Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220331-en
  • submitted
    08-04-2022 12:59

General

  • Target

    c04c112d33bdc2f8f333e9d64e4b8a7daa14d3f6df84e5c3860866af48a1421d.docm

  • Size

    526KB

  • MD5

    b3a054e49f4d87490a8208a801567112

  • SHA1

    d038a9bc0564167a299abe43382eb6c3ef6ee88e

  • SHA256

    c04c112d33bdc2f8f333e9d64e4b8a7daa14d3f6df84e5c3860866af48a1421d

  • SHA512

    b9082cc341e8b85c4755095e741cc1e83f79194d8bc801cf97933fac712e9d3198409534fcb76f011f97c0b8e88f03a164d37791020f9e75503e5713e859440d

Score
10/10

Malware Config

Extracted

Family

gozi_rm3

Attributes
  • build

    300994

rsa_pubkey.base64

Signatures

  • Gozi RM3

    A heavily modified version of Gozi using RM3 loader.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Downloads MZ/PE file
  • Loads dropped DLL 1 IoCs
  • Uses Tor communications 1 TTPs

    Malware can proxy its traffic through Tor for more anonymity.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Runs net.exe
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 11 IoCs
  • Suspicious use of SetWindowsHookEx 52 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\c04c112d33bdc2f8f333e9d64e4b8a7daa14d3f6df84e5c3860866af48a1421d.docm" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4820
    • C:\Windows\SYSTEM32\rundll32.exe
      rundll32 "C:\Users\Admin\AppData\Local\Temp\y6D16.tmp.dll",DllRegisterServer
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:4768
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32 "C:\Users\Admin\AppData\Local\Temp\y6D16.tmp.dll",DllRegisterServer
        3⤵
        • Loads dropped DLL
        PID:4172
  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3056
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c start /min forfiles /c "cmd /k @path -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwARQB4AHAAbABvAHIAZQByAG0AYQBnACcAKQAuAEEA & exit" /p C:\Windows\system32 /s /m po*l.e*e
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3384
        • C:\Windows\system32\forfiles.exe
          forfiles /c "cmd /k @path -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwARQB4AHAAbABvAHIAZQByAG0AYQBnACcAKQAuAEEA & exit" /p C:\Windows\system32 /s /m po*l.e*e
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2604
          • C:\Windows\system32\cmd.exe
            /k "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwARQB4AHAAbABvAHIAZQByAG0AYQBnACcAKQAuAEEA & exit
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4588
            • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
              C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwARQB4AHAAbABvAHIAZQByAG0AYQBnACcAKQAuAEEA
              5⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:3280
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -E JwBwAGEAcgBhAG0AKAAkAGgAcgBoAGMAZQB3AGQAYQB4AGUAKQA7AFsAUwB5AHMAdABlAG0ALgBDAG8AbgB2AGUAcgB0AF0AOgA6AEYAcgBvAG0AQgBhAHMAZQA2ADQAUwB0AHIAaQBuAGcAKAAkAGgAcgBoAGMAZQB3AGQAYQB4AGUAKQAnAA==
                6⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:388
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -E JwBwAGEAcgBhAG0AKAAkAGQAZgBvAG0AaABlAGwAcwBvAGgAKQA7AFsAUwB5AHMAdABlAG0ALgBUAGUAeAB0AC4ARQBuAGMAbwBkAGkAbgBnAF0AOgA6AEEAUwBDAEkASQAuAEcAZQB0AFMAdAByAGkAbgBnACgAJABkAGYAbwBtAGgAZQBsAHMAbwBoACkAJwA=
                6⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:3452
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\31j54ajo\31j54ajo.cmdline"
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:3876
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                  C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1925.tmp" "c:\Users\Admin\AppData\Local\Temp\31j54ajo\CSC4D225D715C1A459D8CEFE1BC3341DF6.TMP"
                  7⤵
                    PID:4192
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                  "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\05cyzmnd\05cyzmnd.cmdline"
                  6⤵
                  • Suspicious use of WriteProcessMemory
                  PID:4336
                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1BD5.tmp" "c:\Users\Admin\AppData\Local\Temp\05cyzmnd\CSCE5EFFF1DEE9F4D4D975913CB32DDE89E.TMP"
                    7⤵
                      PID:4344
          • C:\Windows\system32\cmd.exe
            cmd /C "net session" >> C:\Users\Admin\AppData\Local\Temp\B2DC.bin0
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:64
            • C:\Windows\system32\net.exe
              net session
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:2468
              • C:\Windows\system32\net1.exe
                C:\Windows\system32\net1 session
                4⤵
                  PID:4448
            • C:\Windows\system32\cmd.exe
              cmd /U /C "type C:\Users\Admin\AppData\Local\Temp\B2DC.bin0 > C:\Users\Admin\AppData\Local\Temp\B2DC.bin & del C:\Users\Admin\AppData\Local\Temp\B2DC.bin0"
              2⤵
                PID:3684
              • C:\Windows\system32\iexpress.exe
                iexpress.exe /n /q /m C:\Users\Admin\AppData\Local\Temp\E734.bin
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:5076
                • C:\Windows\system32\makecab.exe
                  C:\Windows\system32\makecab.exe /f "C:\Users\Admin\~Arclogic.DDF"
                  3⤵
                    PID:3864
              • C:\Program Files (x86)\Internet Explorer\ielowutil.exe
                "C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding
                1⤵
                  PID:4508
                • C:\Program Files\Internet Explorer\iexplore.exe
                  "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
                  1⤵
                  • Modifies Internet Explorer settings
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:2056
                  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2056 CREDAT:17410 /prefetch:2
                    2⤵
                    • Modifies Internet Explorer settings
                    • Suspicious use of SetWindowsHookEx
                    PID:616
                  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2056 CREDAT:82948 /prefetch:2
                    2⤵
                    • Modifies Internet Explorer settings
                    • Suspicious use of SetWindowsHookEx
                    PID:4560
                  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2056 CREDAT:17414 /prefetch:2
                    2⤵
                    • Modifies Internet Explorer settings
                    • Suspicious use of SetWindowsHookEx
                    PID:3308
                  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2056 CREDAT:17416 /prefetch:2
                    2⤵
                    • Modifies Internet Explorer settings
                    • Suspicious use of SetWindowsHookEx
                    PID:932
                  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2056 CREDAT:82954 /prefetch:2
                    2⤵
                    • Modifies Internet Explorer settings
                    • Suspicious use of SetWindowsHookEx
                    PID:1004
                  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2056 CREDAT:82956 /prefetch:2
                    2⤵
                    • Modifies Internet Explorer settings
                    • Suspicious use of SetWindowsHookEx
                    PID:4124
                  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2056 CREDAT:17422 /prefetch:2
                    2⤵
                    • Modifies Internet Explorer settings
                    • Suspicious use of SetWindowsHookEx
                    PID:3816
                  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2056 CREDAT:82960 /prefetch:2
                    2⤵
                    • Modifies Internet Explorer settings
                    • Suspicious use of SetWindowsHookEx
                    PID:3916
                  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2056 CREDAT:17426 /prefetch:2
                    2⤵
                    • Modifies Internet Explorer settings
                    • Suspicious use of SetWindowsHookEx
                    PID:3596
                  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2056 CREDAT:82964 /prefetch:2
                    2⤵
                    • Modifies Internet Explorer settings
                    • Suspicious use of SetWindowsHookEx
                    PID:3988
                  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2056 CREDAT:82966 /prefetch:2
                    2⤵
                    • Modifies Internet Explorer settings
                    • Suspicious use of SetWindowsHookEx
                    PID:3880

                Network

                MITRE ATT&CK Enterprise v6

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

                  Filesize

                  717B

                  MD5

                  54e9306f95f32e50ccd58af19753d929

                  SHA1

                  eab9457321f34d4dcf7d4a0ac83edc9131bf7c57

                  SHA256

                  45f94dceb18a8f738a26da09ce4558995a4fe02b971882e8116fc9b59813bb72

                  SHA512

                  8711a4d866f21cdf4d4e6131ec4cfaf6821d0d22b90946be8b5a09ab868af0270a89bc326f03b858f0361a83c11a1531b894dfd1945e4812ba429a7558791f4f

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

                  Filesize

                  192B

                  MD5

                  a492ccea224253b98abcf2f9fc92503a

                  SHA1

                  99d3513a3283046809b22c40a6a383def2db3fb8

                  SHA256

                  cd76b3da88c7c4ebc6af73012fb6436c2eb678cda351564d96503bbe7509a87e

                  SHA512

                  231667ed3dbbab7f6371b5e12bf720c4bf027c0b0e2ac505e8b3fb9f5402f6a8bc6d60d244fb14f0e84e764e4ad3c0b5edb7576de0657da99fd82aebf28247a2

                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                  Filesize

                  2KB

                  MD5

                  d85ba6ff808d9e5444a4b369f5bc2730

                  SHA1

                  31aa9d96590fff6981b315e0b391b575e4c0804a

                  SHA256

                  84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                  SHA512

                  8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\1mvpbnk\imagestore.dat

                  Filesize

                  430B

                  MD5

                  f9ce046917310d1cef3852cbe88c1787

                  SHA1

                  ea61b56dcba9f854d4254856c217812e8a2acea6

                  SHA256

                  2a248cb230bf38471560c640047d71f08c6c7b4fc7617616809a9c3eb8372f90

                  SHA512

                  1036690709599f535c8b8c333d15ed046e6c7f16f92d401db6820b4a01df452f9ae3f44d311e2e8ec563dfe0adfbc13a11874fba42dcca4e82b024de466e3d66

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\861E6A62\favicon[2].ico

                  Filesize

                  318B

                  MD5

                  a976d227e5d1dcf62f5f7e623211dd1b

                  SHA1

                  a2a9dc1abdd3d888484678663928cb024c359ee6

                  SHA256

                  66332859bd8e3441a019e073a318b62a47014ba244121301034b510dc7532271

                  SHA512

                  6754d545f2ce095cfa1fa7ca9e3223f89e37726ee7e541ebcf3e209e18b2602f3be8677598cb30d697327a63de032c11dbf8ef7ad7889a79c488a21044c1cb3f

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                  Filesize

                  64B

                  MD5

                  5caad758326454b5788ec35315c4c304

                  SHA1

                  3aef8dba8042662a7fcf97e51047dc636b4d4724

                  SHA256

                  83e613b6dc8d70e3bb67c58535e014f58f3e8b2921e93b55137d799fc8c56391

                  SHA512

                  4e0d443cf81e2f49829b0a458a08294bf1bdc0e38d3a938fb8274eeb637d9a688b14c7999dd6b86a31fcec839a9e8c1a9611ed0bbae8bd59caa9dba1e8253693

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                  Filesize

                  1KB

                  MD5

                  9b53429e28f910e125239e95e23ef267

                  SHA1

                  8963b2eb63e21642545b2a023e7fb41332a23e13

                  SHA256

                  20f516fc915cd85d967a78663cdc344b70d99fcb79fc0f96bb199def8c7b4cd2

                  SHA512

                  db592560dc8c20866634be7cc0a576873e5e0efab6d8ba700eb5a822aa8fc409a337a474320df161bb45503608a6065664a15d685dc04994960706d5bc986055

                • C:\Users\Admin\AppData\Local\Temp\05cyzmnd\05cyzmnd.dll

                  Filesize

                  3KB

                  MD5

                  46341844b0c2ce3fbbbfe495231a2ba2

                  SHA1

                  4407f906686061ead8bbb6ffec4d7f71870281b1

                  SHA256

                  201d1e27ed628035d7228ed0ccc1a7bb91ea6704aaf183f5acaef8efe3fa0d33

                  SHA512

                  9bc40cfbd017c17815c8e27dbaad07658200ce50f07bbe4b249367c3ab4b381438baa74cfd324558d345119ae9263a93aab98d4bcd82bba846e83ff571104110

                • C:\Users\Admin\AppData\Local\Temp\31j54ajo\31j54ajo.dll

                  Filesize

                  3KB

                  MD5

                  2b1b913a7fd146638b40656e325342c9

                  SHA1

                  01f4cde7c41d6860ed41374f4a0f3ec32d46e582

                  SHA256

                  332bd0a19ad6dab99f4c35a965c24dd4f4fed2e1aa49d642c8ba42987e09ac99

                  SHA512

                  3028d0775d0ece45b2b9fadebd5ea73366f9beaf16079ec0681b12f5f8eb56fd3034394440b3909e1053d11a23a1cd04432e0f10b9606db2896569fe5ed59e8d

                • C:\Users\Admin\AppData\Local\Temp\B2DC.bin0

                  Filesize

                  37B

                  MD5

                  768165e0abf16bf3056836d5431a7296

                  SHA1

                  9fb3196be60e49bfc319ebd9e0b103954d711e34

                  SHA256

                  b44c505b721e93e2a596577018cc65b993cd632b9fe7620a4b3db54031afff5d

                  SHA512

                  1250ec40ba20f39a5b9a3aafd45c63cb6f1bf48b89acce1f885470c936fb48a803081943c68458ba1adce92d5fe79d3e45682285f56ecb29884d41974269992d

                • C:\Users\Admin\AppData\Local\Temp\RES1925.tmp

                  Filesize

                  1KB

                  MD5

                  1407f40160d6c0ce2144b20189e7f171

                  SHA1

                  c9ed5e7d7f70fc0bd5764121a07812f555fbdfb3

                  SHA256

                  991c08ab3ee1ca95946e95dd847cf5c7ad2fb3cf254a4daba6731111309389f1

                  SHA512

                  3b54a154e8bb3d2e23c80e7ab0b59a4029bc821a58acab30617d9c588045227f97bf17ce47222a3c8f7435129f753c5caa7e4fa1b69391b44d78b5ee611e019c

                • C:\Users\Admin\AppData\Local\Temp\RES1BD5.tmp

                  Filesize

                  1KB

                  MD5

                  69396bb21fc12ceda323b861b4dc4691

                  SHA1

                  aae877a93fe7c2e32077959acdd2d1cb0165bcbf

                  SHA256

                  d9b044124f5f171e798384913f38b16662f2d19a0db30efb8c159f46fad79de2

                  SHA512

                  437a6d4d6197bf87726e3a8acc5b47f8d565825af9954815d91995c9bedc07680cc0a1a1fadf9d8a28abafc42fc26b4b819ed9e7d24a4bba78880436c7597fee

                • C:\Users\Admin\AppData\Local\Temp\y6D16.tmp.dll

                  Filesize

                  151KB

                  MD5

                  55ab2f304f8c2da30aeee7713a95064d

                  SHA1

                  aae939cf3995905399e427097fc90c5b62f3d4c3

                  SHA256

                  41ae907a2bb73794bb2cff40b429e62305847a3e1a95f188b596f1cf925c4547

                  SHA512

                  08bbf78b4154f725399055dfb8a4338ce873297af847a5e30c8b6708e44feeae071fbf7efff9ff2c0b397fdffec5ca52a9591f742092a8f50287e54ce89307d3

                • C:\Users\Admin\AppData\Local\Temp\y6D16.tmp.dll

                  Filesize

                  151KB

                  MD5

                  55ab2f304f8c2da30aeee7713a95064d

                  SHA1

                  aae939cf3995905399e427097fc90c5b62f3d4c3

                  SHA256

                  41ae907a2bb73794bb2cff40b429e62305847a3e1a95f188b596f1cf925c4547

                  SHA512

                  08bbf78b4154f725399055dfb8a4338ce873297af847a5e30c8b6708e44feeae071fbf7efff9ff2c0b397fdffec5ca52a9591f742092a8f50287e54ce89307d3

                • C:\Users\Admin\~Arclogic.CAB

                  Filesize

                  135B

                  MD5

                  aa3ef2d4e5db756358ad6f37527d172a

                  SHA1

                  3739622948c6033859dfd0b973872526023b13eb

                  SHA256

                  d0d424f7130d5f73861e03546ec986e3b2ba8adab0db3b23acd7925fe047afd7

                  SHA512

                  319cc2cbec6153bb3c25e59dd6d02b5f097bf06a9d6a7a7daa8fadcd87dd084ea932b0fe5be187ac0c8815d6f54d1ad344334b6cc718c36ac829c146f0414a27

                • C:\Users\Admin\~Arclogic.DDF

                  Filesize

                  770B

                  MD5

                  42098c248200706615adc0cadb882dce

                  SHA1

                  e3521041a2fc66fd08fda1c64a3fe44997fb0592

                  SHA256

                  0cd65afe4b9608f12cdd0bc0a9f54440de8a8ed7b361b1d3f83c53ed590b3851

                  SHA512

                  5b87d19a2d7ed75d716b13f78688936be03f965e9b92b14b8b54b0c7714085251731c0dd78416874a604b875dc7bf5b86241d3a5d1d512a7976bb9ff6b15704c

                • C:\Users\Admin\~Arclogic.RPT

                  Filesize

                  283B

                  MD5

                  9c41e51dcfd23fa9c7df3baa94e5e8b7

                  SHA1

                  1fd1fb7e82ab0220823d7de0e1b336817004d7f6

                  SHA256

                  a6d759a91bf9c4a63acf914516d3e819ee15e0c394eafe7f73b0e9bda5cb2f8e

                  SHA512

                  09bdb7016f4cb5f4c140135f162f540878cd8d65cd311dd7b3bfccff630a1033815e131bcc90e235f66d787e8cb85d8e26602861ee680ee07367d9b03efed561

                • C:\Users\Admin\~Arclogic_LAYOUT.INF

                  Filesize

                  966B

                  MD5

                  32fdfa04ec4ba48448fa93aeb6b30081

                  SHA1

                  6f99145e37a24f2dc0bdf0e3564db53933911d5d

                  SHA256

                  eb50a213f07df5973017da5e047cf422e2eda085029cbb15cbb86588257ed520

                  SHA512

                  9b92545d11cbd5f1d0ac74823217ee136f7000ea78855e08cbeca8ac233fdc6bab39d63f60f51f5f69a4aa8515f9d2339b9b647ce943c8a4162c8e7fc61821b9

                • \??\c:\Users\Admin\AppData\Local\Temp\05cyzmnd\05cyzmnd.0.cs

                  Filesize

                  416B

                  MD5

                  e991aa9d35bfffc8f1e0d5dcf4c95ed1

                  SHA1

                  02d81b5b8cfd7b25d4fa0dab40d6ce6db3129501

                  SHA256

                  2598df56dcfc916eb9ae7b571c67d2feb92740843e36caccf9df705c03145265

                  SHA512

                  e0205253f43832674a3ea5dbe376e82fe0a59722ca10bed0184ff8fa298111957437db32aefb725b8c525f62aa8c7bc14922fa665ec9ced0d465d91837da126b

                • \??\c:\Users\Admin\AppData\Local\Temp\05cyzmnd\05cyzmnd.cmdline

                  Filesize

                  369B

                  MD5

                  40e47278c108d2901a273c5f49bdf431

                  SHA1

                  59903b062fbbaf40b7b3de7d991e0ce69b04853b

                  SHA256

                  ae9fa5d564920eacfdfaed0c6a9f4fe555c7267b8a93d0da97505896ead26072

                  SHA512

                  3dd2a54459788bebd6bbe864f11ac953a96083a23bff03a63c601a784f81ff2d59ca4cb41cf3331794b54ebf8261b1e15a8a46cc133f76afe61e4826df6e7707

                • \??\c:\Users\Admin\AppData\Local\Temp\05cyzmnd\CSCE5EFFF1DEE9F4D4D975913CB32DDE89E.TMP

                  Filesize

                  652B

                  MD5

                  28db40815034abfe3e669e55360b0f81

                  SHA1

                  295b13af11e3604a73c76a64164d345459a430bc

                  SHA256

                  076814d6f5f74f53a4a49d0a2b024aada24de418e3ff0870009e4f758f8d78e4

                  SHA512

                  e2a398596aad4e38fac5dbc1ec98645da0bc3097152e6d40f1313b64288dbe85550d14988b44281c81ac2a772c932e0ec24a5cb240cb36b25d55038ffc8b2870

                • \??\c:\Users\Admin\AppData\Local\Temp\31j54ajo\31j54ajo.0.cs

                  Filesize

                  417B

                  MD5

                  cdc42ce046de74fa8cb97234640cfcc5

                  SHA1

                  8a6aa5bda682fbb11bc974d752408593aec799cc

                  SHA256

                  7fca4a3b3889149b375ce11cd1614298a244c05e3dd5fa343be56986aaa675c5

                  SHA512

                  c2663ca8817dc7a375c06cfc4adb529ab61b098663a550feba5dabe8b9c6269a5e878419d5198cb463b9c6b4d5acb504587ffd5721eab568068a7e9d45d55d13

                • \??\c:\Users\Admin\AppData\Local\Temp\31j54ajo\31j54ajo.cmdline

                  Filesize

                  369B

                  MD5

                  67058a8e45fe9a8a9c759c0a09045547

                  SHA1

                  282e38fae6a62c46742104f2766fb5bf19e5d82e

                  SHA256

                  5b5fe6e2ea8ba043362a0e1fc5478ef96183405dff4c983ffb66964a4b5439e4

                  SHA512

                  a6d5d0f538076f48d80b26a992e3e9b2e22ab42f90fe987ec66da46b1dbc1156bbf492c84b8eb7419fcbe0eaedf31381ea7a3457be183e2a3ea3d1fbdb49d756

                • \??\c:\Users\Admin\AppData\Local\Temp\31j54ajo\CSC4D225D715C1A459D8CEFE1BC3341DF6.TMP

                  Filesize

                  652B

                  MD5

                  c875cfd95f9d0a70a2e100267192e825

                  SHA1

                  0a1ea2009703f27850042f70821591cb1c4cd619

                  SHA256

                  0eb5a4768618ff12487464c94f15c6cc8b4002ef3bfb4394ee22da6b443385b2

                  SHA512

                  0a6b87bc1b503f37a7c0933a688f88db5dec7ca6fb70a01fc1af3c8a22d379655898ee062d572f5c255fb84a5f6553d132b7151e93e9c73a0615cfbb4c90e4a1

                • memory/388-155-0x00007FF949490000-0x00007FF949F51000-memory.dmp

                  Filesize

                  10.8MB

                • memory/3280-180-0x000001CB69A70000-0x000001CB69A83000-memory.dmp

                  Filesize

                  76KB

                • memory/3280-160-0x000001CB677F3000-0x000001CB677F5000-memory.dmp

                  Filesize

                  8KB

                • memory/3280-153-0x000001CB696D0000-0x000001CB696F2000-memory.dmp

                  Filesize

                  136KB

                • memory/3280-158-0x00007FF949490000-0x00007FF949F51000-memory.dmp

                  Filesize

                  10.8MB

                • memory/3280-159-0x000001CB677F0000-0x000001CB677F2000-memory.dmp

                  Filesize

                  8KB

                • memory/3280-161-0x000001CB677F6000-0x000001CB677F8000-memory.dmp

                  Filesize

                  8KB

                • memory/3452-164-0x0000022AF40A3000-0x0000022AF40A5000-memory.dmp

                  Filesize

                  8KB

                • memory/3452-162-0x00007FF949490000-0x00007FF949F51000-memory.dmp

                  Filesize

                  10.8MB

                • memory/3452-163-0x0000022AF40A0000-0x0000022AF40A2000-memory.dmp

                  Filesize

                  8KB

                • memory/4172-140-0x00000000007B0000-0x00000000007C0000-memory.dmp

                  Filesize

                  64KB

                • memory/4172-135-0x0000000010000000-0x000000001000F000-memory.dmp

                  Filesize

                  60KB

                • memory/4820-130-0x0000022316650000-0x000002231668F000-memory.dmp

                  Filesize

                  252KB

                • memory/4820-124-0x00007FF937E90000-0x00007FF937EA0000-memory.dmp

                  Filesize

                  64KB

                • memory/4820-129-0x000002231234A000-0x00000223123C3000-memory.dmp

                  Filesize

                  484KB

                • memory/4820-128-0x00007FF937E90000-0x00007FF937EA0000-memory.dmp

                  Filesize

                  64KB

                • memory/4820-127-0x00007FF937E90000-0x00007FF937EA0000-memory.dmp

                  Filesize

                  64KB

                • memory/4820-125-0x00007FF937E90000-0x00007FF937EA0000-memory.dmp

                  Filesize

                  64KB

                • memory/4820-126-0x00007FF937E90000-0x00007FF937EA0000-memory.dmp

                  Filesize

                  64KB