Analysis

  • max time kernel
    115s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-04-2023 14:16

General

  • Target

    afa3bcdc787dda27bf210d3ed07ebe67.bin.exe

  • Size

    9.9MB

  • MD5

    afa3bcdc787dda27bf210d3ed07ebe67

  • SHA1

    703a0772e4eb59c9603427335c3358f67bef1866

  • SHA256

    06b9839676b68a9b472098410257b871463c88f967201ee7a338b34f47813450

  • SHA512

    b8c3a9eab01e72e2be7450b76346021915968922e9fdcba7fa7dab0d3ade63d82370a73060a5714ce9e5b33a5ed92b86951db994ace0f5044506ebc7d2f7e847

  • SSDEEP

    24576:ydcpX974YxuVTTXFD0aARS79WSLHDMiZO9tHbo:ydqt747ljYILg9o

Malware Config

Extracted

Family

aurora

C2

94.142.138.50:8081

Signatures

  • Aurora

    Aurora is a crypto wallet stealer written in Golang.

  • UPX packed file 12 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Suspicious behavior: EnumeratesProcesses 38 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\afa3bcdc787dda27bf210d3ed07ebe67.bin.exe
    "C:\Users\Admin\AppData\Local\Temp\afa3bcdc787dda27bf210d3ed07ebe67.bin.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4348
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
      "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\MSBuild.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4744
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c "wmic csproduct get uuid"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2504
        • C:\Windows\SysWOW64\Wbem\WMIC.exe
          wmic csproduct get uuid
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:3488
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic os get Caption
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3000
      • C:\Windows\SysWOW64\cmd.exe
        cmd /C "wmic path win32_VideoController get name"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1304
        • C:\Windows\SysWOW64\Wbem\WMIC.exe
          wmic path win32_VideoController get name
          4⤵
            PID:2740
        • C:\Windows\SysWOW64\cmd.exe
          cmd /C "wmic cpu get name"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:436
          • C:\Windows\SysWOW64\Wbem\WMIC.exe
            wmic cpu get name
            4⤵
              PID:400
          • C:\Windows\SysWOW64\cmd.exe
            cmd "/c " systeminfo
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:1356
            • C:\Windows\SysWOW64\systeminfo.exe
              systeminfo
              4⤵
              • Gathers system information
              PID:3712
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\History\" \"C:\Users\Admin\AppData\Local\Temp\XVlBzgbaiC\""
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:3932
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\MRAjWwhTHctcuAx\""
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:488
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data\" \"C:\Users\Admin\AppData\Local\Temp\hxKQFDaFpL\""
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:2152
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\SjFbcXoEFfRsWxP\""
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:3996
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies\" \"C:\Users\Admin\AppData\Local\Temp\LDnJObCsNV\""
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:440
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\lgTeMaPEZQleQYh\""
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:3628
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Data\" \"C:\Users\Admin\AppData\Local\Temp\YzRyWJjPjz\""
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:1156
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\pfRFEgmotaFetHs\""
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:4980
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\bZRjxAwnwe\""
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:2356
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\krBEmfdzdcEkXBA\""
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:3172
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell "" "copy \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\History\" \"C:\Users\Admin\AppData\Local\Temp\kjQZLCtTMt\""
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:2696
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell "" "copy \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\TCoaNatyyiNKARe\""
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:3868
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell "" "copy \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Login Data\" \"C:\Users\Admin\AppData\Local\Temp\KJyiXJrscc\""
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:4300
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell "" "copy \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\tNswYNsGRussVma\""
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:2608
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell "" "copy \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Web Data\" \"C:\Users\Admin\AppData\Local\Temp\ozFZBsbOJi\""
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:1352
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell "" "copy \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\FQGZsnwTKSmVoiG\""
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:3408
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell "" "copy \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\LOpbUOpEdK\""
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:2508
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell "" "copy \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\updOMeRVjaRzLNT\""
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:4244
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell "" "copy \"C:\Users\Admin\AppData\Local\Microsoft\Windows\History\" \"C:\Users\Admin\AppData\Local\Temp\XYeUCWKsXb\""
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:2168

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Credential Access

      Credentials in Files

      1
      T1081

      Discovery

      System Information Discovery

      1
      T1082

      Collection

      Data from Local System

      1
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
        Filesize

        1KB

        MD5

        5315900105942deb090a358a315b06fe

        SHA1

        22fe5d2e1617c31afbafb91c117508d41ef0ce44

        SHA256

        e8bd7d8d1d0437c71aceb032f9fb08dd1147f41c048540254971cc60e95d6cd7

        SHA512

        77e8d15b8c34a1cb01dbee7147987e2cc25c747e0f80d254714a93937a6d2fe08cb5a772cf85ceb8fec56415bfa853234a003173718c4229ba8cfcf2ce6335a6

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
        Filesize

        15KB

        MD5

        ce46551e32be065bc90e658c3c1e4c19

        SHA1

        d12a3639575f0bd910d976de11af31e1b795bc5d

        SHA256

        31fc5703f3d4918232a741d022e1121f0c199f333e8813a2a5e50ebd4fa1a9ea

        SHA512

        8dcdafcb502623acd6fae4e071f67940cea557b2a72bfba596b08ac16902cf5b794316b142d715b483a4a288549eb14c9623b160b7a316da5f696847918eff4c

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
        Filesize

        15KB

        MD5

        526a06b87afc6e5d5058d7ae633fcda9

        SHA1

        6c0e9a4dca642cfa5aaa0ab9a0fde0c47fad1cc6

        SHA256

        f0d959f34d6137ab3908803f38c47aac5a70eea7c0b2a33c08441ee21ff1d085

        SHA512

        56a52c0db901734d02560d65cb4e0ad6aab2403c9b4339fa4b09b3d7fff5fae0c65426e8ffbe8770971ee8e0af14ab797f6df1223659dbe52e9e6422a6f91d94

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
        Filesize

        15KB

        MD5

        06f46690bbef31a42de99d9ad9ee9868

        SHA1

        ad89d03be859c335d885fa3fbef13855546e4ac7

        SHA256

        19d49363c7946b69a6061a9b9726d685e053b7e59cab3c24b0b52b046d9c8e2a

        SHA512

        8372f3ea1b451d6a8453a30d3c03110f179fda3c100f1cafb722677f049f87eb9b8f2ca71f24bdf389846a98a17bf5edb55017f06160e5d20a1b9a63afc5933b

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
        Filesize

        15KB

        MD5

        264e25d08c34f7c4bb80580244dda560

        SHA1

        12664a468f156f5c075d04a83cf7e1a7d20ae0ff

        SHA256

        50a4a55d827bec0c72b61cbd82d00ffb646064d532d07014eabecebc3aad3c71

        SHA512

        fa5d73c7e7070f32126bd9afdafdec7fa2679189245f0f1a9afc6265e30a3797f84f8f590fd00dc71a9b95c824a67ed5f0ddcc5b170c9851b55e453db7f30827

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
        Filesize

        15KB

        MD5

        f29a02510e5a1409c6889f2bb5dc1784

        SHA1

        892a75f43c48e444e8529d44f880b1259091abef

        SHA256

        e837714be4b09f38e9b5f9f441358b5ba07730b02dce5972d080da7ba8d015db

        SHA512

        b056b7ddf6effcf18d43019d6d661bbadec59871db755996927a16d5959894c9dff1fa226f9f7c137501294192b6b23473ecbf93adcf6707cb9e2bce2c40b758

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
        Filesize

        15KB

        MD5

        92e2670b07fb14c90bad7779c037b52c

        SHA1

        068da5fc3af4bcfc76d6c26f06a4201457d93313

        SHA256

        0cb40369b3d50769aa02293f806f419e99ec127f4435ea48ef145bf009bbec77

        SHA512

        04aa5ae676835aba3fd5bc0b7a2fe66b73c724ac3d8702e83a63f2011cfa6c38e05d9758e30aea69f2cb3ee8ed26cac7669757830ca04918db2bea0a84ea916b

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
        Filesize

        15KB

        MD5

        9accd9262acb1f1520633ae9527e1266

        SHA1

        c113c835f0c78a623b1f7f976729b28ccf849408

        SHA256

        34e4a3d2807313541737a85e29bfc7f03b238645950bb67ac1264e969563e874

        SHA512

        e2e982e5fe5650e59d8ceb9b87870e7a2bdc507da36fa626bcd5ebff783192621fbd5099468ddbe35d831038298d24f36bc1d9eb7875230aca530fed69909c66

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
        Filesize

        15KB

        MD5

        06a94da8d43e83808c9c0f4346bdea96

        SHA1

        df98cb4deb8d36ec6206567bbad7bd7e82bf9cba

        SHA256

        b3e3063af909c9f8651fa742dcc961219fbe2eb38e9a82186119c65b919be124

        SHA512

        0aa1f40497ccd6ba2054c78c51b707bc5818cc52e642a078ef45e01c33a3b8424326663efd86f8a644332bb5467aea332110e29ce7c9c10f57c02c16fcf8bdfe

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
        Filesize

        15KB

        MD5

        1e076f98f7a5d7fb52960b172af50cb2

        SHA1

        ddcaa2ec533a9f954615ba45fd372c86f0b8c14e

        SHA256

        c03ab27d1ca72e4e86e1a316b6d81a80d076f2ec2ffaea173a03d4b7dfd3586a

        SHA512

        fee8786d7b4a420055f0cff128552d569c6d4a2d1e6ad991b420b19da7932f96e5a3131d7e6a79377e07f2f9bac39414e8cfd77020b9e277b3b8f61849cb369a

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
        Filesize

        15KB

        MD5

        3a8e3551bdb95ab2f5fc9f8def46105b

        SHA1

        7e6e2135d67119005486fa8f9cf96add78d35de4

        SHA256

        4b0d87655712cf24ac4675ccc2ef47218e2933e313dbd4e8b1c9473d7e686b42

        SHA512

        9e1a8a60c859917e85d09d36c40c593b996f175b546753e174e82bfe3b2de30fbaa2c5b6d2588a438dd8e03d1d74d0f53d2388c851730ae5bdf8eaf5762d6376

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
        Filesize

        15KB

        MD5

        5e126be1e4c034fa15adb9eabbd006cd

        SHA1

        18f9216109d1c3c29278c9d59126bdf28a709609

        SHA256

        a43f27e11de9b44ff862003da87e48ea47bf2d8f168a6bdbd12a68b76cb61c04

        SHA512

        95578a4ecf6bdb67096fb8d378d736916027e9e86bb65d3c147615b92c4420a846f6f24e61708933b5e4f06fd25559afeeccf821584bb23ef6b40c17c10df5d4

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
        Filesize

        15KB

        MD5

        9ccc3a6ee3300f89101fea4d7f995afe

        SHA1

        7439db57556ac6c254f2b3d38a539272f0d5c8fd

        SHA256

        529be0f76ac798c46a0eb3585474e3e7938af9a9bac94cd7f940a06bad727fe7

        SHA512

        d61ad25a0c1028fe5561cffa367213dafec9b2624b69cd46a12007177d39e2feba6add67ef219c4951b5d429102ea6d8da0ec846677b774d4351531e31b53d98

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
        Filesize

        15KB

        MD5

        951676287d5fb3acd59f93ac95cb6a3d

        SHA1

        7ddfdb547cd55bcfeb88bbdaf66224871ce1d927

        SHA256

        58593edaeee072f9539b43358b09508ab799c5c06cffbd075f65b1f09f05506f

        SHA512

        1d300de9e5aef39dbde13c7f4e4f8b81c402045e518b21b2d6597276113d5e62d4f9c5f69e7282c4f328c6e1f7fa073afbfe3d76e1cd815859863ba26844002f

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
        Filesize

        15KB

        MD5

        4ea80425410725c58e14962846cb778f

        SHA1

        6f2d423669b303a27acb8b3dfa0e9b9e2bb5b515

        SHA256

        92c092d6b73c57f2fc0d478a40831345e06e39b18d59059a6bb9d09267139194

        SHA512

        9fd4295ae35ce7ca2a2f1a593c62a62e15c0ce8c7f8b4fedd5735917bc6d80f08ebaf44c70bc081267a3955011451411ad7f5204fd6c61548d0ff4c68737d5a4

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
        Filesize

        15KB

        MD5

        9febbd69ad88e8b173b8aaec83fba62c

        SHA1

        7f86a8278e94e75098838ff2a6cb3434569b8bf6

        SHA256

        f9985e7c9cf1ea64bc189f886ffad7da0334a4e5fc01221526766b4feaf067db

        SHA512

        ad7ea049c8c9d47d53aa8a9fd932ee87f2004b4862b087fc209fcdafd58655fd859b388ba471f95bc24246011320bc30e0dd920d22763de4f2b24f48544702be

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
        Filesize

        15KB

        MD5

        9ac2d2a2bb68ed72f12afe9f3156bb2e

        SHA1

        52e47de012de6f9a3c0e4a039010e949ef41cc4f

        SHA256

        42b65201ec3918e387f7e85b6617c517a554a590e023bd494bada8fe484ef0af

        SHA512

        18734c4d82ca92e21a7ab7ecd32147ad8e554bb6f26965277c80ef91acc629f04dfd3f41a14b075b8fddaabd8ebbf2c60fabbfe10b90b7e60545db097948d774

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
        Filesize

        15KB

        MD5

        2e410b6e212a919f1e42e66c461fd76a

        SHA1

        f7ca8736f31b31f0e1a469b2c37a88f56bea1cda

        SHA256

        6cf18b8736e54496d424797e8601be203b2232000755ba4ee156eefc2a199308

        SHA512

        4050688ab8e7648b7818ff2cdd129f9b8ba8290ee1e8697f15391734e0004473ad9e521bbd58e5dffabedcf5416ab75382f50bf81799284fa885ff74a8edcc61

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
        Filesize

        15KB

        MD5

        6e7c34d674589fe7d6e5ffaf1f238150

        SHA1

        a71b2fcff88b9e10d9f4037c5dd1f787bb5ddb0b

        SHA256

        1dc3ab99abf58aaafd54400afebf2dbd01e7f585b075b9c1e7f0c02844604e6c

        SHA512

        1523b75ae08fe515c68e5db73b485f4d35f996783defa7e6bc2dba3abb8056caf3c03a5596d8960359014474f9951c98c42355d6688b9e59de4025760ed97c1f

      • C:\Users\Admin\AppData\Local\Temp\FQGZsnwTKSmVoiG
        Filesize

        2KB

        MD5

        77e31b1123e94ce5720ceb729a425798

        SHA1

        2b65c95f27d8dca23864a3ed4f78490039ae27bf

        SHA256

        68cafb091d3642a1ad2440bdb51834086945ded836ea25c8f75de7e5fc568d85

        SHA512

        9c660381b859040e20745a1cf42646af3bd3780e2795a5ff3cedc61db9877b608d1fc431a1bd3ba3f25dd3643898b1c0f2abfc067c6634e4ce65de2d4c0c724a

      • C:\Users\Admin\AppData\Local\Temp\KJyiXJrscc
        Filesize

        48KB

        MD5

        349e6eb110e34a08924d92f6b334801d

        SHA1

        bdfb289daff51890cc71697b6322aa4b35ec9169

        SHA256

        c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a

        SHA512

        2a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574

      • C:\Users\Admin\AppData\Local\Temp\LDnJObCsNV
        Filesize

        20KB

        MD5

        c9ff7748d8fcef4cf84a5501e996a641

        SHA1

        02867e5010f62f97ebb0cfb32cb3ede9449fe0c9

        SHA256

        4d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988

        SHA512

        d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73

      • C:\Users\Admin\AppData\Local\Temp\LOpbUOpEdK
        Filesize

        2KB

        MD5

        77e31b1123e94ce5720ceb729a425798

        SHA1

        2b65c95f27d8dca23864a3ed4f78490039ae27bf

        SHA256

        68cafb091d3642a1ad2440bdb51834086945ded836ea25c8f75de7e5fc568d85

        SHA512

        9c660381b859040e20745a1cf42646af3bd3780e2795a5ff3cedc61db9877b608d1fc431a1bd3ba3f25dd3643898b1c0f2abfc067c6634e4ce65de2d4c0c724a

      • C:\Users\Admin\AppData\Local\Temp\MRAjWwhTHctcuAx
        Filesize

        71KB

        MD5

        386c014d0948d4fc41afa98cfca9022e

        SHA1

        786cc52d9b962f55f92202c7d50c3707eb62607b

        SHA256

        448b329f3a10bbe3e8f86cd91509c2783b63d28a375231eb23724f5e141420f2

        SHA512

        13d46209c6b052977d6242763b54ac5e35b389e765c82ba773b520ebf5eacabdfdc22b642cb9760e39ad59dd82fa40a31a8d41fd6dd7ea9c9ad08c57b7d8150f

      • C:\Users\Admin\AppData\Local\Temp\SjFbcXoEFfRsWxP
        Filesize

        71KB

        MD5

        386c014d0948d4fc41afa98cfca9022e

        SHA1

        786cc52d9b962f55f92202c7d50c3707eb62607b

        SHA256

        448b329f3a10bbe3e8f86cd91509c2783b63d28a375231eb23724f5e141420f2

        SHA512

        13d46209c6b052977d6242763b54ac5e35b389e765c82ba773b520ebf5eacabdfdc22b642cb9760e39ad59dd82fa40a31a8d41fd6dd7ea9c9ad08c57b7d8150f

      • C:\Users\Admin\AppData\Local\Temp\TCoaNatyyiNKARe
        Filesize

        2KB

        MD5

        77e31b1123e94ce5720ceb729a425798

        SHA1

        2b65c95f27d8dca23864a3ed4f78490039ae27bf

        SHA256

        68cafb091d3642a1ad2440bdb51834086945ded836ea25c8f75de7e5fc568d85

        SHA512

        9c660381b859040e20745a1cf42646af3bd3780e2795a5ff3cedc61db9877b608d1fc431a1bd3ba3f25dd3643898b1c0f2abfc067c6634e4ce65de2d4c0c724a

      • C:\Users\Admin\AppData\Local\Temp\XVlBzgbaiC
        Filesize

        148KB

        MD5

        90a1d4b55edf36fa8b4cc6974ed7d4c4

        SHA1

        aba1b8d0e05421e7df5982899f626211c3c4b5c1

        SHA256

        7cf3e9e8619904e72ea6608cc43e9b6c9f8aa2af02476f60c2b3daf33075981c

        SHA512

        ea0838be754e1258c230111900c5937d2b0788f90bbf7c5f82b2ceda7868e50afb86c301f313267eaa912778da45755560b5434885521bf915967a7863922ae2

      • C:\Users\Admin\AppData\Local\Temp\YzRyWJjPjz
        Filesize

        92KB

        MD5

        367544a2a5551a41c869eb1b0b5871c3

        SHA1

        9051340b95090c07deda0a1df3a9c0b9233f5054

        SHA256

        eb0e2b2ee04cab66e2f7930ea82a5f1b42469ac50e063a8492f9c585f90bc542

        SHA512

        6d1275291530cb8b9944db296c4aed376765015ad6bbf51f4475a347776c99dbb2e748d0c331d89c9e6118adf641ed10e390c8ccb8ae4de4811c858d195cc34c

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_eisynmy2.nki.ps1
        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • C:\Users\Admin\AppData\Local\Temp\bZRjxAwnwe
        Filesize

        71KB

        MD5

        386c014d0948d4fc41afa98cfca9022e

        SHA1

        786cc52d9b962f55f92202c7d50c3707eb62607b

        SHA256

        448b329f3a10bbe3e8f86cd91509c2783b63d28a375231eb23724f5e141420f2

        SHA512

        13d46209c6b052977d6242763b54ac5e35b389e765c82ba773b520ebf5eacabdfdc22b642cb9760e39ad59dd82fa40a31a8d41fd6dd7ea9c9ad08c57b7d8150f

      • C:\Users\Admin\AppData\Local\Temp\bZRjxAwnwe
        Filesize

        71KB

        MD5

        386c014d0948d4fc41afa98cfca9022e

        SHA1

        786cc52d9b962f55f92202c7d50c3707eb62607b

        SHA256

        448b329f3a10bbe3e8f86cd91509c2783b63d28a375231eb23724f5e141420f2

        SHA512

        13d46209c6b052977d6242763b54ac5e35b389e765c82ba773b520ebf5eacabdfdc22b642cb9760e39ad59dd82fa40a31a8d41fd6dd7ea9c9ad08c57b7d8150f

      • C:\Users\Admin\AppData\Local\Temp\hxKQFDaFpL
        Filesize

        46KB

        MD5

        02d2c46697e3714e49f46b680b9a6b83

        SHA1

        84f98b56d49f01e9b6b76a4e21accf64fd319140

        SHA256

        522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

        SHA512

        60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

      • C:\Users\Admin\AppData\Local\Temp\kjQZLCtTMt
        Filesize

        124KB

        MD5

        9618e15b04a4ddb39ed6c496575f6f95

        SHA1

        1c28f8750e5555776b3c80b187c5d15a443a7412

        SHA256

        a4cd72e529e60b5f74c50e4e5b159efaf80625f23534dd15a28203760b8b28ab

        SHA512

        f802582aa7510f6b950e3343b0560ffa9037c6d22373a6a33513637ab0f8e60ed23294a13ad8890935b02c64830b5232ba9f60d0c0fe90df02b5da30ecd7fa26

      • C:\Users\Admin\AppData\Local\Temp\krBEmfdzdcEkXBA
        Filesize

        71KB

        MD5

        386c014d0948d4fc41afa98cfca9022e

        SHA1

        786cc52d9b962f55f92202c7d50c3707eb62607b

        SHA256

        448b329f3a10bbe3e8f86cd91509c2783b63d28a375231eb23724f5e141420f2

        SHA512

        13d46209c6b052977d6242763b54ac5e35b389e765c82ba773b520ebf5eacabdfdc22b642cb9760e39ad59dd82fa40a31a8d41fd6dd7ea9c9ad08c57b7d8150f

      • C:\Users\Admin\AppData\Local\Temp\lgTeMaPEZQleQYh
        Filesize

        71KB

        MD5

        386c014d0948d4fc41afa98cfca9022e

        SHA1

        786cc52d9b962f55f92202c7d50c3707eb62607b

        SHA256

        448b329f3a10bbe3e8f86cd91509c2783b63d28a375231eb23724f5e141420f2

        SHA512

        13d46209c6b052977d6242763b54ac5e35b389e765c82ba773b520ebf5eacabdfdc22b642cb9760e39ad59dd82fa40a31a8d41fd6dd7ea9c9ad08c57b7d8150f

      • C:\Users\Admin\AppData\Local\Temp\ozFZBsbOJi
        Filesize

        112KB

        MD5

        780853cddeaee8de70f28a4b255a600b

        SHA1

        ad7a5da33f7ad12946153c497e990720b09005ed

        SHA256

        1055ff62de3dea7645c732583242adf4164bdcfb9dd37d9b35bbb9510d59b0a3

        SHA512

        e422863112084bb8d11c682482e780cd63c2f20c8e3a93ed3b9efd1b04d53eb5d3c8081851ca89b74d66f3d9ab48eb5f6c74550484f46e7c6e460a8250c9b1d8

      • C:\Users\Admin\AppData\Local\Temp\pfRFEgmotaFetHs
        Filesize

        71KB

        MD5

        386c014d0948d4fc41afa98cfca9022e

        SHA1

        786cc52d9b962f55f92202c7d50c3707eb62607b

        SHA256

        448b329f3a10bbe3e8f86cd91509c2783b63d28a375231eb23724f5e141420f2

        SHA512

        13d46209c6b052977d6242763b54ac5e35b389e765c82ba773b520ebf5eacabdfdc22b642cb9760e39ad59dd82fa40a31a8d41fd6dd7ea9c9ad08c57b7d8150f

      • C:\Users\Admin\AppData\Local\Temp\tNswYNsGRussVma
        Filesize

        2KB

        MD5

        77e31b1123e94ce5720ceb729a425798

        SHA1

        2b65c95f27d8dca23864a3ed4f78490039ae27bf

        SHA256

        68cafb091d3642a1ad2440bdb51834086945ded836ea25c8f75de7e5fc568d85

        SHA512

        9c660381b859040e20745a1cf42646af3bd3780e2795a5ff3cedc61db9877b608d1fc431a1bd3ba3f25dd3643898b1c0f2abfc067c6634e4ce65de2d4c0c724a

      • C:\Users\Admin\AppData\Local\Temp\updOMeRVjaRzLNT
        Filesize

        2KB

        MD5

        77e31b1123e94ce5720ceb729a425798

        SHA1

        2b65c95f27d8dca23864a3ed4f78490039ae27bf

        SHA256

        68cafb091d3642a1ad2440bdb51834086945ded836ea25c8f75de7e5fc568d85

        SHA512

        9c660381b859040e20745a1cf42646af3bd3780e2795a5ff3cedc61db9877b608d1fc431a1bd3ba3f25dd3643898b1c0f2abfc067c6634e4ce65de2d4c0c724a

      • C:\Users\Admin\AppData\Local\Temp\updOMeRVjaRzLNT
        Filesize

        2KB

        MD5

        77e31b1123e94ce5720ceb729a425798

        SHA1

        2b65c95f27d8dca23864a3ed4f78490039ae27bf

        SHA256

        68cafb091d3642a1ad2440bdb51834086945ded836ea25c8f75de7e5fc568d85

        SHA512

        9c660381b859040e20745a1cf42646af3bd3780e2795a5ff3cedc61db9877b608d1fc431a1bd3ba3f25dd3643898b1c0f2abfc067c6634e4ce65de2d4c0c724a

      • memory/440-234-0x0000000002E70000-0x0000000002E80000-memory.dmp
        Filesize

        64KB

      • memory/440-235-0x0000000002E70000-0x0000000002E80000-memory.dmp
        Filesize

        64KB

      • memory/488-189-0x0000000004A40000-0x0000000004A50000-memory.dmp
        Filesize

        64KB

      • memory/488-190-0x0000000004A40000-0x0000000004A50000-memory.dmp
        Filesize

        64KB

      • memory/1156-264-0x0000000002FA0000-0x0000000002FB0000-memory.dmp
        Filesize

        64KB

      • memory/1156-265-0x0000000002FA0000-0x0000000002FB0000-memory.dmp
        Filesize

        64KB

      • memory/1352-385-0x0000000004620000-0x0000000004630000-memory.dmp
        Filesize

        64KB

      • memory/1352-384-0x0000000004620000-0x0000000004630000-memory.dmp
        Filesize

        64KB

      • memory/2152-204-0x00000000046A0000-0x00000000046B0000-memory.dmp
        Filesize

        64KB

      • memory/2152-203-0x00000000046A0000-0x00000000046B0000-memory.dmp
        Filesize

        64KB

      • memory/2168-445-0x0000000002330000-0x0000000002340000-memory.dmp
        Filesize

        64KB

      • memory/2168-444-0x0000000002330000-0x0000000002340000-memory.dmp
        Filesize

        64KB

      • memory/2356-295-0x00000000050E0000-0x00000000050F0000-memory.dmp
        Filesize

        64KB

      • memory/2356-290-0x00000000050E0000-0x00000000050F0000-memory.dmp
        Filesize

        64KB

      • memory/2508-415-0x0000000002940000-0x0000000002950000-memory.dmp
        Filesize

        64KB

      • memory/2608-371-0x0000000005180000-0x0000000005190000-memory.dmp
        Filesize

        64KB

      • memory/2608-370-0x0000000005180000-0x0000000005190000-memory.dmp
        Filesize

        64KB

      • memory/2696-315-0x0000000004890000-0x00000000048A0000-memory.dmp
        Filesize

        64KB

      • memory/2696-316-0x0000000004890000-0x00000000048A0000-memory.dmp
        Filesize

        64KB

      • memory/3172-311-0x0000000005570000-0x0000000005580000-memory.dmp
        Filesize

        64KB

      • memory/3172-310-0x0000000005570000-0x0000000005580000-memory.dmp
        Filesize

        64KB

      • memory/3408-390-0x0000000002950000-0x0000000002960000-memory.dmp
        Filesize

        64KB

      • memory/3408-391-0x0000000002950000-0x0000000002960000-memory.dmp
        Filesize

        64KB

      • memory/3628-250-0x0000000004CB0000-0x0000000004CC0000-memory.dmp
        Filesize

        64KB

      • memory/3628-249-0x0000000004CB0000-0x0000000004CC0000-memory.dmp
        Filesize

        64KB

      • memory/3868-331-0x00000000046F0000-0x0000000004700000-memory.dmp
        Filesize

        64KB

      • memory/3868-330-0x00000000046F0000-0x0000000004700000-memory.dmp
        Filesize

        64KB

      • memory/3932-157-0x0000000005510000-0x0000000005532000-memory.dmp
        Filesize

        136KB

      • memory/3932-173-0x00000000068F0000-0x0000000006912000-memory.dmp
        Filesize

        136KB

      • memory/3932-171-0x0000000006920000-0x00000000069B6000-memory.dmp
        Filesize

        600KB

      • memory/3932-169-0x0000000004F10000-0x0000000004F20000-memory.dmp
        Filesize

        64KB

      • memory/3932-163-0x0000000005C30000-0x0000000005C96000-memory.dmp
        Filesize

        408KB

      • memory/3932-155-0x0000000004DE0000-0x0000000004E16000-memory.dmp
        Filesize

        216KB

      • memory/3932-156-0x0000000005550000-0x0000000005B78000-memory.dmp
        Filesize

        6.2MB

      • memory/3932-170-0x00000000063B0000-0x00000000063CE000-memory.dmp
        Filesize

        120KB

      • memory/3932-164-0x0000000004F10000-0x0000000004F20000-memory.dmp
        Filesize

        64KB

      • memory/3932-172-0x00000000068A0000-0x00000000068BA000-memory.dmp
        Filesize

        104KB

      • memory/3996-209-0x0000000002320000-0x0000000002330000-memory.dmp
        Filesize

        64KB

      • memory/3996-210-0x0000000002320000-0x0000000002330000-memory.dmp
        Filesize

        64KB

      • memory/4244-429-0x0000000004EF0000-0x0000000004F00000-memory.dmp
        Filesize

        64KB

      • memory/4244-430-0x0000000004EF0000-0x0000000004F00000-memory.dmp
        Filesize

        64KB

      • memory/4300-355-0x0000000001230000-0x0000000001240000-memory.dmp
        Filesize

        64KB

      • memory/4300-356-0x0000000001230000-0x0000000001240000-memory.dmp
        Filesize

        64KB

      • memory/4348-148-0x0000000007D00000-0x0000000007D92000-memory.dmp
        Filesize

        584KB

      • memory/4348-138-0x0000000006290000-0x00000000062A0000-memory.dmp
        Filesize

        64KB

      • memory/4348-139-0x0000000006290000-0x00000000062A0000-memory.dmp
        Filesize

        64KB

      • memory/4348-137-0x0000000005CA0000-0x0000000005D06000-memory.dmp
        Filesize

        408KB

      • memory/4348-146-0x0000000008780000-0x0000000008D24000-memory.dmp
        Filesize

        5.6MB

      • memory/4348-136-0x00000000008D0000-0x00000000012AE000-memory.dmp
        Filesize

        9.9MB

      • memory/4744-140-0x0000000000400000-0x0000000000753000-memory.dmp
        Filesize

        3.3MB

      • memory/4744-144-0x0000000000400000-0x0000000000753000-memory.dmp
        Filesize

        3.3MB

      • memory/4744-142-0x0000000000400000-0x0000000000753000-memory.dmp
        Filesize

        3.3MB

      • memory/4744-153-0x0000000000400000-0x0000000000753000-memory.dmp
        Filesize

        3.3MB

      • memory/4744-269-0x0000000000400000-0x0000000000753000-memory.dmp
        Filesize

        3.3MB

      • memory/4744-154-0x0000000000400000-0x0000000000753000-memory.dmp
        Filesize

        3.3MB

      • memory/4744-152-0x0000000000400000-0x0000000000753000-memory.dmp
        Filesize

        3.3MB

      • memory/4744-143-0x0000000000400000-0x0000000000753000-memory.dmp
        Filesize

        3.3MB

      • memory/4744-145-0x0000000000400000-0x0000000000753000-memory.dmp
        Filesize

        3.3MB

      • memory/4744-147-0x0000000000400000-0x0000000000753000-memory.dmp
        Filesize

        3.3MB

      • memory/4744-149-0x0000000000400000-0x0000000000753000-memory.dmp
        Filesize

        3.3MB

      • memory/4744-151-0x0000000000400000-0x0000000000753000-memory.dmp
        Filesize

        3.3MB

      • memory/4980-281-0x0000000004DE0000-0x0000000004DF0000-memory.dmp
        Filesize

        64KB

      • memory/4980-280-0x0000000004DE0000-0x0000000004DF0000-memory.dmp
        Filesize

        64KB