Resubmissions

29-03-2023 05:23

230329-f3ey5age3t 1

29-03-2023 05:06

230329-frr5bagd9s 1

Analysis

  • max time kernel
    498s
  • max time network
    502s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-es
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-eslocale:es-esos:windows10-2004-x64systemwindows
  • submitted
    29-03-2023 05:06

General

  • Target

    RS_MissingPatchCache.ps1

  • Size

    11KB

  • MD5

    09343a5f4abec165faef3f574d4dde03

  • SHA1

    1bd223b390e8f10a7859cd093ffa028b4f484ff3

  • SHA256

    e56c4a6e00d206c88399257ee93f20a9862dd52eceeb5c8a627509c274516b54

  • SHA512

    8bd1cf13d7ce0a6e534aedca328019cd97e83e78094f92e3df4eeab76dddce85868d487e21a419bf0dc1659c9a6e7e0a38a2f8a9b0f1ceff3d64639192fec36d

  • SSDEEP

    192:jd0/OrwjHUlsYuD9kYGIdRQwHx7cprxi8RZkeuYT1bLKRoguwCsXsoz+ppjGAw7b:jyWrwoK9kYTYU7Mrw8Rme/T1bOw7gs3k

Score
1/10

Malware Config

Signatures

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\RS_MissingPatchCache.ps1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4680
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\shzqmuc1\shzqmuc1.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4404
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES982E.tmp" "c:\Users\Admin\AppData\Local\Temp\shzqmuc1\CSC16AE398C9BCB4CA392362C59E5C3376.TMP"
        3⤵
          PID:3828
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\hiqa5cbo\hiqa5cbo.cmdline"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:208
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9966.tmp" "c:\Users\Admin\AppData\Local\Temp\hiqa5cbo\CSC4C518C85EFA4A5A8CB688E38AF7FEA8.TMP"
          3⤵
            PID:112
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\do2mxiqa\do2mxiqa.cmdline"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:3652
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
            C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9A41.tmp" "c:\Users\Admin\AppData\Local\Temp\do2mxiqa\CSC1D4FD52AE10D4243911FE1397E605399.TMP"
            3⤵
              PID:3204
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\1y4ubsbo\1y4ubsbo.cmdline"
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:5116
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9C54.tmp" "c:\Users\Admin\AppData\Local\Temp\1y4ubsbo\CSC1C66B5523B414701B9E7EE71BD59051.TMP"
              3⤵
                PID:4496
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
              "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\p1mtgapk\p1mtgapk.cmdline"
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:3632
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9DFA.tmp" "c:\Users\Admin\AppData\Local\Temp\p1mtgapk\CSC1FACEA4B7AD94F6187E6A2581647245F.TMP"
                3⤵
                  PID:3508
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\vodooegq\vodooegq.cmdline"
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:900
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                  C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9F90.tmp" "c:\Users\Admin\AppData\Local\Temp\vodooegq\CSC1F522C9DCCBB44F6A5535DCC5CB1E08F.TMP"
                  3⤵
                    PID:1628
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                  "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ptvnt0zh\ptvnt0zh.cmdline"
                  2⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1528
                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA1F2.tmp" "c:\Users\Admin\AppData\Local\Temp\ptvnt0zh\CSC795A92C995144CFD8B3646E935E04E5A.TMP"
                    3⤵
                      PID:3400
                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                    "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\z033kwdo\z033kwdo.cmdline"
                    2⤵
                    • Suspicious use of WriteProcessMemory
                    PID:3532
                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA28E.tmp" "c:\Users\Admin\AppData\Local\Temp\z033kwdo\CSC4EDA7A11E0FC4431B0C8EB8ADAF265B.TMP"
                      3⤵
                        PID:4208
                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\q2ismvol\q2ismvol.cmdline"
                      2⤵
                      • Suspicious use of WriteProcessMemory
                      PID:4564
                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA398.tmp" "c:\Users\Admin\AppData\Local\Temp\q2ismvol\CSC89AE5822AD684D72BA3FEF43A3F516A.TMP"
                        3⤵
                          PID:2948
                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\c2smuwqe\c2smuwqe.cmdline"
                        2⤵
                        • Suspicious use of WriteProcessMemory
                        PID:4400
                        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA4B1.tmp" "c:\Users\Admin\AppData\Local\Temp\c2smuwqe\CSCAC54210D7AC441ACA77C46278372ECE4.TMP"
                          3⤵
                            PID:4500
                      • C:\Windows\system32\vssvc.exe
                        C:\Windows\system32\vssvc.exe
                        1⤵
                        • Checks SCSI registry key(s)
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4508
                      • C:\Windows\system32\srtasks.exe
                        C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:3
                        1⤵
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1540

                      Network

                      MITRE ATT&CK Enterprise v6

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Temp\1y4ubsbo\1y4ubsbo.dll

                        Filesize

                        4KB

                        MD5

                        fdd1557d1c3631d676a86668224c1ffa

                        SHA1

                        4d6ef25e0e0e9bb3026a541ff070cfe33fc999ce

                        SHA256

                        240237775f5c868379dec92ff244983780ce0cab5aa96c57b8085b3e717303bb

                        SHA512

                        55a4096ca296265eb95ceedac7553dcd2739f0c192f3e467ecad00ae165ebba936a674a1923292e7e7f1876e82b11c4d7984211a8b78c0c144a054f6cd84479c

                      • C:\Users\Admin\AppData\Local\Temp\RES982E.tmp

                        Filesize

                        1KB

                        MD5

                        7ae20cd557629b4797bbdeca15107212

                        SHA1

                        d6777c77d616e3b9d932aec3c89081ded28775b6

                        SHA256

                        787bc1a003b677d1b97c4261ad3a0d52f2ea2e1580550cb69de462cdf3db8830

                        SHA512

                        d1779f2e32353b114c1b588a1fae881d4f819f911f1d54cdcc36986fbea5601bf5eb2b55fb10713b9e0f2612c73feb3a45b59d77d349d10f63bff12067a7cb3a

                      • C:\Users\Admin\AppData\Local\Temp\RES9966.tmp

                        Filesize

                        1KB

                        MD5

                        51465fa2b296294ca174167df76d72ea

                        SHA1

                        fdc2200380bc5b8cbf4eb8a42d01338b13c50bc7

                        SHA256

                        5a53c3b23aa91ab56c5d936b60da7f8f953d359a960a0a33b7b11f4072a14a86

                        SHA512

                        10eae88c805be34df0acb57ca2795595815eab81bd5020f77dba03ef6d799415999b21bca590d45a6c78953dfee654b6b20fbbe76fdfe80f9c4ed2bf81e6aa4a

                      • C:\Users\Admin\AppData\Local\Temp\RES9A41.tmp

                        Filesize

                        1KB

                        MD5

                        7abbdec0ad94105c3ef7efe01c547eae

                        SHA1

                        f91ab20b982870b0f7fde9259aa2e281140c4503

                        SHA256

                        9b90c542455e49d545807512fba78d814637953f5e4cef942cf57687812cad4d

                        SHA512

                        d98a80ac28157c689d24212a419717ca495b1b02141646c0b13f45ddb53b7809be760d52c001eb85f20e7318eac3ca75dccda3000dd4260aa2f838b460fe0df0

                      • C:\Users\Admin\AppData\Local\Temp\RES9C54.tmp

                        Filesize

                        1KB

                        MD5

                        ab6800366209d5cc558669284e3f493c

                        SHA1

                        b9df882c3d8c0e7f9cb483964d32e287ac078115

                        SHA256

                        7333baed170ff724883174094dbc4a08266bb2f5d81a11fe9867b752dfe9f74b

                        SHA512

                        402fcd4c70e3c7203accd6976e8eac26d2370e9a1c01dfe1de65cf92ae9ae51407b93c6c8d652fae930181121c4384ac47df33ebf2e15e471c80ca79655f55ed

                      • C:\Users\Admin\AppData\Local\Temp\RES9DFA.tmp

                        Filesize

                        1KB

                        MD5

                        c3f09882582b509cf157d1fb5640616a

                        SHA1

                        4afa0d4bbd2375d7269d91140ba71b4939a0dd84

                        SHA256

                        55158b041cd71c62cc14f5856ff4f36942351f4f057b5c1e3a38f9be6f88bf58

                        SHA512

                        8dfb44755b83e9de1e645b618270b86a899ea8142c73966dbfa75e2da323053c36c3a8525370199409ccb389aed909d768aa818f12296643d86e5ebf2f1b7b77

                      • C:\Users\Admin\AppData\Local\Temp\RES9F90.tmp

                        Filesize

                        1KB

                        MD5

                        51ed2c32bea4657642ac0c8a21c0605c

                        SHA1

                        b431223129ae46df1a7e5498fcbf031398e02b7b

                        SHA256

                        44b345f2d5903f916c9fb2d54364fc6fe496f25a83d1ee7149628a59b9492611

                        SHA512

                        2a45d0647ade8efb36126cad6d7e9b47b624cc16f926340a43a7638a89263832aeddfd669df06b461e5f2af85c1d379b67507a64502c80a939ce52ce2e5d1ae0

                      • C:\Users\Admin\AppData\Local\Temp\RESA1F2.tmp

                        Filesize

                        1KB

                        MD5

                        e2f7780399183b9f57d8add04028fe65

                        SHA1

                        b49e0c75e4ec3c128f637e330b66dc361cec122a

                        SHA256

                        6aeff020c9d299b0f021c84341d4fcef175f9d7fb752357e709100cd01cf5031

                        SHA512

                        793af4b2785e88c5529cf04c659deb77321c150c638195ba128efe020af0d92aecaeb48f752ceb97539b5ca9d053ddbf92144e148a176e8f10ed4a9418e12fe7

                      • C:\Users\Admin\AppData\Local\Temp\RESA28E.tmp

                        Filesize

                        1KB

                        MD5

                        d23bec4a82d30636e2ac91006436faf5

                        SHA1

                        b700cb66bf21198c0bbf1414d32a3610260eda29

                        SHA256

                        d981d9f70d85b1e20ba6a0c0ec286fe84b003ae0de7d8fb182601feaed81acad

                        SHA512

                        fb0ca63bd7b4dec4607f8d42206750a666c5d2151579115f42b7bce87376355916d85d62ba6e652b7abdfe646bba2e966a9260b5b9ddf0e15b216b5f884a9e43

                      • C:\Users\Admin\AppData\Local\Temp\RESA398.tmp

                        Filesize

                        1KB

                        MD5

                        ac177aa48b045964294160a28fc761ee

                        SHA1

                        4f6b6edefdb24dd6abfa3d3950419b3dcd25929f

                        SHA256

                        b986c8817d91bba4297dff58f0e0ced841e9856219bb4eaeecbbe9e0f0edbc46

                        SHA512

                        0a73d9e3474157f5c9410aa05f7202592f1bf5e15b134f442f43f6b1ba9f8891c89d794f69aede9949b276775a23f49b21ce8f1eb8ca297f0b77b4b811303c4e

                      • C:\Users\Admin\AppData\Local\Temp\RESA4B1.tmp

                        Filesize

                        1KB

                        MD5

                        88e81bf1146be1494b7c1c17e5689f68

                        SHA1

                        10a755feda1fa00b74053231f8012bde89760c77

                        SHA256

                        3ec1870975f562eceb381885dd375cb678f8262ec6795081fa3630bfb43185c1

                        SHA512

                        69f53120078f7a631b89b8c69c64d8387b2e13c84250d661820d32ae90ee349e231bf853d13933c08de4ac79bcf4eeb94f09e7b41c5ad246b4befe6d7e162c4d

                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_yd4y3sj4.3hq.ps1

                        Filesize

                        60B

                        MD5

                        d17fe0a3f47be24a6453e9ef58c94641

                        SHA1

                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                        SHA256

                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                        SHA512

                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                      • C:\Users\Admin\AppData\Local\Temp\c2smuwqe\c2smuwqe.dll

                        Filesize

                        3KB

                        MD5

                        a147325cf86b122baff464c2b37d4e79

                        SHA1

                        abec358cde99de1652fe4cddc3e655c45d31904f

                        SHA256

                        2e90f0d618e41091c7349184121aa20712cba45e56d7d0ecdf7b53eb96184f92

                        SHA512

                        08fc2bbff1c4685fbdf0127113f2c29146c00cff0934c81643f998e488675cd82a45d07b000f74e14550c9014f7414978c432c591438ad0d0fe0c7ac0a932706

                      • C:\Users\Admin\AppData\Local\Temp\do2mxiqa\do2mxiqa.dll

                        Filesize

                        3KB

                        MD5

                        fe9e73501c5b8ff57edda40bbe45a179

                        SHA1

                        80af9fae8a502f292ee2f2a8579294300e9e5b8b

                        SHA256

                        9a96ebe521da393fc108eea276f951a61610692534e94e6ede774875204d954a

                        SHA512

                        fd138e3e3e20e3a9ee69d7a51445918a80b898981f1c993d3b3412d43da66404b0caf4247a6f342c6206c1d1294db3ee5311ade7429c58e24bd2c93f07025773

                      • C:\Users\Admin\AppData\Local\Temp\hiqa5cbo\hiqa5cbo.dll

                        Filesize

                        4KB

                        MD5

                        a1d453772bbda95d2c3a3e2c585926e4

                        SHA1

                        329feef7ba92a90feddaa082e9a5814593e5e472

                        SHA256

                        7fe9c045aec998be31b668bddfbf0db9d4c1cc61a581d60ba07afa66ffe65ca9

                        SHA512

                        6b49753055b6dab8c3e5df0665e9244429907040df1b03aa7cd06beb27f64c67ecd9230dbb417ac0ebc85cffe9f4d6594871ddbd2a119b0d4df8fe2dd2c5a357

                      • C:\Users\Admin\AppData\Local\Temp\p1mtgapk\p1mtgapk.dll

                        Filesize

                        4KB

                        MD5

                        30108729abdf2dfd03a75cb77c279e85

                        SHA1

                        eeef20b773ece224ab849d4bcc33b9b7f941516c

                        SHA256

                        beaf5f1a3d0554a4904c170de262a4e82338d4b549d285b5d72329cc66c0c691

                        SHA512

                        0e7590520007471847ba667204f03ffb09755c40a1764fbd793c5af2cb5a59c35974057069ad2d751ee9a453a99cc79a8c7a717b74c1bc8ee47c0889a3c18937

                      • C:\Users\Admin\AppData\Local\Temp\ptvnt0zh\ptvnt0zh.dll

                        Filesize

                        4KB

                        MD5

                        f1979be28a85f333bfa81b69a5a5ff4e

                        SHA1

                        454b62633121eaa6e05c2c7a61e33236f30e720d

                        SHA256

                        5c1e65b5870f29c4cbf329093f616b4b45a9a1ce0941d1673605bd2ab96b3a83

                        SHA512

                        a1e2a6883b018cbc80b5bad6fbcc682879adccd09f9b416d43a1015e4585c33937dd828430fe1e51ccb8e38bd4260171bae900047e88d0be253a28c5fbeefaa5

                      • C:\Users\Admin\AppData\Local\Temp\q2ismvol\q2ismvol.dll

                        Filesize

                        4KB

                        MD5

                        3d6077edd62df14f6d9b3eb7a0cdcf01

                        SHA1

                        8a5e32ae2db5fe04c9d95afa8585d7a78dfb30f0

                        SHA256

                        08aa87c2a6d95dcdde8b590cc4e3de84c83a0b2b574f20bb5b3a854d65a16713

                        SHA512

                        4d7e49f049bacdcdc4d3bd3311f7c2cf2b281bd234ee5891897d21475f54b82676c1704b8d67ca9059c82ae767ad7bbc711f7fc7bdfa97e8f97e438e13cd9eac

                      • C:\Users\Admin\AppData\Local\Temp\shzqmuc1\shzqmuc1.dll

                        Filesize

                        3KB

                        MD5

                        35423b1b1f9ec734477a3111dd644faa

                        SHA1

                        52865771aaa5e23b30897a222b291486e9c807ae

                        SHA256

                        2f1228609d15dbca772fcd14c3b9a11abe25dfabe75f82785e05aeac89d477c2

                        SHA512

                        2925da16791c75cff8fd734cbed007a907c02cb8fc3d53567b2c64d595be845796e5536b835153d8ebe7f56fcd003064ae7c328ba9f8889cc1c511f5d2936ca2

                      • C:\Users\Admin\AppData\Local\Temp\vodooegq\vodooegq.dll

                        Filesize

                        4KB

                        MD5

                        ef00ed6d6e529a7c52514774795b6ee4

                        SHA1

                        9dc06462cf16e18800d2fceb12eace3f416da4c7

                        SHA256

                        28196869fe4fbd882fc604f21955cf4c512768a379b418f4554aab0aaf712521

                        SHA512

                        3a172e3545f9b441d0542e3e0985edf0277b8093669e2ee7201063ddc41d4e8f17f463cbe5ed4b90c080c2199709bfa0c9f3d54dd104eeba4abcd7ddb9c75633

                      • C:\Users\Admin\AppData\Local\Temp\z033kwdo\z033kwdo.dll

                        Filesize

                        4KB

                        MD5

                        a93e38e584966102de12704e672b2049

                        SHA1

                        74cbad18a0eece6b804519d1ae3ebe6e22d63c39

                        SHA256

                        65972c09671c6659f3ebf78bc7b2cc8c4c472547c7493c52d5639c65d23f76d3

                        SHA512

                        0b6442b29628619529af74819bcd22f719f62366e3ec0c433a9ce1b664376317da5a0be710fc200a95d41f7dfe81e233ea580683edd991fdea1fa552d043c19a

                      • \??\c:\Users\Admin\AppData\Local\Temp\1y4ubsbo\1y4ubsbo.0.cs

                        Filesize

                        4KB

                        MD5

                        b76ed05a2169cca7c1d580d592a2f1b6

                        SHA1

                        8f4f3001ea54aa47c8f268870932439ad6ece06e

                        SHA256

                        362c2f0b65870ec918c90fa0154bda1977e6bd9cb31c2491055b3ef10613b3ce

                        SHA512

                        25e6c858db6380604ed6009420e6f6fefe2ca880a8fefa54c043ba44591a42467553d8656e537758fed9e1bbe1d87d8eeee57973665ab4e2c11176c136e81fb8

                      • \??\c:\Users\Admin\AppData\Local\Temp\1y4ubsbo\1y4ubsbo.cmdline

                        Filesize

                        369B

                        MD5

                        5f3a8be923dadd0b0900ac8745ca2563

                        SHA1

                        e78f76c76d328071a92e8e5ca0dac3e2f96751e4

                        SHA256

                        103e962d56516a3c719da44e3304c75a6562b65902ca9801339a436f09e1ce18

                        SHA512

                        9382c4a79f1a42775a8583cd592684a1b352fe0b6b33c2aa0bb9ee718125dd47c391341034633a742ae0b5f1f07b34e44b56c762c9d6a5806f2722fe8e43fe0e

                      • \??\c:\Users\Admin\AppData\Local\Temp\1y4ubsbo\CSC1C66B5523B414701B9E7EE71BD59051.TMP

                        Filesize

                        652B

                        MD5

                        6544307dba2c61a6adc4fec71af2f0df

                        SHA1

                        707a6f073fca7441cdfd25523bb73c00414bf17b

                        SHA256

                        603a60af6f14a5ed20fc5cb754b2b1d14d5a1c262d9a343fae7a3a4a3e89a172

                        SHA512

                        1206bca61d92d2ba0a379ca081d443a3c905d1335d858b28e147c11148a3ee8d92f5a0df08f12ac07f00706c61c3e3fe2d3fcb7b0895a7467eac25be301e11dd

                      • \??\c:\Users\Admin\AppData\Local\Temp\c2smuwqe\CSCAC54210D7AC441ACA77C46278372ECE4.TMP

                        Filesize

                        652B

                        MD5

                        d78c963311f0b325a3dfad419dbf4c4d

                        SHA1

                        fe9d56210790ecbdf9682e77bf76ee4f56d478e0

                        SHA256

                        452f0ea865d3656a50c38822e5927b85a5c70d7c027a55fd674087e19065003f

                        SHA512

                        9139fd905a41ece293bc61dfc7bfa719a0cedc8ed85810c6b4f794c92112aad13e8d1185485218f3862aeafbc2b525e997d768938f7556ed9965fa789b30782d

                      • \??\c:\Users\Admin\AppData\Local\Temp\c2smuwqe\c2smuwqe.0.cs

                        Filesize

                        491B

                        MD5

                        8948c11b2b0c692db7c9fbf6d30f9690

                        SHA1

                        fa609a02a8b7970ee332e677ac2565f52c5138fb

                        SHA256

                        edd571b5162de1875f36edff6ef97b67dae2f7533fddb703eddee4bf209b1c0f

                        SHA512

                        82609c9a063f0c7c3487ed8fcceea8e4a81a70cd2a6a63b7f1de0020e6f585cd7e1e106b9bedc55397051e7e1cc00d437cf1b9d315282367b250946a78b52fc2

                      • \??\c:\Users\Admin\AppData\Local\Temp\c2smuwqe\c2smuwqe.cmdline

                        Filesize

                        369B

                        MD5

                        085c8cbd173c6de3d946e2d57ad07ddb

                        SHA1

                        fff936e970b55cff120816fab5966b07151946a6

                        SHA256

                        5028150c6638afb846d4e74e9c35b0cfeec92e19a6a59bdd781e20b567e6a856

                        SHA512

                        d7295264f7cbd49bf1135b38108b8e804681200aa6efe191b64fbe7aa6cae90d8ac6d4e93db8abaa7029b442cc1502ac9ae3f131c540a0bfbd411e3692ebb1aa

                      • \??\c:\Users\Admin\AppData\Local\Temp\do2mxiqa\CSC1D4FD52AE10D4243911FE1397E605399.TMP

                        Filesize

                        652B

                        MD5

                        d23ada41abb0a7d982e9ec5cacd74b7d

                        SHA1

                        c4635c3667582c9aeedbba65b180f5483de63818

                        SHA256

                        dd2695890c8da7d0c77d0b66e75d5d425a4c2580edad29c6a98f32341b1912fa

                        SHA512

                        289a435d3f163b52a14ab59738d39948a3272cddc4706c981494545994c530d1e5ab876819e9d98e7311577a88261c7512f86eba593a68eaceeda31f7172a2b5

                      • \??\c:\Users\Admin\AppData\Local\Temp\do2mxiqa\do2mxiqa.0.cs

                        Filesize

                        1KB

                        MD5

                        ec748351b30bcef27edcc9fbb112cc89

                        SHA1

                        1960b26f6208bc4351493dc047ea53b5261557bc

                        SHA256

                        5f1f61e898f72919ef51b049974bfa4f0d7babaf6f5506ac4af2c20f55f06578

                        SHA512

                        34111e7311a66d7ff3e493d6aa3d277614c0243104cb71bb06d8785bf07c4a87db5757ddc150549c4b8089a336b8f2c0ae03266c3491995665d30f74ece7bccb

                      • \??\c:\Users\Admin\AppData\Local\Temp\do2mxiqa\do2mxiqa.cmdline

                        Filesize

                        369B

                        MD5

                        1fb9e4616ac00feab6f5cbcb953901ba

                        SHA1

                        7d5660c15bbee754334081c5747da0109f7a83f0

                        SHA256

                        3f4516811c33fc6eeef217863dac9e6f86bdc63c74d2e542e495cc21b213b82a

                        SHA512

                        fd8c0e8aadac1b54f293b65d632c2ae2d880512b46149e0147b57348683a7e89d2724b67a55323ba68c8f45057382bea371c6f332debacef328f8b10abb0a715

                      • \??\c:\Users\Admin\AppData\Local\Temp\hiqa5cbo\CSC4C518C85EFA4A5A8CB688E38AF7FEA8.TMP

                        Filesize

                        652B

                        MD5

                        354479081bd95351fab227f2acb907ff

                        SHA1

                        93b5cdd58626bbcfd84adf699b0f75ff01bd6a1c

                        SHA256

                        c524cb2bacdf7d4de4b11868702332d0965255a273772e66d99c5bf64b40d45d

                        SHA512

                        e574c4546a40abb46a97fbe0f2d36d9e8d21da9d47798367d25aceaddf78eb17a77415f20deab96dab3a5016befb025f91dd523acf55e26955685c462a65ddbe

                      • \??\c:\Users\Admin\AppData\Local\Temp\hiqa5cbo\hiqa5cbo.0.cs

                        Filesize

                        3KB

                        MD5

                        b45d51b75ba2ea57f9144540d15b277c

                        SHA1

                        93a9e794ed197cddd8078923bdf76d816e14c3ab

                        SHA256

                        5af1a96100851358b3cf1db306cb05e74df8103671fe388e8f39689bd4d70b2c

                        SHA512

                        39c733b335989ea49b78ed14b840a5e63d0bcb5fc10e61506de6a9b241994139bdc17effa8bf80930637c381682f9ed80cb6afd16bfe45a95f17e97a26967d8b

                      • \??\c:\Users\Admin\AppData\Local\Temp\hiqa5cbo\hiqa5cbo.cmdline

                        Filesize

                        369B

                        MD5

                        9df6e34b38f10c1d5dd980f36541d8d6

                        SHA1

                        69bae8c0a9017ee9c09b47a68be78729a800fc18

                        SHA256

                        ff5eb4a109cc5663a7189db1a6d96cdec7dcd13764a7c6a9295e0c90c89ea362

                        SHA512

                        061763cec7b98e2eb6bb9d62a29fc2aff5cb874fbd686243213e424201a72a0debf4571bedd0965cb18651203952e8c6761dc9969abc3dcec280b90f6fd4e498

                      • \??\c:\Users\Admin\AppData\Local\Temp\p1mtgapk\CSC1FACEA4B7AD94F6187E6A2581647245F.TMP

                        Filesize

                        652B

                        MD5

                        e50125bf265ab287e1c2a6dc79f1a0d6

                        SHA1

                        9116891ee348ee5a74c719073e5f4823fca3100b

                        SHA256

                        89c7c6deca8d8338ac364a0670a5eee36017f332b10a9563a3a70a291645840c

                        SHA512

                        8c53ba82d6757cb5dfb1cbe4d3a228120a2f165ea6bb61e829208ba6d38ffc49c40aa7afa6a86918d0dae5505a68382cd5fe429eb8ca96fdeb10b9f8dc7e131a

                      • \??\c:\Users\Admin\AppData\Local\Temp\p1mtgapk\p1mtgapk.0.cs

                        Filesize

                        2KB

                        MD5

                        b6938b17a41a844d693dfa48871cea49

                        SHA1

                        766bcbab3987d769aabe675489a3a20c52ea7b3b

                        SHA256

                        ab342ea0a8177af50f2a116f85df9064603ebf929081279409f2a19b97179aa2

                        SHA512

                        c0f14964edd8743d0d383ba763d03485b70d4783a0ada7c87a1e4f443c541496d4386097b6550a03c23153e036ce10a39976be69b187dd95ec27fcbd7b9b62d2

                      • \??\c:\Users\Admin\AppData\Local\Temp\p1mtgapk\p1mtgapk.cmdline

                        Filesize

                        369B

                        MD5

                        e50f834e2f9a63a6d4ecf8428ee07ae6

                        SHA1

                        db444dff59cbfeee41ebe9b7912e67632ee889c6

                        SHA256

                        cff443eac90817812a23c65495611d5c65cd64a85cd2ce2b42777c26f9e2b0f5

                        SHA512

                        747a23c26f10ee6054ae4c0897f72ded4f8ca8795c5bec8a17d6ee14df3a807079efebc8df1d9fc9249c07926bfac991c567a3041e9279a30272c258a462792f

                      • \??\c:\Users\Admin\AppData\Local\Temp\ptvnt0zh\CSC795A92C995144CFD8B3646E935E04E5A.TMP

                        Filesize

                        652B

                        MD5

                        db14ea8e4d83eb0b72aaac0bdc360fee

                        SHA1

                        e868deb312af619e0dfd14e75febacd21afd831f

                        SHA256

                        39d3f4e6e887ef1b9ced4899d0508c80ef9ffcd7b6ffc0ed22e92bfe2f78a7dc

                        SHA512

                        3a91e966b803b6b4511e322f82ba3c34be68a888ccb12939c6780214089d2955d0498487ba5c1fdb80416b4cb298d4c9465c6f4a572881d6964605768592d77b

                      • \??\c:\Users\Admin\AppData\Local\Temp\ptvnt0zh\ptvnt0zh.0.cs

                        Filesize

                        3KB

                        MD5

                        a1b43ae226500e2098274f80a3f5994e

                        SHA1

                        251ce67388cc5aaeffd1803fbc488ea83d8cbbb9

                        SHA256

                        a608d8f27909b0b4fccc9944d3e78a44b0d35add11bda78cfbde45882efc249c

                        SHA512

                        32b7c5bbb6f5940f88b909a1dad6925d9267da5efd427c4d7d6acce19628986722e8a0c48dc8afb6ae6f33d1b99840505148d683f71cdb36cc7935c6e64efb4d

                      • \??\c:\Users\Admin\AppData\Local\Temp\ptvnt0zh\ptvnt0zh.cmdline

                        Filesize

                        369B

                        MD5

                        6ef4f7894d7dffb7df45e94a3765d790

                        SHA1

                        166d22aaab670fa9b98d4c30400a891063abd0f2

                        SHA256

                        3ad71c121ffaf0047d02b5bdae321cdd3e306009d2b72bb5212ca875147967bd

                        SHA512

                        b29537cb9e76ec226243a478eacf14f25354eb6df623c86ba653a855254101f8f57df89137ca29295e84654a0c5ae900ff38a4e55347b4fa6659cf3691549081

                      • \??\c:\Users\Admin\AppData\Local\Temp\q2ismvol\CSC89AE5822AD684D72BA3FEF43A3F516A.TMP

                        Filesize

                        652B

                        MD5

                        c08bdd21815c4f7c15ab47e0742cb618

                        SHA1

                        9dac250ac5d6bfeb27e7cee5ba378410e6247a0e

                        SHA256

                        bd9e88840ca5aa0fe1bce906f5830fe859b7e1ad89708d0eec4de57c80d0c6ce

                        SHA512

                        c077c9c332767c39a4198347045b35dd71663d099f89d6316dd4301f56e175453cab65029f48b9e1c8233e6a5c41344a5a30ed2c4d2685109c085174c3ac3d17

                      • \??\c:\Users\Admin\AppData\Local\Temp\q2ismvol\q2ismvol.0.cs

                        Filesize

                        1KB

                        MD5

                        5b29a005ce6bb5a523d98ecfddc7c224

                        SHA1

                        3dda7f1e097097326ca2700a09fffa033b323bad

                        SHA256

                        9c17699d5de425fbfaa184c5a4fc95f6305c2665a41cec309404d4523be9022f

                        SHA512

                        31b417f4c0fff237bfe4d9b85c571d750eaf723a13a366eac672e8507dbf404b92f8d0c026d9f70898b2d629b1cf27eb6f9ac3e53889077d6f7369b67f35c80d

                      • \??\c:\Users\Admin\AppData\Local\Temp\q2ismvol\q2ismvol.cmdline

                        Filesize

                        369B

                        MD5

                        d797a80bdf1df6052db370c8f7f784f9

                        SHA1

                        f46ee335206f72871b652f52a1a3be3573aaf791

                        SHA256

                        d1c2de5e276fb01fd3f5f076203a97c370e6dd8837010776c857490f2e510af6

                        SHA512

                        b13c488f8cdd8cd106d4d4914402f762792164ee76c61759d6399e92882b5c10b2e81b39019af6b9082f832553f8a67874fce6413bda913306f9858168d5511c

                      • \??\c:\Users\Admin\AppData\Local\Temp\shzqmuc1\CSC16AE398C9BCB4CA392362C59E5C3376.TMP

                        Filesize

                        652B

                        MD5

                        085519ff5dc834ec2831d617c24e70ff

                        SHA1

                        22d03ea76925a873fe5197e776f7eaa8727be73f

                        SHA256

                        a5a7b5b2bf68d6abd3a0da4383ae819fdd67deed778e233ff8bf0d3d614df452

                        SHA512

                        6c95069dd7d06b30d7cc03ff511308413763816540dbe91d94288bfa900f8b47c93ee4545f2bdbf55973360eb96e72d5e7a9ed205c6625059a248d79071af49a

                      • \??\c:\Users\Admin\AppData\Local\Temp\shzqmuc1\shzqmuc1.0.cs

                        Filesize

                        1KB

                        MD5

                        d8bf7e4044f0dc3a61b275dd7e109be2

                        SHA1

                        94672dd2a3611399b3cd75644ca4ffd69df51158

                        SHA256

                        0dcffbd6cfd1e5e499b37dde49d9c360bb129cdf15e76ec04470136c0467caf6

                        SHA512

                        b80c9964b78d60223da9e94b411d26e0f96bf69b9f0c45f71da57fa9e7b09e04ea139ec9b17c436bc792833f3fa71779a8def6b91a2c156af75bb87ed3e1d30b

                      • \??\c:\Users\Admin\AppData\Local\Temp\shzqmuc1\shzqmuc1.cmdline

                        Filesize

                        474B

                        MD5

                        7f714786fb5a1ad7e96e99c15d800fb0

                        SHA1

                        5dbda92bd507b8b4caa0827a6d6ec1c64ef5a8a5

                        SHA256

                        6e337ef9e4705cf57b96d12977f0cde098e65e002d36d20a9eac6595424ccf1d

                        SHA512

                        78f280c2e2b5b59ffa2d05912a4d139fb8ba9211709f8f026465da9387079c6816fc8d040a84698a8c4d791dc3c11d3eea1f921991896f0edb1786ec28399ee4

                      • \??\c:\Users\Admin\AppData\Local\Temp\vodooegq\CSC1F522C9DCCBB44F6A5535DCC5CB1E08F.TMP

                        Filesize

                        652B

                        MD5

                        bd3587da7c5a0d1680d4c34929641811

                        SHA1

                        a221c3c87a99f2717ce0fdc177d0ac7cf6432595

                        SHA256

                        33dc9ed9000418f17307ead4b8cad77f663a9af3fd1156f0c71ecde4538957dc

                        SHA512

                        e6011c9db3ce03b017d2dd70defff496e55364053d43511603c20fba4efb738aeb2c9b6295cc2d2f3282b594d0f5a479e17ec52deb23429b42d6fe37bd750fff

                      • \??\c:\Users\Admin\AppData\Local\Temp\vodooegq\vodooegq.0.cs

                        Filesize

                        1KB

                        MD5

                        f15c3c3a15448bb071a67230294f2dcd

                        SHA1

                        77006af330e2cd5f08ffd2b5cd6c0e6232add424

                        SHA256

                        98d5db570c23af71e8cee9cd7dde564265bcd2c975cca28095626370ae795155

                        SHA512

                        6c7bd04b7965f17aeff8fae96a3882a72f1faf20c68a60dcf14cd000b60468b2e9b8a17c183c30086dd1b6a6c030337ed53655aa719a463f4d9ca93c23f126c4

                      • \??\c:\Users\Admin\AppData\Local\Temp\vodooegq\vodooegq.cmdline

                        Filesize

                        369B

                        MD5

                        85f95299219cc471d59745b0421a1d9d

                        SHA1

                        41d6d36e011b38ca232fc6214138d5d0acf2e115

                        SHA256

                        9deed813b38f67d6ee203275d4fde0c6ae2d1e757672f9195ab8aacd5e6a44b3

                        SHA512

                        1839b4a658fb0f60c3011ee43753171afd0aa3f789cb0993b6cff0a3ceb8740618a9318e3be594705d61d8840e09ce14cfa9cdfe7cd960ce768a5d81887499b7

                      • \??\c:\Users\Admin\AppData\Local\Temp\z033kwdo\CSC4EDA7A11E0FC4431B0C8EB8ADAF265B.TMP

                        Filesize

                        652B

                        MD5

                        3ecb9fcd5182397b5f0c567104ebc0e3

                        SHA1

                        fd5e0344e1695b70b19a5a737d2bb6cac5750c38

                        SHA256

                        b6284c8ec0335e3b36d8a93c172b6fd38163ff26f36e9f2f8a31a6086530995e

                        SHA512

                        3fdcfbc9912a321a8dfa935e65e78e9ed8ab41ac30d6d1001865e8b650e0d6a36296b5abec43e6e320370501a5912f4f637c078f51e732910ca0c40be20868c7

                      • \??\c:\Users\Admin\AppData\Local\Temp\z033kwdo\z033kwdo.0.cs

                        Filesize

                        3KB

                        MD5

                        55af61a4a1274969107d46c68bc54a88

                        SHA1

                        77fd4fb2f1210db76d39f7fb18099c2da9d91e24

                        SHA256

                        678d0406ab36130c407e5d75477d83dacbe38b37d8fb09ee49cdb800e8586dac

                        SHA512

                        a7d19aefc2f7ae1eb70dda29e6ef64e75b576a437a53b5c04955676a9478523b3cde52864ccec73eefcb949a15c837ec040749a436243f12dcef194817552546

                      • \??\c:\Users\Admin\AppData\Local\Temp\z033kwdo\z033kwdo.cmdline

                        Filesize

                        369B

                        MD5

                        a180d343909d28136725d2f72d734764

                        SHA1

                        2dde01c538d4b0f185200891f791140239b84a44

                        SHA256

                        255a39b7919f4d08992ac298d36b639910ceaa1729a9eea34d532b7b4c2c858f

                        SHA512

                        564428a792e2961a113025c54e9c8e493e4c0fb24b777292aa196bff4d668e77c86f24b85cea0446b8c6a2218562241b6ac14b6a2f48a99cd5e016885bbae614

                      • memory/4680-153-0x000002257E4B0000-0x000002257E4C0000-memory.dmp

                        Filesize

                        64KB

                      • memory/4680-133-0x000002257E3E0000-0x000002257E462000-memory.dmp

                        Filesize

                        520KB

                      • memory/4680-147-0x000002257F250000-0x000002257F352000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/4680-146-0x000002257C7A0000-0x000002257C7B0000-memory.dmp

                        Filesize

                        64KB

                      • memory/4680-136-0x000002257E4B0000-0x000002257E4C0000-memory.dmp

                        Filesize

                        64KB

                      • memory/4680-135-0x000002257E4B0000-0x000002257E4C0000-memory.dmp

                        Filesize

                        64KB

                      • memory/4680-134-0x000002257DDF0000-0x000002257DE12000-memory.dmp

                        Filesize

                        136KB

                      • memory/4680-279-0x000002257E4B0000-0x000002257E4C0000-memory.dmp

                        Filesize

                        64KB

                      • memory/4680-280-0x000002257E4B0000-0x000002257E4C0000-memory.dmp

                        Filesize

                        64KB

                      • memory/4680-281-0x000002257E4B0000-0x000002257E4C0000-memory.dmp

                        Filesize

                        64KB

                      • memory/4680-282-0x000002257DE30000-0x000002257DE4E000-memory.dmp

                        Filesize

                        120KB