e94929cc5775c9

    SHA512

    57907103d6a98c09d1ab89e0ee278ab0935afb56ff52522bd1a4633a03fd6d520b20fbbfa42ae56d22d61d9cbeb3dd520d7a1dba57eb35d07a7cee801d10b152

  • C:\Users\Admin\AppData\Local\Temp\_MEI60602\api-ms-win-core-processthreads-l1-1-1.dll

    Filesize

    21KB

    MD5

    ab3986b27d4f6eb2b304c20a424e5ea5

    SHA1

    5f7f012acb02fb1606d0c0dffd0f1cc88276b340

    SHA256

    840d6953082758031ed604853447bdd3509b1e21bf80a30355db45f52a367c43

    SHA512

    9f5918baf2f8f0997728c8d3242f2ffffaf06eb34e34e9f100aca396ab80611e42f77a163db2dbf27aa7755647d260f6a2529efed66d1c5b4278b7a4aa0692e6

  • C:\Users\Admin\AppData\Local\Temp\_MEI60602\api-ms-win-core-profile-l1-1-0.dll

    Filesize

    21KB

    MD5

    bf645fafd6eb1bc32aa1a85ed96b4594

    SHA1

    f161aee35fd4ba53ebed986c24a1ba7b3730fa5d

    SHA256

    433aa6ac7f0a3c9b4af7e12d2b1d40bd0ec5dab0a58ef33940e03181a026ff5e

    SHA512

    feaf6915fd298a16a9896fc960df2162b41c1ceb6c60748492bb20b89032ae47f03deba9853b2ee7a123d4e1872c9ae111b97ab960262d3946900aab57bc44e9

  • C:\Users\Admin\AppData\Local\Temp\_MEI60602\api-ms-win-core-rtlsupport-l1-1-0.dll

    Filesize

    21KB

    MD5

    059b1d79231c6db4743c30a75f687bfe

    SHA1

    61946abf4707f46b0857c7ffadc196ff07627ef2

    SHA256

    3c64042bee4c2561065fa324fbd49731db96b98efbcdeb550943be5429aab1da

    SHA512

    abfda9f424a14c34a19eab2fe4c78aafe8f641207c40f79e47b17cb371d8d531809cf4718902ab56e3b05f4afc552e69e7f3c29b3ea0eca8614000f6b1936a26

  • C:\Users\Admin\AppData\Local\Temp\_MEI60602\api-ms-win-core-string-l1-1-0.dll

    Filesize

    21KB

    MD5

    b96b337576a9ee1d9f94d948947f87de

    SHA1

    ebf032896e0c62579c2c17509e83f4e14c4fdc6d

    SHA256

    129aaa574e775c8397595c435dce87303d03916af2a1df3365f218a41631fb79

    SHA512

    1a4f965be375b152f2ef7f2a3e0998d4eabb6f10745c4bcd5f0c3b5e3539e9f80f845527bda2d63d2a7c10465cb5a28d736f018ab83295c36ac9c33f48b9dc2e

  • C:\Users\Admin\AppData\Local\Temp\_MEI60602\api-ms-win-core-synch-l1-1-0.dll

    Filesize

    21KB

    MD5

    73ba09f42200dd252a7a4230df1080ff

    SHA1

    f5e11e12941af45cb8eea740f6706711a73a25de

    SHA256

    da0027f68c0b6959de94bb4703c397ed646b57d52274b192845d2856446f2693

    SHA512

    ab4c9abd75c5b39ac60647bc732fdd869b9830dffddb1a17885eb318398b16d72051da22b4923bf153c30d62b28820976603227d7a3e309485fb39d791b5d7ab

  • C:\Users\Admin\AppData\Local\Temp\_MEI60602\api-ms-win-core-synch-l1-2-0.dll

    Filesize

    21KB

    MD5

    75eb28ac8b5774c4deeaaf423af83a8b

    SHA1

    109b1f115873f8f8a31e514470df1d7b86dc02bc

    SHA256

    b356061a7dee95cc1adbb2a21668b5c1c6a16e1c9cea918904b895216032c08b

    SHA512

    e4f03062ac6e2cd11dfcd56542ea981fd2a8b7d2095087b4830e0391f2bac7df5585548b2b2dd5101a4cc38328396eb776f6c1e96ad3355f2a2d838a35e05a02

  • C:\Users\Admin\AppData\Local\Temp\_MEI60602\api-ms-win-core-sysinfo-l1-1-0.dll

    Filesize

    21KB

    MD5

    84020d4f64a88520f6987bd0c7fefb9f

    SHA1

    f19271eff7665cadac4480482fb877a2a65d6d69

    SHA256

    d90b0d12da527f92e2729ea15e19d7d2336bac4e7001e0afca3a03f1a9d3fb83

    SHA512

    0df93f2d42a9f33105f23bd943ec7b9d95d1906fe353cf902c042c6b385110696d0c5f605b4aa4341e61386185187196027e5008b5ab7a42df3f4531b16a13ec

  • C:\Users\Admin\AppData\Local\Temp\_MEI60602\api-ms-win-core-timezone-l1-1-0.dll

    Filesize

    21KB

    MD5

    a776cc5105fd23c1fc68a122c8607def

    SHA1

    5b7b7defe72d9a2c3209a96430d62fe09e007689

    SHA256

    b34171187edcdb6c3700919ac791b0ac9762058e7b5268d1b44e7428d06585cf

    SHA512

    4b1f6b376428903751f046ade693808423306e8fb5925119751439320ba1afb6a50b097864cb436a7f704468af0d68458bcd354ebb8852e01bafde0cf9b9d264

  • C:\Users\Admin\AppData\Local\Temp\_MEI60602\api-ms-win-core-util-l1-1-0.dll

    Filesize

    21KB

    MD5

    799212a77a5b261e86a2c5f97da1044b

    SHA1

    a8e027728295147758e6020c3a704f159b444cb5

    SHA256

    493b4dcb9884ec9484b0d86a45bd16ade847e0f09e078875f820057a2da05b8c

    SHA512

    9b25a24058029d41045229494ac4655ae39d111e572022e8ee17bdd6ffc3c2e63b3e9f7271500f41f10816423d5f83a4f906c8f99a28e29758266c356c290dc1

  • C:\Users\Admin\AppData\Local\Temp\_MEI60602\api-ms-win-crt-conio-l1-1-0.dll

    Filesize

    21KB

    MD5

    170c2d43735fa3ec9a5284f7d9e2716e

    SHA1

    8839fe6997626ef35e5b309f6503d8d9a64dc4b0

    SHA256

    a1b4c73a3f9f1813ce70fc1862c3473a80a6119581e1e06f9ecd9faa70dd1443

    SHA512

    5a5d5efc6737a01ab5d1cd8b754314e8118aca6b0153f96d09071420364f38a310f257b194d08561a45b087cf073f7c4cca57850bd98f05451930cbf7d64da98

  • C:\Users\Admin\AppData\Local\Temp\_MEI60602\api-ms-win-crt-convert-l1-1-0.dll

    Filesize

    25KB

    MD5

    0aac3d5c1d97c790179bf950ca75a5d0

    SHA1

    f99529201390154116b45ad97b845d59fbc3aabd

    SHA256

    950276bf1c7408dd30ec8a4f43f5a65420d345ffd2601e6d149d30039e79d976

    SHA512

    d646d0c2668b68b443238e50d35ea3c738fceb1d55bcb786b8bd78ddbc15c8ada9546cde259db75c3bf34a7b50915248bec52d50e6ad98be5dfe2f59bdd69c85

  • C:\Users\Admin\AppData\Local\Temp\_MEI60602\api-ms-win-crt-environment-l1-1-0.dll

    Filesize

    21KB

    MD5

    3c3259b990e2296aa6e484c7f6cacc29

    SHA1

    cbdf84f5c0fe3fee3e449f5746c052f45015c6a6

    SHA256

    07050ef042264a3c015b4b24a3609975ea70ea6b0a1ff96248b71674b67bda08

    SHA512

    6d1bbd5fdc254240dbfdc39fcf91573c1c9dd851eac5a52214e5903d8375a9a2134d9df5df5297f1c73a99dd24306578d778cc5c3a28c87d08dcc8c819b28c2c

  • C:\Users\Admin\AppData\Local\Temp\_MEI60602\api-ms-win-crt-filesystem-l1-1-0.dll

    Filesize

    21KB

    MD5

    a5beeefb5489e73baaeb188e12fd0c35

    SHA1

    78283750e376da79a8e1733f4c3dec542b6b199b

    SHA256

    5db171401ceb22573bed41ed6165ca52b9fa85cb3fda5c56c7ecd9fc58e69a80

    SHA512

    82f0d3ca9085fa24f66926c668b12922f9aa307bd2e05c95c8d6c04e3e6312ae8281a7a2f6acd71f6ff904ed9a86fd0ae6532eec8bff053331fea6276c4d291f

  • C:\Users\Admin\AppData\Local\Temp\_MEI60602\api-ms-win-crt-heap-l1-1-0.dll

    Filesize

    21KB

    MD5

    541eda624ffdad82f13a9d27b879d4d2

    SHA1

    d457c5a9cfd7061a771428b9f81ed6951f74f3e8

    SHA256

    3ac1f5532746a357f53cf0f990471cc7ce20773f9b980a410def43be923591c6

    SHA512

    27246cf09933f24be03971e718fa0649476338aa7c7f1c57a8ecd57545896a05ff5e665f907c4ddb54a7fac8070a5adbe61c15537afd6c9024bafaf75e62a110

  • C:\Users\Admin\AppData\Local\Temp\_MEI60602\api-ms-win-crt-locale-l1-1-0.dll

    Filesize

    21KB

    MD5

    506bfcd82cf5974ec3a84141b0d39faf

    SHA1

    5d7af25f8ab532e619fd718df53c2c809a04f87c

    SHA256

    66da920d3714c8edb95040b0d7b10820d4b2cbd2ae069b3bcc5cbbba0dd921c3

    SHA512

    3a9632935584de7d5528f7b70d74aa1ae7390075762020e9d7b50ae0ba0cb5b8c4eb39b548f063f195e68252736c01412b1d36b9c76205f3855ce6bfecb127fa

  • C:\Users\Admin\AppData\Local\Temp\_MEI60602\api-ms-win-crt-math-l1-1-0.dll

    Filesize

    29KB

    MD5

    c2b0fe23853cbf21c418dd4665f11fb2

    SHA1

    56180da97997da8ec2a3ace346b59b2591f4a691

    SHA256

    f36c45c6e97435c37bf520ac394a230dbafbd2b97f2d7c05548f39c16668cf8d

    SHA512

    1508d4ca495431e74b506daaf7669d0ea48da9216b13beadbe8285c0cf227ab8165f2b3f32d421bc082135aebf508f7a9dd66e11770edbcbaf7b5455c985d1cb

  • C:\Users\Admin\AppData\Local\Temp\_MEI60602\api-ms-win-crt-process-l1-1-0.dll

    Filesize

    21KB

    MD5

    8ded0c3c86104bad38ae4719f73c19d6

    SHA1

    49426b52db7a3a958ed1dace2e125b83bc52de04

    SHA256

    4bd8d67e3ebb6266950cd7f362c5cee54cefd811ee3082529f7082c0aa174aeb

    SHA512

    83a29ee40e3b00dae2e00f08828951973aec795e2963ed0152b3043685c6cfad10100ffc08e30a6765882ee6580adb7c44f2cbae7c4773c13c529a52dc8c87de

  • C:\Users\Admin\AppData\Local\Temp\_MEI60602\api-ms-win-crt-runtime-l1-1-0.dll

    Filesize

    25KB

    MD5

    ab37f2c59a99e4737e414b2b51e354d5

    SHA1

    2569d71445c9f74f34eb2bc01a3018e396970af5

    SHA256

    ef524aee201048dcaca499e5b69dc93432972136f77002889fcfc1f6573f83d0

    SHA512

    b10c42eb3eb56052b8d4fb9549958db1560a9dd7ebb8c32eef4e238337d881fc6a9117c53046b247adc986ee17250338dac056bb2d98eb060acff011c18422f4

  • C:\Users\Admin\AppData\Local\Temp\_MEI60602\api-ms-win-crt-stdio-l1-1-0.dll

    Filesize

    25KB

    MD5

    9c62ba6e76a0b8c01a9e998b37fd55fc

    SHA1

    c2f266210342756af205285f96802e4b29a0416d

    SHA256

    63bd54f9e4231ea9b7ae5991a328a3581433abb02128f12652bb21592c9e4838

    SHA512

    9f238892c8be3281f9095333b0645278700d951b9756618c46e38cd36849ba37ab5ba9462d1c0f250d72bb193bf09a7b062da2308e83e8b7d6d8200d9de5b1d1

  • C:\Users\Admin\AppData\Local\Temp\_MEI60602\api-ms-win-crt-string-l1-1-0.dll

    Filesize

    25KB

    MD5

    56594b1d7cffbcdaa52add243efd9d9f

    SHA1

    0879b27583c81a970b0fb9007e8c3262c7de6879

    SHA256

    9eba5f87d8bc12edb0931f9db799891afaf8326ae9a3a2926725b6456e1aa0ae

    SHA512

    a326205f6f7e4073c0cc098b80670f3e977559de0f47c6d0b8d3451bfc855fc10eb518ba4365ebefd5cf2d008780427ed43cb7a98fbf9f1750e17bb6a74773d3

  • C:\Users\Admin\AppData\Local\Temp\_MEI60602\api-ms-win-crt-time-l1-1-0.dll

    Filesize

    21KB

    MD5

    da31c2eb8ff52a0419c1885f2d2c87cb

    SHA1

    1a3746a81b76c0a9e0a09ff5d12ae4650e094c69

    SHA256

    2da6176fc5272c941e39b86b892a73109a763697930de97431903892521f359d

    SHA512

    550efdd5d1dc390bba8b0a922692fae6086523275e76b77ee130b4838e8310aca00aa3cc502f0fe99d5a5532b15781a7391419ebb59ae6ab5f4603435307fbef

  • C:\Users\Admin\AppData\Local\Temp\_MEI60602\api-ms-win-crt-utility-l1-1-0.dll

    Filesize

    21KB

    MD5

    8301548a4eae2c8fbcbc69cb76944709

    SHA1

    e3303d54f45df85002c25eec547e8297aba2acc7

    SHA256

    cef434a44b9ed6833e3730d00e7c3b2094628964840390891d402e8c60716bd9

    SHA512

    5099c6f0a5ef0306009cd60bd0a4780a0bb1fdf74d48a85287e9c40463414a90e2b3f8ef21be14e2345dd5b3a820bb375f554c32eddc8594b8b5eda5641ea9af

  • C:\Users\Admin\AppData\Local\Temp\_MEI60602\base_library.zip

    Filesize

    1.3MB

    MD5

    09a3cf5242fb20f897c0cd8230cf4a3d

    SHA1

    c5af2e06aa995d111aa4c444d5bb9398eee70620

    SHA256

    e052589ebf188f6aba034133ae1a2725fa47183dda4bac242ba21c93c77a57c6

    SHA512

    43f1f1534de18c1e7102b48dbe7f46338a5386a92167b1321ffb5b6596dfa3acd96d30e50af4a00f88f4a1ead04cff87bbfc183205833f8c424bc2723813e668

  • C:\Users\Admin\AppData\Local\Temp\_MEI60602\blank.aes

    Filesize

    108KB

    MD5

    c88a29b262c17361fc6f99d6fe0e784c

    SHA1

    ace54517b7ef12c6b49ccaa6680df8c0932295dd

    SHA256

    5d36302732291c8b31417e7af24e0bf13714c1848da281109e46fc6b9129c767

    SHA512

    ef8f3d1e040c270bd3ed643d9490bc19c2f1fe7a99dbefc083a4b40f720206d43cffa4f1f1588c39df8dd11f456c7f76abe81d84c7f4e3ed7517fae109a545d3

  • C:\Users\Admin\AppData\Local\Temp\_MEI60602\libcrypto-3.dll

    Filesize

    1.6MB

    MD5

    8377fe5949527dd7be7b827cb1ffd324

    SHA1

    aa483a875cb06a86a371829372980d772fda2bf9

    SHA256

    88e8aa1c816e9f03a3b589c7028319ef456f72adb86c9ddca346258b6b30402d

    SHA512

    c59d0cbe8a1c64f2c18b5e2b1f49705d079a2259378a1f95f7a368415a2dc3116e0c3c731e9abfa626d12c02b9e0d72c98c1f91a359f5486133478144fa7f5f7

  • C:\Users\Admin\AppData\Local\Temp\_MEI60602\libffi-8.dll

    Filesize

    29KB

    MD5

    08b000c3d990bc018fcb91a1e175e06e

    SHA1

    bd0ce09bb3414d11c91316113c2becfff0862d0d

    SHA256

    135c772b42ba6353757a4d076ce03dbf792456143b42d25a62066da46144fece

    SHA512

    8820d297aeda5a5ebe1306e7664f7a95421751db60d71dc20da251bcdfdc73f3fd0b22546bd62e62d7aa44dfe702e4032fe78802fb16ee6c2583d65abc891cbf

  • C:\Users\Admin\AppData\Local\Temp\_MEI60602\libssl-3.dll

    Filesize

    221KB

    MD5

    b2e766f5cf6f9d4dcbe8537bc5bded2f

    SHA1

    331269521ce1ab76799e69e9ae1c3b565a838574

    SHA256

    3cc6828e7047c6a7eff517aa434403ea42128c8595bf44126765b38200b87ce4

    SHA512

    5233c8230497aadb9393c3ee5049e4ab99766a68f82091fe32393ee980887ebd4503bf88847c462c40c3fc786f8d179dac5cb343b980944ade43bc6646f5ad5a

  • C:\Users\Admin\AppData\Local\Temp\_MEI60602\python313.dll

    Filesize

    1.8MB

    MD5

    2a4aad7818d527bbea76e9e81077cc21

    SHA1

    4db3b39874c01bf3ba1ab8659957bbc28aab1ab2

    SHA256

    4712a6bb81b862fc292fcd857cef931ca8e4c142e70eaa4fd7a8d0a96aff5e7e

    SHA512

    d10631b7fc25a8b9cc038514e9db1597cec0580ee34a56ce5cfc5a33e7010b5e1df7f15ec30ebb351356e2b815528fb4161956f26b5bfaf3dce7bc6701b79c68

  • C:\Users\Admin\AppData\Local\Temp\_MEI60602\rar.exe

    Filesize

    615KB

    MD5

    9c223575ae5b9544bc3d69ac6364f75e

    SHA1

    8a1cb5ee02c742e937febc57609ac312247ba386

    SHA256

    90341ac8dcc9ec5f9efe89945a381eb701fe15c3196f594d9d9f0f67b4fc2213

    SHA512

    57663e2c07b56024aaae07515ee3a56b2f5068ebb2f2dc42be95d1224376c2458da21c965aab6ae54de780cb874c2fc9de83d9089abf4536de0f50faca582d09

  • C:\Users\Admin\AppData\Local\Temp\_MEI60602\rarreg.key

    Filesize

    456B

    MD5

    4531984cad7dacf24c086830068c4abe

    SHA1

    fa7c8c46677af01a83cf652ef30ba39b2aae14c3

    SHA256

    58209c8ab4191e834ffe2ecd003fd7a830d3650f0fd1355a74eb8a47c61d4211

    SHA512

    00056f471945d838ef2ce56d51c32967879fe54fcbf93a237ed85a98e27c5c8d2a39bc815b41c15caace2071edd0239d775a31d1794dc4dba49e7ecff1555122

  • C:\Users\Admin\AppData\Local\Temp\_MEI60602\select.pyd

    Filesize

    26KB

    MD5

    fbb31cb3990b267f9c5fb02d1aa21229

    SHA1

    cdae1c90d80c81927edb533fb5850c6efd541812

    SHA256

    8e2c5b74031b80a20bd16c149a389e60b3845d9719d97e030c42e9718cc08937

    SHA512

    af71f8be59d062cb4d095772e30ba63d0fef1e8285d549d7638c009cd67a2610f6d07e486e75f3eb1d94d8dc349d92b996f3ef83bd1d1c3617ac801d571be439

  • C:\Users\Admin\AppData\Local\Temp\_MEI60602\ucrtbase.dll

    Filesize

    1.1MB

    MD5

    3b337c2d41069b0a1e43e30f891c3813

    SHA1

    ebee2827b5cb153cbbb51c9718da1549fa80fc5c

    SHA256

    c04daeba7e7c4b711d33993ab4c51a2e087f98f4211aea0dcb3a216656ba0ab7

    SHA512

    fdb3012a71221447b35757ed2bdca6ed1f8833b2f81d03aabebd2cd7780a33a9c3d816535d03c5c3edd5aaf11d91156842b380e2a63135e3c7f87193ad211499

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_tis1mqeb.wza.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Temp\setup.exe

    Filesize

    539KB

    MD5

    7ead1f3b64b9b37955f9a12e9e271f51

    SHA1

    8b46ef9ab2b9c058352e1a55a61b550553ebbd8e

    SHA256

    c7403bcede469791b81581dbff6c723efd881e3beb9c36107e99f02e9a743f30

    SHA512

    e014bd928b9a02e20d7358d96cca75b66021e568539ddae0c157663a12a15957081723eb91ad2d0a4b16c064de7b658b1b231efcc060017da5e60856dcf621c9

  • C:\Users\Admin\AppData\Local\Temp\setupp.exe

    Filesize

    45KB

    MD5

    4d216ca434c287b5d2d2964c7f467658

    SHA1

    ce5b4653e2a2f1f688e3258188d411a45c504c5a

    SHA256

    cf03ad5b305b059507d1b157320c36dc00ca4b67de92a679d9525b2630d7c607

    SHA512

    92074ae5aff824fdb5f8c8797e6d615898fc022cedd5acfe6b7591cf40b852e245c2c697831e6b2557d9a58b9ae8d4f425299d667ded1babe96e6f90e399cdea

  • C:\Users\Admin\AppData\Local\Temp\setuppp.exe

    Filesize

    8.4MB

    MD5

    b89db2add9058b69e2159c607c7187c8

    SHA1

    342d45e338974a68719fcfa5b587d4125ed06705

    SHA256

    dc9dd5431fdb2fa302df9cf5c823cfd75cbcbf98e67cdda8cbbee00ebe4b88df

    SHA512

    63da5b7484705da8384452217b086928c8b9f254e42d7b90316fadea3558ec22a3efb531c9d05daa2369f89fb34db392648a998895e7d6e405ff88c9178f3eb6

  • memory/4256-201-0x00007FF83F9D0000-0x00007FF83F9DD000-memory.dmp

    Filesize

    52KB

  • memory/4256-210-0x00007FF82A930000-0x00007FF82A9E3000-memory.dmp

    Filesize

    716KB

  • memory/4256-137-0x00007FF82B440000-0x00007FF82BAA4000-memory.dmp

    Filesize

    6.4MB

  • memory/4256-142-0x00007FF83B7F0000-0x00007FF83B817000-memory.dmp

    Filesize

    156KB

  • memory/4256-190-0x00007FF842DC0000-0x00007FF842DCF000-memory.dmp

    Filesize

    60KB

  • memory/4256-198-0x00007FF82B410000-0x00007FF82B435000-memory.dmp

    Filesize

    148KB

  • memory/4256-199-0x00007FF82B290000-0x00007FF82B40F000-memory.dmp

    Filesize

    1.5MB

  • memory/4256-200-0x00007FF83BC10000-0x00007FF83BC29000-memory.dmp

    Filesize

    100KB

  • memory/4256-193-0x00007FF83B7C0000-0x00007FF83B7EB000-memory.dmp

    Filesize

    172KB

  • memory/4256-202-0x00007FF82B250000-0x00007FF82B283000-memory.dmp

    Filesize

    204KB

  • memory/4256-203-0x00007FF82B440000-0x00007FF82BAA4000-memory.dmp

    Filesize

    6.4MB

  • memory/4256-204-0x00007FF82B180000-0x00007FF82B24E000-memory.dmp

    Filesize

    824KB

  • memory/4256-205-0x000001C6D3F20000-0x000001C6D4453000-memory.dmp

    Filesize

    5.2MB

  • memory/4256-207-0x00007FF83B7F0000-0x00007FF83B817000-memory.dmp

    Filesize

    156KB

  • memory/4256-206-0x00007FF82AC40000-0x00007FF82B173000-memory.dmp

    Filesize

    5.2MB

  • memory/4256-208-0x00007FF83B7A0000-0x00007FF83B7B4000-memory.dmp

    Filesize

    80KB

  • memory/4256-209-0x00007FF83F830000-0x00007FF83F83D000-memory.dmp

    Filesize

    52KB

  • memory/4256-230-0x00007FF82B440000-0x00007FF82BAA4000-memory.dmp

    Filesize

    6.4MB

  • memory/4256-192-0x00007FF83BD70000-0x00007FF83BD89000-memory.dmp

    Filesize

    100KB

  • memory/4256-231-0x00007FF83B7F0000-0x00007FF83B817000-memory.dmp

    Filesize

    156KB

  • memory/4256-243-0x00007FF83F830000-0x00007FF83F83D000-memory.dmp

    Filesize

    52KB

  • memory/4256-242-0x00007FF83B7A0000-0x00007FF83B7B4000-memory.dmp

    Filesize

    80KB

  • memory/4256-244-0x00007FF82A930000-0x00007FF82A9E3000-memory.dmp

    Filesize

    716KB

  • memory/4256-245-0x00007FF82AC40000-0x00007FF82B173000-memory.dmp

    Filesize

    5.2MB

  • memory/4256-240-0x00007FF82B180000-0x00007FF82B24E000-memory.dmp

    Filesize

    824KB

  • memory/4256-239-0x00007FF82B250000-0x00007FF82B283000-memory.dmp

    Filesize

    204KB

  • memory/4256-238-0x00007FF83F9D0000-0x00007FF83F9DD000-memory.dmp

    Filesize

    52KB

  • memory/4256-237-0x00007FF83BC10000-0x00007FF83BC29000-memory.dmp

    Filesize

    100KB

  • memory/4256-236-0x00007FF82B290000-0x00007FF82B40F000-memory.dmp

    Filesize

    1.5MB

  • memory/4256-235-0x00007FF82B410000-0x00007FF82B435000-memory.dmp

    Filesize

    148KB

  • memory/4256-234-0x00007FF83B7C0000-0x00007FF83B7EB000-memory.dmp

    Filesize

    172KB

  • memory/4256-233-0x00007FF83BD70000-0x00007FF83BD89000-memory.dmp

    Filesize

    100KB

  • memory/4256-232-0x00007FF842DC0000-0x00007FF842DCF000-memory.dmp

    Filesize

    60KB

  • memory/4324-136-0x0000000000AC0000-0x0000000000AD2000-memory.dmp

    Filesize

    72KB

  • memory/4532-216-0x0000013643950000-0x0000013643972000-memory.dmp

    Filesize

    136KB