Analysis

  • max time kernel
    34s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230831-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-09-2023 00:57

General

  • Target

    TS_MissingPatchCache.ps1

  • Size

    11KB

  • MD5

    1c3130b9ab767b08ea09fc1cc97de844

  • SHA1

    5ca449dcae2d457b4d1b0f2f317c03c753ef264a

  • SHA256

    7fdefec9551db1f40a54d397c441bc4e5505eb8401aae148e90437ece414b296

  • SHA512

    df7b89d330ba0e21b57032fd646ba14eef81f0afb2f1bcfbbbd4cd0990e2081495017fdcf2b89e63bb35bfb9a78e6ac52436537b0b7d6bca775722dede362cce

  • SSDEEP

    192:jd0/OrwjHUDr5THgkYFQwHx7cprxi8RZkeuYT1bLKRoguwCsXsoz+ppjGAwThhj5:jyWrwodAkYyU7Mrw8Rme/T1bOw7gs3za

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 3 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\TS_MissingPatchCache.ps1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:372
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\luh01ag2\luh01ag2.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3932
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7167.tmp" "c:\Users\Admin\AppData\Local\Temp\luh01ag2\CSC527A1A73ED6141F4A84C5B8682FF172.TMP"
        3⤵
          PID:2664
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ggff0mp3\ggff0mp3.cmdline"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:5044
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7261.tmp" "c:\Users\Admin\AppData\Local\Temp\ggff0mp3\CSCC527A7F8421443918D866772C63329D.TMP"
          3⤵
            PID:1244
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\edacrjx5\edacrjx5.cmdline"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:4616
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
            C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES731D.tmp" "c:\Users\Admin\AppData\Local\Temp\edacrjx5\CSCC96FB25CCBC24C39B85122CE11F9CE5.TMP"
            3⤵
              PID:388
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\pu0jgbao\pu0jgbao.cmdline"
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:380
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7417.tmp" "c:\Users\Admin\AppData\Local\Temp\pu0jgbao\CSC128346FCFA8B4196A84B3B148571ED2C.TMP"
              3⤵
                PID:1748
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
              "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ykd3dypp\ykd3dypp.cmdline"
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:3660
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES757E.tmp" "c:\Users\Admin\AppData\Local\Temp\ykd3dypp\CSC132BD58B5935471C852189177FE0ABDD.TMP"
                3⤵
                  PID:3948
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\znmfpo1x\znmfpo1x.cmdline"
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:1628
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                  C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7688.tmp" "c:\Users\Admin\AppData\Local\Temp\znmfpo1x\CSC987FAE816B43208CACB01C3DB69AAB.TMP"
                  3⤵
                    PID:3440
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                  "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\1jqg3dmc\1jqg3dmc.cmdline"
                  2⤵
                  • Suspicious use of WriteProcessMemory
                  PID:4956
                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7782.tmp" "c:\Users\Admin\AppData\Local\Temp\1jqg3dmc\CSC4A23A05C7E144EB5AFAEAD59B3693660.TMP"
                    3⤵
                      PID:2392
                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                    "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\vk0texkn\vk0texkn.cmdline"
                    2⤵
                    • Suspicious use of WriteProcessMemory
                    PID:2792
                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES786C.tmp" "c:\Users\Admin\AppData\Local\Temp\vk0texkn\CSCC5105C2053EC49B496FF27448A3391D.TMP"
                      3⤵
                        PID:1316
                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ljpmjala\ljpmjala.cmdline"
                      2⤵
                      • Suspicious use of WriteProcessMemory
                      PID:3632
                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7966.tmp" "c:\Users\Admin\AppData\Local\Temp\ljpmjala\CSCE0378E48BA1489AADED126855F25CA.TMP"
                        3⤵
                          PID:2984
                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\nes55zbu\nes55zbu.cmdline"
                        2⤵
                        • Suspicious use of WriteProcessMemory
                        PID:4776
                        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7C15.tmp" "c:\Users\Admin\AppData\Local\Temp\nes55zbu\CSC25858C2DF1C84AD1BA88DF1C5A61D24A.TMP"
                          3⤵
                            PID:4408
                      • C:\Windows\System32\svchost.exe
                        C:\Windows\System32\svchost.exe -k netsvcs -p
                        1⤵
                        • Drops file in System32 directory
                        • Checks processor information in registry
                        • Enumerates system info in registry
                        PID:3824

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Temp\1jqg3dmc\1jqg3dmc.dll

                        Filesize

                        4KB

                        MD5

                        94845b8592692853b73426b5f6536e90

                        SHA1

                        d358c9a9a8d647f3d3b7d8b9e50bf0e78ba77eb1

                        SHA256

                        b125d1a1647a6180dabc5340f5d1dbf3cf123c412878034708111e33d44053db

                        SHA512

                        439710cece9d1350cfded85d18f206d009ebdf61ea7352abde11eadd997b46ff3763849286de004c0fb28997ebd6ddb1a82e12f30fbf4609b7dc4bb8a23f9f96

                      • C:\Users\Admin\AppData\Local\Temp\RES7167.tmp

                        Filesize

                        1KB

                        MD5

                        f5d959cb07078e5c26fac604e2a34071

                        SHA1

                        98278328fd12b31250dd53bbb97989c963d23d8b

                        SHA256

                        3ff59c5c5f4e00f4a8c9fe19a5edc2d6e9156ec7d53233d86ddb9ba0c6ca9c0d

                        SHA512

                        4afc458d97ca70858f73e621d1aee05fcb02a953d00f84e3b009bf47bb3ea125060e16fdde3d8c6b3deac5b146a653fb1f0337fae598f5b26a1938c4d38ee60a

                      • C:\Users\Admin\AppData\Local\Temp\RES7261.tmp

                        Filesize

                        1KB

                        MD5

                        37186d1c0d4bd88ce058f3aac798b068

                        SHA1

                        97cc9a921a7cad74a12d7ede217057516720591d

                        SHA256

                        cca1e147c4be01979d300218ce4f51ac6411b5cf47fb3439c3270e999f369910

                        SHA512

                        d93ea6a32fe535e0537fbd274a9ea67c667379a66442ecc52f3be99b43f22c9a72478175b8af5948ddfba78eb045c11491aec7e36503fea473b5359d7b2c511f

                      • C:\Users\Admin\AppData\Local\Temp\RES731D.tmp

                        Filesize

                        1KB

                        MD5

                        e47e44353601724e3a7d172bf76b5dce

                        SHA1

                        dc7e5b3d803f8b9d23f71651e9379c77dcd0f720

                        SHA256

                        1a4709599247af7d6dd5d8ecc33b21f62633a3ff1fefb69751ab5d3b14fb7a01

                        SHA512

                        4753172854933bd918bc099c4e8410eb439bed4de77cc806df716cb44965e2a738867e4ffe095cb5069519ddb6636628894292dde4a2f4232e2fd4020969e817

                      • C:\Users\Admin\AppData\Local\Temp\RES7417.tmp

                        Filesize

                        1KB

                        MD5

                        1d6206281e1c76ac040f02448beeea7b

                        SHA1

                        580df0372bb979db6a77f9abb2bdf3b9eecfac52

                        SHA256

                        11e626735b083006cc5ce287bfba628d0f6be356f2e2bc947e5f81fc85177d68

                        SHA512

                        ca5740bcc06e24b25773a1ef40fb41f38bae508c97415ff0b2ad8f8fcf9889e83dfee4a642ffc73146c439d4b083c13de7f6ffe0ce3a7cb7e5653539d19db8a0

                      • C:\Users\Admin\AppData\Local\Temp\RES757E.tmp

                        Filesize

                        1KB

                        MD5

                        b18e5c1af5bd0adc8d8fc858458850db

                        SHA1

                        d15a135a0cec977af1c1fc766f4f3652b3b74017

                        SHA256

                        3c443b91f45dac2476dd31b46efb4a0d1f816c9e1d00c931ab7efb9a63fa5dea

                        SHA512

                        50676da85fed62dbc45394b2edf47efbad1eff90c93b816cfb9db7311ff3dbc31d49fdfeff4481d3f8224eaef6ac261f957aad15965b923b54c99fbdf8918497

                      • C:\Users\Admin\AppData\Local\Temp\RES7688.tmp

                        Filesize

                        1KB

                        MD5

                        48971f3e9dbe2f8a5307b0fd6a412e44

                        SHA1

                        06d408ae1bec2587034b9f2f1d16cf99575845bc

                        SHA256

                        31712ede9afcdbd19487e4303a9aec031c7c0f8f0847ce898f3bb8f9533b77ab

                        SHA512

                        6e6927926e168ed6394401c4bb61198190cf8ad98bb407d578939c999bfb336013c4d65c7a22b927c75f08a546b19633809e97ec2911dc55d7a7c2f7fe6ece6b

                      • C:\Users\Admin\AppData\Local\Temp\RES7782.tmp

                        Filesize

                        1KB

                        MD5

                        93b35c61e5d84d16ee5923965fe487d1

                        SHA1

                        3d11a2b4d7fd72f85263643b9b57eccbda825189

                        SHA256

                        d126da3384174afee8e2483907b6032af5100ccc628c1eb38b0e4ad286f06284

                        SHA512

                        7df3c5ee27e95a596101f5e1703148865f25d64c7d03982e7cc2404c51d98c2b0be9f7e406376ad52f075e3e3f0f00da6ede6a7a297e82155dca3738bb97ebaa

                      • C:\Users\Admin\AppData\Local\Temp\RES786C.tmp

                        Filesize

                        1KB

                        MD5

                        8c67eeabec4675cc14302504812317a5

                        SHA1

                        c1c83cd9b94e16c3f5a2a333333b1f9fdc6ce614

                        SHA256

                        6086a88edadfc059c844394f44d470267855149ecaddba43ea88df8b63eeb4bd

                        SHA512

                        1ef20b388152892e30a6717254fff32720e3bca0ba1c82acd329f353abe362097778b0d09486daf7acca9c4f114422e28d457808466bd39d4b10d055d0178545

                      • C:\Users\Admin\AppData\Local\Temp\RES7966.tmp

                        Filesize

                        1KB

                        MD5

                        8d6c60c3bceeccb520b44fcb28e2832e

                        SHA1

                        06a70dd60bd3f7fe51fad7a0302b9601507a8fc5

                        SHA256

                        3381ad0b8dac48438078787124b3ddacb7f6feec2831d6abf2ea63fd68743bbf

                        SHA512

                        e18f9d076e689204634a656dfb4f9ac97ee02e0fc00f00962ca94e55c6038080c79955226c74006157f4f386a9bfba635f2a1b9b38384bbdc55c158cdcf75881

                      • C:\Users\Admin\AppData\Local\Temp\RES7C15.tmp

                        Filesize

                        1KB

                        MD5

                        49b5276ea8f984564aa8fc4ddd8ad5cb

                        SHA1

                        9f61ba5ccef1ac62c43e3a3e41e3ecde7a2650dd

                        SHA256

                        c78973874a85ac21bdca4691fa18384d52b1090a32502105319a0e5b37526aff

                        SHA512

                        efae32de191ec491b340c9bc74eec2ceea9245ea58943e90507cbc560620b71248c0c1df2fb6a877109b0fb76c3e156e6344f2868079c8385f2234324acc77a5

                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_au32z1yo.mzy.ps1

                        Filesize

                        60B

                        MD5

                        d17fe0a3f47be24a6453e9ef58c94641

                        SHA1

                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                        SHA256

                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                        SHA512

                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                      • C:\Users\Admin\AppData\Local\Temp\edacrjx5\edacrjx5.dll

                        Filesize

                        3KB

                        MD5

                        94f71abdc52c775eb99c292a63b0d685

                        SHA1

                        464817ea7f510622a8561c16ae2499c8abcde2d5

                        SHA256

                        8963a0be5ab0488c796e975ea48ff61ecd4f4137d839e75086dc9f7da61e6dba

                        SHA512

                        6f3cd71291121a9a4e2516166734f1e82a960c1b85dd158749b26ce9a1cbe0b34fac05604b20541ed1c8d332c51a8f1f590a8f097d1a465aec8fbb0a55ced943

                      • C:\Users\Admin\AppData\Local\Temp\ggff0mp3\ggff0mp3.dll

                        Filesize

                        4KB

                        MD5

                        c1ae805d47894fcf7afc51df3ad25f10

                        SHA1

                        011be5179402d3edd67aa4457c6899aea0fe6b5a

                        SHA256

                        9e0d1dc30f1a0ea11f0dea75da5b73018fc191094b0e095a5440f1aaffe8a4dd

                        SHA512

                        5b3a84af35ad923d7f629659328eab44ef511c1d91422f5d0576e2b475e89fc7a7eb6ab1c8eb5763056fa37e99aeb360b3f53331960f8f4720b4705bbdb005d0

                      • C:\Users\Admin\AppData\Local\Temp\ljpmjala\ljpmjala.dll

                        Filesize

                        4KB

                        MD5

                        c4d0e312ea26202fdda7ea632b70e8f5

                        SHA1

                        08c5fbd5f637c66cf34b3a670486afa73fb45d87

                        SHA256

                        59ca28b9ebb83ba710ebb223a83e4639133abd5a9e9debe163c5d0d8c50dc978

                        SHA512

                        2d59c89873d92ee5454a43f2ba9196abe3a8980b5b6819f723581676afa35ad898ae4e3b12a50676069af5a268ce297edebcf0678e2fc6e5d9278ddc48dd9f40

                      • C:\Users\Admin\AppData\Local\Temp\luh01ag2\luh01ag2.dll

                        Filesize

                        3KB

                        MD5

                        ac5e6ae6e6a5604f67d2fdc9810111b7

                        SHA1

                        353e33fd05ae7d92c02539ba58356ce02495e6df

                        SHA256

                        b35ba056c9ad7779bec0861d05dae7d24e9a2f9d51d7013344d06d0010067ec3

                        SHA512

                        bfc0d5a6829a5af267d52c00d0a1df5e9a5d30fb0d32015c8398df4e038703a71f38e61871516dcc54a65e8a5e7aa7358a45e97b00a5496115b1ab9091d92c77

                      • C:\Users\Admin\AppData\Local\Temp\nes55zbu\nes55zbu.dll

                        Filesize

                        3KB

                        MD5

                        2323fe7947d5647efd99c1097b5dadbe

                        SHA1

                        a8dad3a45b35f01a8d0d83c8b2d07ef8a58b1ca7

                        SHA256

                        351ea4496f59a4b4ed6152928f4bd732a2d9b1b3ad6aeff406349b934f37a8d4

                        SHA512

                        2c087a4ba3016020459fca8b19cd89c2de2a835872dca63a48f2a05bb1be5bc008100d13688088a8fb563964da28d49b25d1ed3375bef03ab5109a8ab910f7d5

                      • C:\Users\Admin\AppData\Local\Temp\pu0jgbao\pu0jgbao.dll

                        Filesize

                        4KB

                        MD5

                        77cfbf9a0c2282e872769017defde6a1

                        SHA1

                        1c88e0ab66da24b9ae7c585d73ca24820802e782

                        SHA256

                        d685c0c73b25e1476f045a69ec6e80d3001594f20aa326ff197b98ebad914f14

                        SHA512

                        ea67a3abfa8036070422b797ea070f258f9354f3e96cc27c52fbca4fb47926ab74774e94bd2f05f443bfe761b4ff4b325cda7fed010c8801e7153f85d1207c31

                      • C:\Users\Admin\AppData\Local\Temp\vk0texkn\vk0texkn.dll

                        Filesize

                        4KB

                        MD5

                        5584d6f034fa703feba8b55e9a6ef447

                        SHA1

                        3ea937727f9aa6df0598b5914bf6478e1491ce15

                        SHA256

                        2fed679a52d0a37316d92d5712eb5e6b2928ea2f7238c30a508c35c447053fac

                        SHA512

                        0752cdcb808598dd3c3f9c4ee7650f71c17cca992f16db6d1bdc86daf30509c01a46aec344babbfd27760707a1a7abb895235229a305acaed0ab0f069ec24975

                      • C:\Users\Admin\AppData\Local\Temp\wsuABB1.tmp

                        Filesize

                        14KB

                        MD5

                        c01eaa0bdcd7c30a42bbb35a9acbf574

                        SHA1

                        0aee3e1b873e41d040f1991819d0027b6cc68f54

                        SHA256

                        32297224427103aa1834dba276bf5d49cd5dd6bda0291422e47ad0d0706c6d40

                        SHA512

                        d26ff775ad39425933cd3df92209faa53ec5b701e65bfbcccc64ce8dd3e79f619a9bad7cc975a98a95f2006ae89e50551877fc315a3050e48d5ab89e0802e2b7

                      • C:\Users\Admin\AppData\Local\Temp\ykd3dypp\ykd3dypp.dll

                        Filesize

                        4KB

                        MD5

                        fd3c2dcb9f6fbbba12a32b155412ebd2

                        SHA1

                        8f1b04be33d21b93beca4e7ac987eb9a6f16c4f6

                        SHA256

                        c752c86094b16b7382495523bc4530baa5086ffa660cafa064cc0e2bdaf4fa51

                        SHA512

                        cc7ff436eb91644efa57b663fd433d23cec9af1caf23c86360795a13abe344c56a4ac667a2758c352bb6bbb967ba829d8e62d7f77c0ab08c7ae8ebbf0acb538b

                      • C:\Users\Admin\AppData\Local\Temp\znmfpo1x\znmfpo1x.dll

                        Filesize

                        4KB

                        MD5

                        b21847ab550450deaec60b47010135e0

                        SHA1

                        760494cf34b0ea09606bd494d96e1866f73408ef

                        SHA256

                        f01ed68c657204946c5eeecc2f4eb266128f94e2acac1d38efa1743775d39de6

                        SHA512

                        4a493758f262935a8de9f2c454ac754b277bf87f6dc9175e7558629bc2ab688b89be08d6029dfe1458c504b9b6a781264752ce20021d59bdc8879810fc26e07e

                      • \??\c:\Users\Admin\AppData\Local\Temp\1jqg3dmc\1jqg3dmc.0.cs

                        Filesize

                        3KB

                        MD5

                        a1b43ae226500e2098274f80a3f5994e

                        SHA1

                        251ce67388cc5aaeffd1803fbc488ea83d8cbbb9

                        SHA256

                        a608d8f27909b0b4fccc9944d3e78a44b0d35add11bda78cfbde45882efc249c

                        SHA512

                        32b7c5bbb6f5940f88b909a1dad6925d9267da5efd427c4d7d6acce19628986722e8a0c48dc8afb6ae6f33d1b99840505148d683f71cdb36cc7935c6e64efb4d

                      • \??\c:\Users\Admin\AppData\Local\Temp\1jqg3dmc\1jqg3dmc.cmdline

                        Filesize

                        369B

                        MD5

                        1a189b5f57763dd70eb179e42e833858

                        SHA1

                        6bd7c5d6ceb43060134a5612a5e4f3a4ea420b3a

                        SHA256

                        dbe475dcadd9d786333131b8affcd6fe63e831a382304830d57d3b6535c5e7b8

                        SHA512

                        016381a5002aada7c6868d48c77c283827ad3b53543a3e4a146989d066ff9e14deb06237f608c5a05fe302a7c01a1c16b2c9d15506790d0788fc3ac0de3279de

                      • \??\c:\Users\Admin\AppData\Local\Temp\1jqg3dmc\CSC4A23A05C7E144EB5AFAEAD59B3693660.TMP

                        Filesize

                        652B

                        MD5

                        a68cfe6c2a0f390077e673e2d3051cdf

                        SHA1

                        f34718b47babc886c5f522fcc1be081b3e388aae

                        SHA256

                        9b0b4343f1f821b7379e77ea27032c1f29aeb043e431ecc84adb61ef3dd97982

                        SHA512

                        71faee33d6d710585e38e58affa4f6816297684a12225ef1d3a067a162501d4656d8957970084d8ac6dc067297972dc86ced77f9a6789e1712adbab11199b7a1

                      • \??\c:\Users\Admin\AppData\Local\Temp\edacrjx5\CSCC96FB25CCBC24C39B85122CE11F9CE5.TMP

                        Filesize

                        652B

                        MD5

                        dd6c6157f81678da140f225b3deb2d87

                        SHA1

                        6055a46e2f6a75c1dc936a3658ddda0350805b86

                        SHA256

                        8386355df26a1f307aa25583f7e5f90ca8d26d396851d208badbeaf119025f50

                        SHA512

                        88cac0010a569ac5f50b4ce9c4b536244f4cb98ae112705b4a9029aceee9a377fd329536934309a88ad2e7f7783990f956469c1edd20ae4d26dedccc08d13f2e

                      • \??\c:\Users\Admin\AppData\Local\Temp\edacrjx5\edacrjx5.0.cs

                        Filesize

                        1KB

                        MD5

                        ec748351b30bcef27edcc9fbb112cc89

                        SHA1

                        1960b26f6208bc4351493dc047ea53b5261557bc

                        SHA256

                        5f1f61e898f72919ef51b049974bfa4f0d7babaf6f5506ac4af2c20f55f06578

                        SHA512

                        34111e7311a66d7ff3e493d6aa3d277614c0243104cb71bb06d8785bf07c4a87db5757ddc150549c4b8089a336b8f2c0ae03266c3491995665d30f74ece7bccb

                      • \??\c:\Users\Admin\AppData\Local\Temp\edacrjx5\edacrjx5.cmdline

                        Filesize

                        369B

                        MD5

                        518a55047122937dccf266f438af5123

                        SHA1

                        ccb623c2b8b3c9b0430bca4d70bd9c7c88cefe52

                        SHA256

                        c4abe31a96df4321732326158282063234b072b5869efb997f613abf4c4fe6f3

                        SHA512

                        46966e2a8bda69c32e1b6ebcff27003a5fdc310254d56ceabe7bd99d56231340c29074fb1b3af499f9e07bbd75b5146d04e59988df194af124a0d9ebebe95684

                      • \??\c:\Users\Admin\AppData\Local\Temp\ggff0mp3\CSCC527A7F8421443918D866772C63329D.TMP

                        Filesize

                        652B

                        MD5

                        de26ddc23e8d6b7ed261ea492e1ad232

                        SHA1

                        a22a0ec30d7abc4b1cc6c22bf6bcf8c2ded08d97

                        SHA256

                        2fa976f48b2953edbd0e75141fb1ac3c7bc0161bfe5e0bf720da2b5645e59dae

                        SHA512

                        20c5bae94707aa325a61fb7a6b6997dc59257dfc9d0323d4342091d9948d1bd5fb02c6b2df7cdbff774baa36ac7305dfd84e6e0ab34e6124d2fcf491d6665743

                      • \??\c:\Users\Admin\AppData\Local\Temp\ggff0mp3\ggff0mp3.0.cs

                        Filesize

                        3KB

                        MD5

                        b45d51b75ba2ea57f9144540d15b277c

                        SHA1

                        93a9e794ed197cddd8078923bdf76d816e14c3ab

                        SHA256

                        5af1a96100851358b3cf1db306cb05e74df8103671fe388e8f39689bd4d70b2c

                        SHA512

                        39c733b335989ea49b78ed14b840a5e63d0bcb5fc10e61506de6a9b241994139bdc17effa8bf80930637c381682f9ed80cb6afd16bfe45a95f17e97a26967d8b

                      • \??\c:\Users\Admin\AppData\Local\Temp\ggff0mp3\ggff0mp3.cmdline

                        Filesize

                        369B

                        MD5

                        c6f3690b39c5738df74de096742cdb88

                        SHA1

                        6498b9c1b39d4bfb3d05933a8062163dfefb036e

                        SHA256

                        e6719a2ceb5b0df36021dba5c115a88b1973f5e7265104390d674f1897320e6e

                        SHA512

                        107c69845333701429992118737be23ef5d4f5e52f152924527d5ce86822f576673cadf48f7694c285d4272a204a34ba294a3088e2fe6a7a46049e55d0bd7895

                      • \??\c:\Users\Admin\AppData\Local\Temp\ljpmjala\CSCE0378E48BA1489AADED126855F25CA.TMP

                        Filesize

                        652B

                        MD5

                        23f9269f65e46676f773020e1f786f0d

                        SHA1

                        a98d4be02cfa0e45a27d3ca7595bda12713cde7c

                        SHA256

                        33bd359cbdaebf267bc593ab30de227a8d8af71f124380af0c772c3658262c0f

                        SHA512

                        6365574cf00010f2377189a95c91ef299e62390c0bf6a34bd0bda8a0b8bc710e247a6545b744eef6b939af4021b41f05108940597af2ca2eb4dd14c5ddc03dc3

                      • \??\c:\Users\Admin\AppData\Local\Temp\ljpmjala\ljpmjala.0.cs

                        Filesize

                        1KB

                        MD5

                        5b29a005ce6bb5a523d98ecfddc7c224

                        SHA1

                        3dda7f1e097097326ca2700a09fffa033b323bad

                        SHA256

                        9c17699d5de425fbfaa184c5a4fc95f6305c2665a41cec309404d4523be9022f

                        SHA512

                        31b417f4c0fff237bfe4d9b85c571d750eaf723a13a366eac672e8507dbf404b92f8d0c026d9f70898b2d629b1cf27eb6f9ac3e53889077d6f7369b67f35c80d

                      • \??\c:\Users\Admin\AppData\Local\Temp\ljpmjala\ljpmjala.cmdline

                        Filesize

                        369B

                        MD5

                        7c7ef30d65146a39afa2f58f1369aa5a

                        SHA1

                        b3ed440cd4bcc95c8bffc6c53285b47632a97ceb

                        SHA256

                        9476780b18c7aa564da09150dd2b9d8e27c175909d47f12eab8eb6eb5f3d0768

                        SHA512

                        6d9d39a0a07e2500614048bb4cb81237a1360f2fbbb559c14ed4a26abdd8e354a1767d2f0cd6099c384c1f187d150f75a677f35a9adbfaecb8393e6d50b46927

                      • \??\c:\Users\Admin\AppData\Local\Temp\luh01ag2\CSC527A1A73ED6141F4A84C5B8682FF172.TMP

                        Filesize

                        652B

                        MD5

                        89b235d2dbcb6f2eefc8a9514799bfe4

                        SHA1

                        1df16f8d7032d5d68cb7ca4fb50175afd305bbb9

                        SHA256

                        98d04e01f7e03ac97ccd4276d4524450b5e730accb165a730c567f1723a05e84

                        SHA512

                        e98d27b8d5a57186f63f7dadac5f17d2e2b75e3bacf8707cabf69dcc598495f830f519915028e7f3d124094bfc8aa4481aead3bab5ae7b9c974701e6d5535d66

                      • \??\c:\Users\Admin\AppData\Local\Temp\luh01ag2\luh01ag2.0.cs

                        Filesize

                        1KB

                        MD5

                        d8bf7e4044f0dc3a61b275dd7e109be2

                        SHA1

                        94672dd2a3611399b3cd75644ca4ffd69df51158

                        SHA256

                        0dcffbd6cfd1e5e499b37dde49d9c360bb129cdf15e76ec04470136c0467caf6

                        SHA512

                        b80c9964b78d60223da9e94b411d26e0f96bf69b9f0c45f71da57fa9e7b09e04ea139ec9b17c436bc792833f3fa71779a8def6b91a2c156af75bb87ed3e1d30b

                      • \??\c:\Users\Admin\AppData\Local\Temp\luh01ag2\luh01ag2.cmdline

                        Filesize

                        474B

                        MD5

                        cd67e91c97e1c09398b70838d6d1f028

                        SHA1

                        e6702d678537688cd21526c8eb3355929107f47f

                        SHA256

                        992d1e3f185ca32e11a827c91b13a4b3b3b4c7735d6412dbd302fb75fedc397a

                        SHA512

                        7aee4e079e1d11cabb85679d7ab86d46b65044bab8ccd0d2b8f503e9f1dc64dd47df07d5e37bf173e4e978074e8262b71894140c38bf0fa05ef633351e0cf963

                      • \??\c:\Users\Admin\AppData\Local\Temp\nes55zbu\CSC25858C2DF1C84AD1BA88DF1C5A61D24A.TMP

                        Filesize

                        652B

                        MD5

                        5a7eb9e1b076192f4b29f46b66fa1bf1

                        SHA1

                        93f9ae7fad3c013f1d46aba4f1a0ae568fde87f1

                        SHA256

                        8c199e15ace80f91df3089e5bfa804ed040bfb95e8e756244d7ff26d9f2c4b01

                        SHA512

                        d6e63de272aa30fa40dd3442258734bcb9881d1e832ac904436480b12b7ef1a58155163209d5db565a7b142fe8592327e40a460e627dabcdd679c74ccd21a954

                      • \??\c:\Users\Admin\AppData\Local\Temp\nes55zbu\nes55zbu.0.cs

                        Filesize

                        491B

                        MD5

                        8948c11b2b0c692db7c9fbf6d30f9690

                        SHA1

                        fa609a02a8b7970ee332e677ac2565f52c5138fb

                        SHA256

                        edd571b5162de1875f36edff6ef97b67dae2f7533fddb703eddee4bf209b1c0f

                        SHA512

                        82609c9a063f0c7c3487ed8fcceea8e4a81a70cd2a6a63b7f1de0020e6f585cd7e1e106b9bedc55397051e7e1cc00d437cf1b9d315282367b250946a78b52fc2

                      • \??\c:\Users\Admin\AppData\Local\Temp\nes55zbu\nes55zbu.cmdline

                        Filesize

                        369B

                        MD5

                        aed486749b305629ef17b55701161813

                        SHA1

                        ad4908715a62e16a68009edb757406fc896fec32

                        SHA256

                        299ad8cfd8f54ae75f997d93993ef586d163ab4308a5bdf918ea4760764320b7

                        SHA512

                        eb8cc3207ad3de81e5ba6c006bb4c7734e116d75149e4af4afb066c740f95c281b50e8fbe07be5eccaa6343ebb82bd2ad9aef0d7060c3a25d4c3413cdb770325

                      • \??\c:\Users\Admin\AppData\Local\Temp\pu0jgbao\CSC128346FCFA8B4196A84B3B148571ED2C.TMP

                        Filesize

                        652B

                        MD5

                        755efd5c2f1f47c7db77763d5c73c18a

                        SHA1

                        d424b16a5b5816494324b77c70ec0fea8804ca5c

                        SHA256

                        13ecaf345581f557aca90f6704cc72e1b3a47cfd1c0b61aa4dbc72dd9948d633

                        SHA512

                        7943d47fb80cfb28c6df1c4f8aa2a44a4c20886fa395216ee307caeca457129c4d65c8f14282ec6280ae439b285ba57c7e100644e91895a5b517cb7199da71e1

                      • \??\c:\Users\Admin\AppData\Local\Temp\pu0jgbao\pu0jgbao.0.cs

                        Filesize

                        4KB

                        MD5

                        b76ed05a2169cca7c1d580d592a2f1b6

                        SHA1

                        8f4f3001ea54aa47c8f268870932439ad6ece06e

                        SHA256

                        362c2f0b65870ec918c90fa0154bda1977e6bd9cb31c2491055b3ef10613b3ce

                        SHA512

                        25e6c858db6380604ed6009420e6f6fefe2ca880a8fefa54c043ba44591a42467553d8656e537758fed9e1bbe1d87d8eeee57973665ab4e2c11176c136e81fb8

                      • \??\c:\Users\Admin\AppData\Local\Temp\pu0jgbao\pu0jgbao.cmdline

                        Filesize

                        369B

                        MD5

                        c1bfbcf523d2283990584e4c73ba463b

                        SHA1

                        cf63db70f95eadd6261313457fd3fe686616cb8b

                        SHA256

                        e3cc95e0fbf906cce88bb4bd27540149abe6ceb736ffa79a5d6cb96e8dcbcccd

                        SHA512

                        cea4e4bbe2d72634733b872e1d7e62dce8c098bf7bbd14d1f96490066764486de5748ba2bedbb3b1689a8e5a0c3e6c14d448270ed5aed53550de8b48e7a1d375

                      • \??\c:\Users\Admin\AppData\Local\Temp\vk0texkn\CSCC5105C2053EC49B496FF27448A3391D.TMP

                        Filesize

                        652B

                        MD5

                        6b47f1e273cc61a39de13e48757389e1

                        SHA1

                        c09aae9802c450b440e0ebe845a54e7c080e7f9a

                        SHA256

                        156f012c1bbea80ff67a2dbba319c6f39e25e79aa6617362e9a14697da11a8c5

                        SHA512

                        d87df0eb2cc56871bd2177d97c10c1c895dc95921f376be48da2226b4845d19c79886a99449eb35a86dd3e56c6c33d382c449bd0e724cf850ffbdf6ffe567b36

                      • \??\c:\Users\Admin\AppData\Local\Temp\vk0texkn\vk0texkn.0.cs

                        Filesize

                        3KB

                        MD5

                        55af61a4a1274969107d46c68bc54a88

                        SHA1

                        77fd4fb2f1210db76d39f7fb18099c2da9d91e24

                        SHA256

                        678d0406ab36130c407e5d75477d83dacbe38b37d8fb09ee49cdb800e8586dac

                        SHA512

                        a7d19aefc2f7ae1eb70dda29e6ef64e75b576a437a53b5c04955676a9478523b3cde52864ccec73eefcb949a15c837ec040749a436243f12dcef194817552546

                      • \??\c:\Users\Admin\AppData\Local\Temp\vk0texkn\vk0texkn.cmdline

                        Filesize

                        369B

                        MD5

                        e54c40463a8d0b2feffbe8cfd36c9597

                        SHA1

                        e2434d383fd3e05a9b7325e1a112b10140a1b04f

                        SHA256

                        a388946ad1dd0f22da11ec95018111279454a7928c6d1d16a5488c5109441724

                        SHA512

                        43e049a93b90adb53f47875ed500a4ce72e9cecbad848009b523e8f174ffd7e52b00a20de6155dc543aec7c70bc51d5834af0e7d72f6e979676e5b0b7244ea88

                      • \??\c:\Users\Admin\AppData\Local\Temp\ykd3dypp\CSC132BD58B5935471C852189177FE0ABDD.TMP

                        Filesize

                        652B

                        MD5

                        dd60147685eeb1ffac8548b2d5e2589b

                        SHA1

                        dc0328e5ca55c3618a73dc78c8e142dfb7d2cef2

                        SHA256

                        c0e3b41a8dbe3d5049fba07973cfaabbe24c17e4680ec0d68b2b1381cd942fc3

                        SHA512

                        a6e772fac71e84b99cfba35692998bc9ab61b296f8864b7e4141414c92b325106a24a708aa89d04380039e2fa12ce662c8ad54db15917c2025f6aac100c1ee35

                      • \??\c:\Users\Admin\AppData\Local\Temp\ykd3dypp\ykd3dypp.0.cs

                        Filesize

                        2KB

                        MD5

                        b6938b17a41a844d693dfa48871cea49

                        SHA1

                        766bcbab3987d769aabe675489a3a20c52ea7b3b

                        SHA256

                        ab342ea0a8177af50f2a116f85df9064603ebf929081279409f2a19b97179aa2

                        SHA512

                        c0f14964edd8743d0d383ba763d03485b70d4783a0ada7c87a1e4f443c541496d4386097b6550a03c23153e036ce10a39976be69b187dd95ec27fcbd7b9b62d2

                      • \??\c:\Users\Admin\AppData\Local\Temp\ykd3dypp\ykd3dypp.cmdline

                        Filesize

                        369B

                        MD5

                        d5c9aa9755d5a1aa5508e5b27ff1583c

                        SHA1

                        c608c73106537f21c31a80a3b1bbb8270e52ebaa

                        SHA256

                        7b142a8bb5e2710687d97c1fd04c17c445318e33010adef6113a5b116f5fa177

                        SHA512

                        a5879dba992bf69bd3e3d7dd522459030e1453d3f08b2dbd3baa043f454c1f370b74ef31ccd26c725ddfa3631fdfe23c9f2960fe5b31e941d52a050eacea4cb2

                      • \??\c:\Users\Admin\AppData\Local\Temp\znmfpo1x\CSC987FAE816B43208CACB01C3DB69AAB.TMP

                        Filesize

                        652B

                        MD5

                        2827610fc273280277c54ec8920b4733

                        SHA1

                        89f532d7e1f890c5353f988dad3521613ed1e2e0

                        SHA256

                        e85bada0fb45de872842e45707e056ced03737f254f3258a1ca5e8347a8f5e4a

                        SHA512

                        5ef925330ce9921bb0d57ebd265591e999df434809da699dca13d3a777b1cf307fb570d794ad9c94af2f286c6d7b859b2924b5e3abfef6bce0fdfb0be1af28b0

                      • \??\c:\Users\Admin\AppData\Local\Temp\znmfpo1x\znmfpo1x.0.cs

                        Filesize

                        1KB

                        MD5

                        f15c3c3a15448bb071a67230294f2dcd

                        SHA1

                        77006af330e2cd5f08ffd2b5cd6c0e6232add424

                        SHA256

                        98d5db570c23af71e8cee9cd7dde564265bcd2c975cca28095626370ae795155

                        SHA512

                        6c7bd04b7965f17aeff8fae96a3882a72f1faf20c68a60dcf14cd000b60468b2e9b8a17c183c30086dd1b6a6c030337ed53655aa719a463f4d9ca93c23f126c4

                      • \??\c:\Users\Admin\AppData\Local\Temp\znmfpo1x\znmfpo1x.cmdline

                        Filesize

                        369B

                        MD5

                        59fca3aadf492180bdc7c1b1804520e6

                        SHA1

                        38cbd86b6c67b34ddf42c884ab29a63bb6c0c989

                        SHA256

                        62af071595819f25e596af8401703d0f1c636f10fd9e2780a8fa67efd9232182

                        SHA512

                        5346dddc52df6ea4200a12bf76d3cf1ef2ae94b902dd27b88aca68028cef4377082a1c30b95edb8f7b67fd75d54d676c483f62a28e3bf793c2b461f982688b59

                      • memory/372-12-0x0000014503B60000-0x0000014503B70000-memory.dmp

                        Filesize

                        64KB

                      • memory/372-11-0x0000014503B60000-0x0000014503B70000-memory.dmp

                        Filesize

                        64KB

                      • memory/372-10-0x00007FFAB1D00000-0x00007FFAB27C1000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/372-147-0x00007FFAB1D00000-0x00007FFAB27C1000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/372-9-0x000001451CA50000-0x000001451CA72000-memory.dmp

                        Filesize

                        136KB