Analysis

  • max time kernel
    79s
  • max time network
    105s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-06-2024 19:25

General

  • Target

    TS_MissingPatchCache.ps1

  • Size

    11KB

  • MD5

    1c3130b9ab767b08ea09fc1cc97de844

  • SHA1

    5ca449dcae2d457b4d1b0f2f317c03c753ef264a

  • SHA256

    7fdefec9551db1f40a54d397c441bc4e5505eb8401aae148e90437ece414b296

  • SHA512

    df7b89d330ba0e21b57032fd646ba14eef81f0afb2f1bcfbbbd4cd0990e2081495017fdcf2b89e63bb35bfb9a78e6ac52436537b0b7d6bca775722dede362cce

  • SSDEEP

    192:jd0/OrwjHUDr5THgkYFQwHx7cprxi8RZkeuYT1bLKRoguwCsXsoz+ppjGAwThhj5:jyWrwodAkYyU7Mrw8Rme/T1bOw7gs3za

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\TS_MissingPatchCache.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1952
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\fuiffkxt\fuiffkxt.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2976
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3623.tmp" "c:\Users\Admin\AppData\Local\Temp\fuiffkxt\CSC498862A3870049FCBEC253443DFF1D19.TMP"
        3⤵
          PID:4912
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\4ncmt5ct\4ncmt5ct.cmdline"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4808
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES36B0.tmp" "c:\Users\Admin\AppData\Local\Temp\4ncmt5ct\CSCA300263F4C2D46E5BC27F7593BBB1C45.TMP"
          3⤵
            PID:3600
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\sj5ryeiq\sj5ryeiq.cmdline"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:528
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
            C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES370E.tmp" "c:\Users\Admin\AppData\Local\Temp\sj5ryeiq\CSCDA3AB6D1C0154C308B2349AB3DD23237.TMP"
            3⤵
              PID:2892
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\rk0pbyiv\rk0pbyiv.cmdline"
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2544
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES375C.tmp" "c:\Users\Admin\AppData\Local\Temp\rk0pbyiv\CSC25B0CCB0B90640DDBE280F774C694C.TMP"
              3⤵
                PID:5088
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
              "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\wcfm2qnw\wcfm2qnw.cmdline"
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:1512
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES37AA.tmp" "c:\Users\Admin\AppData\Local\Temp\wcfm2qnw\CSC8E5D5638501848C8984C1D605ED143E1.TMP"
                3⤵
                  PID:3728
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\evgbaomn\evgbaomn.cmdline"
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:540
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                  C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3808.tmp" "c:\Users\Admin\AppData\Local\Temp\evgbaomn\CSC3A3805E7EFFB40678081238B6B5FB12A.TMP"
                  3⤵
                    PID:1408
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                  "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\dtumpebs\dtumpebs.cmdline"
                  2⤵
                  • Suspicious use of WriteProcessMemory
                  PID:4696
                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3856.tmp" "c:\Users\Admin\AppData\Local\Temp\dtumpebs\CSCFD02DE31CF74D3D8AD6E8A3D1E3183D.TMP"
                    3⤵
                      PID:3156
                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                    "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\jb3ylohk\jb3ylohk.cmdline"
                    2⤵
                    • Suspicious use of WriteProcessMemory
                    PID:1808
                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES38C3.tmp" "c:\Users\Admin\AppData\Local\Temp\jb3ylohk\CSC9FFF4053EAD441B09896A622DB231654.TMP"
                      3⤵
                        PID:3684
                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\kehq1vln\kehq1vln.cmdline"
                      2⤵
                      • Suspicious use of WriteProcessMemory
                      PID:4308
                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3911.tmp" "c:\Users\Admin\AppData\Local\Temp\kehq1vln\CSC76DC0F60C5084AB6805F352E6253AEFA.TMP"
                        3⤵
                          PID:1216
                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\own2ekrc\own2ekrc.cmdline"
                        2⤵
                        • Suspicious use of WriteProcessMemory
                        PID:3700
                        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES395F.tmp" "c:\Users\Admin\AppData\Local\Temp\own2ekrc\CSCE29EACBB5AA4D19B7BD945246F58E44.TMP"
                          3⤵
                            PID:1880

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Temp\4ncmt5ct\4ncmt5ct.dll

                        Filesize

                        4KB

                        MD5

                        19d00ba16118975f4523cd0fa77ba6bb

                        SHA1

                        bf0186c4fef700c26e0dd03d2a508e537e6bc682

                        SHA256

                        a79a6ac00d8558a4ee2a933ff3d2a582ea402255943a583fbfa69f1d5f2f6273

                        SHA512

                        29c7783e741a41ccd6c99600896466207d09ea904ace0a5273d47de6286fd0e9c9726b7310c5707c152bbdb38d3eeefece98fc14914dd1ec2f3cbf781f72ec73

                      • C:\Users\Admin\AppData\Local\Temp\RES3623.tmp

                        Filesize

                        1KB

                        MD5

                        43c62728b85b80eb006e4cb5212bc978

                        SHA1

                        53d763431983a75926352e5ec03d792f107d278c

                        SHA256

                        0d7176d6f9e6f14d2f81450eab553c95e8f729cf1c52d9e611122b98ff1a2290

                        SHA512

                        f437daf658ef1d0305ce214dbe1c5b4ed45b03ecb89825e58f6532caecbc98db3b91ed7e461cfc8742ef5d7cd7c42c50bbe7705fa72710580154c15bee2c486e

                      • C:\Users\Admin\AppData\Local\Temp\RES36B0.tmp

                        Filesize

                        1KB

                        MD5

                        a6519abb9ad970536ced2dec76b1ad2c

                        SHA1

                        8c0b0c8313192c8e8b04900b5d5ed264c4f2c8e8

                        SHA256

                        d05ef39e24cfbbaa032271b5ab66406d9c44e0c3033b2677541b94198269ce8e

                        SHA512

                        245ab3b3d26ddf2ea0bc7b7d696d1d6f622360db06e808c07a9a8917211a93aba1de733088151632d2d008460a7909a01ebae64827445566e96acf257d90bc25

                      • C:\Users\Admin\AppData\Local\Temp\RES370E.tmp

                        Filesize

                        1KB

                        MD5

                        fac2617964078a0d1571bae2991c5af5

                        SHA1

                        7f971694882c35e9c01c98576f1c15cdeefadc45

                        SHA256

                        6f3568ee9b74c591ac2c41adadd08be3d5f4b10c36a009178031860dea70a3fb

                        SHA512

                        880b5b30fba1dfee60370bbb82a9625bb510e6f75c0a90b1e8cef4dc25ffa5f88f2b960ef351561652b124ebaf20aa3be5d32375c12119681d37af83a9e36afd

                      • C:\Users\Admin\AppData\Local\Temp\RES375C.tmp

                        Filesize

                        1KB

                        MD5

                        47118ac1fe4aa300af24f444b408f046

                        SHA1

                        6faff8920ccbd3305e62ebb4f987eb072ffc95a0

                        SHA256

                        29d477ba1f5aa4b3755f38f97952da03d75fb92eef9175fbc6f1b3e9bba38cbc

                        SHA512

                        1b532909ccbb501f73fbf180f2d1ab93cb901f12a42b6211ddbeb6b71d8de1d9571f6f2ed74b3bdfeba4007cd96af89b77cc9720bf6d6d00e37a7b51fd937636

                      • C:\Users\Admin\AppData\Local\Temp\RES37AA.tmp

                        Filesize

                        1KB

                        MD5

                        9ab91057a2060edbace597151f93455f

                        SHA1

                        e0c44d384cec01f526fe2d83cb34e0e50d862415

                        SHA256

                        6be6df99da8bd519c5045d819138307f9396eb0ea16494c79fbe10ef005d0199

                        SHA512

                        65aed821b5927014e5c6ca3a30091fa22295ff4606fda57b68bdeaa7be3eb9d9c668c3893397f3c113f799338b62bc32d16b6206fddf192078aa1752fba16b71

                      • C:\Users\Admin\AppData\Local\Temp\RES3808.tmp

                        Filesize

                        1KB

                        MD5

                        dd72e944cbd53e6f63e6e56e30d96016

                        SHA1

                        332f6b7afe271dab8b894c53afc542ba60a9196f

                        SHA256

                        cdae3b9f0c6283ab9ce11bddc7e581c2b43a2d624a05ee8b2b8196a5d035e582

                        SHA512

                        895f095f65fc2d463e7579a46b80a9d95f470b4e07e1fc73c72c09a67b37a0bc965446d3b1499744d8f552852ab3054a5c4cfa370bbd1b91aacd9e4458f223bd

                      • C:\Users\Admin\AppData\Local\Temp\RES3856.tmp

                        Filesize

                        1KB

                        MD5

                        a63431fce1029a2117903b040582b533

                        SHA1

                        0c478a5369bb5fd45cafd7ccdb3525a7c40fa9bf

                        SHA256

                        7c06a9d134704005e40230b750dd48c50523699827aba30a0d564bd0387d1ff1

                        SHA512

                        ff22f93af4641b45a07b5e3b080b1dad4d85a9dd93c6f771a6c1f843ac15614166d3665973fa28c2076c7671a4346a903884b3b18bbf859df082183d9676d0c1

                      • C:\Users\Admin\AppData\Local\Temp\RES38C3.tmp

                        Filesize

                        1KB

                        MD5

                        07d88b8b97af6f1b131e4369f8aa9810

                        SHA1

                        d7ecf35c99fb786a26c80f0a3d2c9c402d5497dd

                        SHA256

                        73ed561cfb199c3aa3309265f3a79011df6695a55e2055c822a4d1dc26da7923

                        SHA512

                        dea08ce6a9445ad433ae1f3bd6fd8f6e682a2c413485f8b3b607a7050f7fa2fd88aebc566187930bee834ff3f9fca82c582a437ce12b1b18234d6931072ce830

                      • C:\Users\Admin\AppData\Local\Temp\RES3911.tmp

                        Filesize

                        1KB

                        MD5

                        c4d743b625c8b8e208401e93c76c7fb5

                        SHA1

                        87ea129c49c1177d3d52bd170ef551db13fe0899

                        SHA256

                        583bea20eb5a6dd6649d9a7cbd9a14a111c4f3c9c2de5b17e1bf0628968f72a7

                        SHA512

                        96677789d2470e3f3f22c730fb7e8c7ec2fe76ca56a2908f0137b7864948097456fd0e172221e930fd4b986a1b8b30f59933fad54e9f6a10ba5904a818365199

                      • C:\Users\Admin\AppData\Local\Temp\RES395F.tmp

                        Filesize

                        1KB

                        MD5

                        507d48c351188050c55d581181bb6efe

                        SHA1

                        9b69fae68032b2dcac8a7f7742ed0ca382715b1d

                        SHA256

                        cab1bcb45971995e06bcb5f4ae15a32e5dd12c8bd868f8c5b92cf073efc6bdf8

                        SHA512

                        964b7c0a9d16d78f5902ba095554ee3e77cb39285d9aef080e18ea29fe15376452aa9afd208bf142057116d1a973729b889abd10610b1dff53f582a1361e08ba

                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_eo1ci1hi.3sa.ps1

                        Filesize

                        60B

                        MD5

                        d17fe0a3f47be24a6453e9ef58c94641

                        SHA1

                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                        SHA256

                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                        SHA512

                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                      • C:\Users\Admin\AppData\Local\Temp\dtumpebs\dtumpebs.dll

                        Filesize

                        4KB

                        MD5

                        68aee77435d8cb4152bb6c744fa9d537

                        SHA1

                        4fae5f3a4fb9cc6c35ed8059f1d14459b2e0afb2

                        SHA256

                        6528163b0fa5f7e3ee4e4bc597840c260f6003ba543eedc6ca9ae894b75035af

                        SHA512

                        e6de478952c339707cfe0c6527b9642db28bea0c9f23aea7d007713cf6b44c70eed8f6a0e9df7465b8d5d38bb499dfbbb7089831b9e7dd75fe9aa25e184e3c49

                      • C:\Users\Admin\AppData\Local\Temp\evgbaomn\evgbaomn.dll

                        Filesize

                        4KB

                        MD5

                        70908a41d9a6cc6c06e1f6b215bd9d90

                        SHA1

                        0bd51925409cc7525cb542817952b60f554efbbe

                        SHA256

                        cf6d09a6e37385b1de5d0eff61c07e52f8b77ade471b73eb77908f93e7493b33

                        SHA512

                        e1b0f21bb56df1ea6c934da24612cf308dd1844971168346674f9ecd017433cd5743ae3d3d7d6065e50651cf3ab78d227252841543f3989f29d7178332be3dd9

                      • C:\Users\Admin\AppData\Local\Temp\fuiffkxt\fuiffkxt.dll

                        Filesize

                        3KB

                        MD5

                        adcd6415ac790761dfd6258d77810f00

                        SHA1

                        2f60c748c9f46b5f56b760dc7f432748df95a43c

                        SHA256

                        f746b3537c339f8e8a17c7870b8095fe0c76bed27e41cbe3200e01b746ff16e0

                        SHA512

                        8bd151206db13251285ebaba0d681cd1f0d5d7efeab1e4193f2a4262340255c0c62d6aa872c45a6fa8641e8d0bd718e77acbabf1dda136d96c94810f95d6fca5

                      • C:\Users\Admin\AppData\Local\Temp\jb3ylohk\jb3ylohk.dll

                        Filesize

                        4KB

                        MD5

                        94864286aae8503e2dbe3f33bd9232fb

                        SHA1

                        54e9800b0e24172b6590d4c465f40b3b8034c6b1

                        SHA256

                        f32283854c9db7575fac2cc23a9ab9604a9e262f8bb37b8cfd0b41eb05a26c45

                        SHA512

                        377f3bff6b5625b0bda6d7f9d5c02cf9dc30af59b5369d29d596506655e215ff331e88f1f7ab9362322e234f9b7064db03fcc7a7b06c7bc6a9d757a6345b9b46

                      • C:\Users\Admin\AppData\Local\Temp\kehq1vln\kehq1vln.dll

                        Filesize

                        4KB

                        MD5

                        782520ddc93aa3c4210d135ab3c26d01

                        SHA1

                        9ddc7ab65e9aad49dc6970c4013fc1ea81610f55

                        SHA256

                        411b569e85a53cf948c89cdf1b64c403f582101edb9d049544d6e2f8b23f620d

                        SHA512

                        735c3a59a15c9df3dd72597875effd6977ad0a3f21813658172d348879e16e6e4e3f8a3cc9a51e8bb708191fa5ffe0ab41caded0a32532f3cec7b7ec13226952

                      • C:\Users\Admin\AppData\Local\Temp\own2ekrc\own2ekrc.dll

                        Filesize

                        3KB

                        MD5

                        55012eccb96556b500f0c68c19bae339

                        SHA1

                        a91984d28e5cd102b7de628881bb3c1e6de81144

                        SHA256

                        0dbb6f3b395469d4e090adcee3f4731ec64ccd14ceb3383b7479e017669d0e01

                        SHA512

                        ac5905381218c51c145f215f60a01e3de28d4fc8d110396ac741de74c08a639e88890fddb7e99061291618180154df2db34d48315d6d4d7863640c3fceb6d38a

                      • C:\Users\Admin\AppData\Local\Temp\rk0pbyiv\rk0pbyiv.dll

                        Filesize

                        4KB

                        MD5

                        b5f5c2733389f44f9d9eb0582eb8306a

                        SHA1

                        a446dc3fc06c3098df09d009134e5b233d6af411

                        SHA256

                        3820541708bbe2c834796cc3e3cde2f05a337a0386dc68acb1dca4c824376833

                        SHA512

                        94c7bf4dd6444b76efd3c7178a5a0f34626e6debe06865793aea62bb0036e40d55f26508d1f07fc6842b30a32be8365dc9fd18e67f6b59fc1d2d324c501c4ad8

                      • C:\Users\Admin\AppData\Local\Temp\sj5ryeiq\sj5ryeiq.dll

                        Filesize

                        3KB

                        MD5

                        0900ae2a8e755052f88588948ad0e2a8

                        SHA1

                        f46f8c21e4b20d7da65820033a4eb6e0b6ddb409

                        SHA256

                        9e10ce4e5c3813eb058f9d48f60d0b81756e290751f95189d0120502cf2e61ac

                        SHA512

                        876e76129ae27a91440cc1582da7e7675eff2203f1d08245ded1bf1356d89411f40d6ed7ee84b5220f644964d9fee39e7db3089db039f880217d144395f1459a

                      • C:\Users\Admin\AppData\Local\Temp\wcfm2qnw\wcfm2qnw.dll

                        Filesize

                        4KB

                        MD5

                        ab7bc40999b428b36ebaa4bcb61b691d

                        SHA1

                        ca5d9d33ba12952daf59c60cfa949cb909436482

                        SHA256

                        d3caab883c84d4a25f8e99696eb74b074bda65d80e089c782d0634715963ad9f

                        SHA512

                        c5e6190ccec348206e43441565b07375d29afd44ea95302e9499b6a3cb70905bfa11af9900f9f592f815e647af97dc9399c67b12a42b29f72bf2ff9cbdb47b0d

                      • \??\c:\Users\Admin\AppData\Local\Temp\4ncmt5ct\4ncmt5ct.0.cs

                        Filesize

                        3KB

                        MD5

                        b45d51b75ba2ea57f9144540d15b277c

                        SHA1

                        93a9e794ed197cddd8078923bdf76d816e14c3ab

                        SHA256

                        5af1a96100851358b3cf1db306cb05e74df8103671fe388e8f39689bd4d70b2c

                        SHA512

                        39c733b335989ea49b78ed14b840a5e63d0bcb5fc10e61506de6a9b241994139bdc17effa8bf80930637c381682f9ed80cb6afd16bfe45a95f17e97a26967d8b

                      • \??\c:\Users\Admin\AppData\Local\Temp\4ncmt5ct\4ncmt5ct.cmdline

                        Filesize

                        369B

                        MD5

                        24ebe4be5014656c4954180290b7279f

                        SHA1

                        31be1ddb8d8162573de76cbcb7352fc9c7795525

                        SHA256

                        cb277493cbe0fd3b6e6522742c2c87740ef5ad43f34bce8d4ec4338128ff4518

                        SHA512

                        c7e08ecf7e3ef3a78ce6209a15cda41d70ab1b2169bfd9a29ba0a1ae256d5bdc40de41f5d6952090ff23bd5c4693d45c680ccdf564a956f10ec9616da7c3d196

                      • \??\c:\Users\Admin\AppData\Local\Temp\4ncmt5ct\CSCA300263F4C2D46E5BC27F7593BBB1C45.TMP

                        Filesize

                        652B

                        MD5

                        cb53132e898ca587f77ca2d30107fba8

                        SHA1

                        773124b8771c722ff36dd4f1bd34caeddc1b9cc0

                        SHA256

                        f789ee0fa80765ed65f1a7a1005cea6e5bbf9e8e27fd864a2c4ea6c6e04dd2ec

                        SHA512

                        476437703c0d3d65d44a933cc5a3464abd9252562433e740edc70d2efcc498d9729f872a6baafb549de79b80f81f1397cd8c9f23e89222ccdff06216e39f9e5e

                      • \??\c:\Users\Admin\AppData\Local\Temp\dtumpebs\CSCFD02DE31CF74D3D8AD6E8A3D1E3183D.TMP

                        Filesize

                        652B

                        MD5

                        e9d21883a3767852d35f329af260dbc6

                        SHA1

                        e6a06c1dbff087f8b540c399ea0572e103d0da4c

                        SHA256

                        1d53d0e2a27e73e80c17e3fc532b6cd7e5a53342fe12d414b0655f1119e50c28

                        SHA512

                        fdf27213bf766d8af953c573f029d4e55a4e03d75cdef3aad93c080d11cd52fb773ed3f0d8923724b83a70502d8f258ed75c3c1a3ab8e065f6f676e18876df35

                      • \??\c:\Users\Admin\AppData\Local\Temp\dtumpebs\dtumpebs.0.cs

                        Filesize

                        3KB

                        MD5

                        a1b43ae226500e2098274f80a3f5994e

                        SHA1

                        251ce67388cc5aaeffd1803fbc488ea83d8cbbb9

                        SHA256

                        a608d8f27909b0b4fccc9944d3e78a44b0d35add11bda78cfbde45882efc249c

                        SHA512

                        32b7c5bbb6f5940f88b909a1dad6925d9267da5efd427c4d7d6acce19628986722e8a0c48dc8afb6ae6f33d1b99840505148d683f71cdb36cc7935c6e64efb4d

                      • \??\c:\Users\Admin\AppData\Local\Temp\dtumpebs\dtumpebs.cmdline

                        Filesize

                        369B

                        MD5

                        07a03c004958f508bb01b936ca85ab6e

                        SHA1

                        4cb563edc70a8cfda44d7bd4f6bd7fa6e27a9747

                        SHA256

                        05881adcc11eaf487df5b0429efc6e633bdd867ba2286ed15dd9d86c1849843a

                        SHA512

                        d145f92efba7acd2186cb67888444787861b753d43e6e7e56bad4cd51069762719bbef99897295ba55aa8836c9281c5f70340436661e5b4edcb5371d5391e33b

                      • \??\c:\Users\Admin\AppData\Local\Temp\evgbaomn\CSC3A3805E7EFFB40678081238B6B5FB12A.TMP

                        Filesize

                        652B

                        MD5

                        043437c24ddb93315431e763b40ba153

                        SHA1

                        baeb9199945351867882cac1ae41f12e33072add

                        SHA256

                        743541996b28eaa2f3d5cb1c82e5745a3fc791172aee37047d3a309b2b1d1c83

                        SHA512

                        8298a3acfc50fc5a2d2e0072039eec0d7be8d20b1bb450d9a952f9d93a051fcf802f270097e2d31eedf27cf174c722cf4838fddb299d1a10442c06965ac1d24f

                      • \??\c:\Users\Admin\AppData\Local\Temp\evgbaomn\evgbaomn.0.cs

                        Filesize

                        1KB

                        MD5

                        f15c3c3a15448bb071a67230294f2dcd

                        SHA1

                        77006af330e2cd5f08ffd2b5cd6c0e6232add424

                        SHA256

                        98d5db570c23af71e8cee9cd7dde564265bcd2c975cca28095626370ae795155

                        SHA512

                        6c7bd04b7965f17aeff8fae96a3882a72f1faf20c68a60dcf14cd000b60468b2e9b8a17c183c30086dd1b6a6c030337ed53655aa719a463f4d9ca93c23f126c4

                      • \??\c:\Users\Admin\AppData\Local\Temp\evgbaomn\evgbaomn.cmdline

                        Filesize

                        369B

                        MD5

                        d4a2bf1c7f96fb8f1f761f7ba9741b16

                        SHA1

                        4c769117a0ad78583210ee85f4521de17db8af1b

                        SHA256

                        274208ff314a5e7a6db3ce1fc17d4045a2b3a6f46a391b8131f56a43bdc3667c

                        SHA512

                        adc312ea986049d74c353e806d670e38416d77b9ee550700be47b1db53217e3858cbb0416f3ce6784eeeb40cac10bcf4b69a8a3fd5b5776c99996941b3428853

                      • \??\c:\Users\Admin\AppData\Local\Temp\fuiffkxt\CSC498862A3870049FCBEC253443DFF1D19.TMP

                        Filesize

                        652B

                        MD5

                        927747f7c88ab59184e28ab239699fcd

                        SHA1

                        266e213b440759df53cfb045c8e72864b212c259

                        SHA256

                        f7b51de49e060122e36f10a4b051f1174e3b8bacdde6b8d7bae0787c4f43ea51

                        SHA512

                        f3e0628d11c3b57874c7ad69ab0ae9daca6c179c3285b8956ef0120d6f050fc43b228eec0629c58c626ef264bc992ec0cede752aa3a23d6b9656e901083059bd

                      • \??\c:\Users\Admin\AppData\Local\Temp\fuiffkxt\fuiffkxt.0.cs

                        Filesize

                        1KB

                        MD5

                        d8bf7e4044f0dc3a61b275dd7e109be2

                        SHA1

                        94672dd2a3611399b3cd75644ca4ffd69df51158

                        SHA256

                        0dcffbd6cfd1e5e499b37dde49d9c360bb129cdf15e76ec04470136c0467caf6

                        SHA512

                        b80c9964b78d60223da9e94b411d26e0f96bf69b9f0c45f71da57fa9e7b09e04ea139ec9b17c436bc792833f3fa71779a8def6b91a2c156af75bb87ed3e1d30b

                      • \??\c:\Users\Admin\AppData\Local\Temp\fuiffkxt\fuiffkxt.cmdline

                        Filesize

                        474B

                        MD5

                        07de981deb311c3fac76cd9db78d5d73

                        SHA1

                        2bcca186a222271eceb13476ee326fd96aed0e20

                        SHA256

                        137f8637900d9b0cdb460f8fb4f100fb64c4e00d98bdd9e8d241456dd4925273

                        SHA512

                        3de4f940d01d69bc3726f8d848819c2f4dd25df69bc183785b7f0d8075aeb9835cbee6836ea4dc645108d3b789c0f5368e016978b8b7b3c35b8e6d9ab7696b09

                      • \??\c:\Users\Admin\AppData\Local\Temp\jb3ylohk\CSC9FFF4053EAD441B09896A622DB231654.TMP

                        Filesize

                        652B

                        MD5

                        c11a1a8eb3ea061a8c255d25f77897be

                        SHA1

                        c586cf3b314bd4b1fa45c69011e52ff72ac5834a

                        SHA256

                        7ed3a0090577afc4b8d701707e9a00f52dfae98d1050f64fa235e67dd142c160

                        SHA512

                        5a4b2da04c7693d4a75118ad7aad4dc832f8f5a822f1486f9dd7d37b6856fec73c48db1c2ceb93fcba46bf817d4be53c4e948ffb45464fbcb1ab5b18614e6d81

                      • \??\c:\Users\Admin\AppData\Local\Temp\jb3ylohk\jb3ylohk.0.cs

                        Filesize

                        3KB

                        MD5

                        55af61a4a1274969107d46c68bc54a88

                        SHA1

                        77fd4fb2f1210db76d39f7fb18099c2da9d91e24

                        SHA256

                        678d0406ab36130c407e5d75477d83dacbe38b37d8fb09ee49cdb800e8586dac

                        SHA512

                        a7d19aefc2f7ae1eb70dda29e6ef64e75b576a437a53b5c04955676a9478523b3cde52864ccec73eefcb949a15c837ec040749a436243f12dcef194817552546

                      • \??\c:\Users\Admin\AppData\Local\Temp\jb3ylohk\jb3ylohk.cmdline

                        Filesize

                        369B

                        MD5

                        4c83e29b530378ea2913f5513322baa6

                        SHA1

                        1a74144115f763c5b1834f064e6929ce35c47224

                        SHA256

                        4b50b445f02d34679f24781ecb96ced945ed07ba9af94728bb5ec38e311a2392

                        SHA512

                        34bc9a7b8dece90cf414509a2cec3d17d3692afe46b48872c9eb9165aca5c1303830d6e2298f0408a285305c4cb4ee1e10b324cac61ceb899047c41672abe5c6

                      • \??\c:\Users\Admin\AppData\Local\Temp\kehq1vln\CSC76DC0F60C5084AB6805F352E6253AEFA.TMP

                        Filesize

                        652B

                        MD5

                        abb4ef2c5b780dad30441e68b79523da

                        SHA1

                        549f6a5a2385a331ef84f3220349c253b8ac7644

                        SHA256

                        9ffa6dc69e95d27c6b677c62644882388663df432c71ab6d1f0e8c7e1cde346c

                        SHA512

                        932ad7e0297d510d84d0766a0553ee9ed81a3aff24b48a8591768e619d9d06e961e3a857588de1f2832e1e79b8e0aae33452bba6b876dee42e001328e9b57567

                      • \??\c:\Users\Admin\AppData\Local\Temp\kehq1vln\kehq1vln.0.cs

                        Filesize

                        1KB

                        MD5

                        5b29a005ce6bb5a523d98ecfddc7c224

                        SHA1

                        3dda7f1e097097326ca2700a09fffa033b323bad

                        SHA256

                        9c17699d5de425fbfaa184c5a4fc95f6305c2665a41cec309404d4523be9022f

                        SHA512

                        31b417f4c0fff237bfe4d9b85c571d750eaf723a13a366eac672e8507dbf404b92f8d0c026d9f70898b2d629b1cf27eb6f9ac3e53889077d6f7369b67f35c80d

                      • \??\c:\Users\Admin\AppData\Local\Temp\kehq1vln\kehq1vln.cmdline

                        Filesize

                        369B

                        MD5

                        8357c21e26d9ca003bb996ad4b9d2cfe

                        SHA1

                        b423f194161ed333362f5e50cd02a370aa7cb118

                        SHA256

                        2aa13d8a16507022160b6f7e9d2cc0c07ab93d9213623c034929c82520b39a77

                        SHA512

                        261d38f525c21c1becb47c3760cb3a9ddc3cb17006b92a68813557741b789d4ae60e501ba0e0d126c99f6cd57352f5fa92998f372c6b6cfa0ae8f36cfcc902d9

                      • \??\c:\Users\Admin\AppData\Local\Temp\own2ekrc\CSCE29EACBB5AA4D19B7BD945246F58E44.TMP

                        Filesize

                        652B

                        MD5

                        309a1415566e348fcbf3a183e94c3753

                        SHA1

                        55bf86981ed8b9e725ba7f1b5dc1578066640d78

                        SHA256

                        843e3c0f73eb699e1580f725e56b29793ee36f59698a4e5826c8fd57299aabfe

                        SHA512

                        658d89c4e60dc3a842209177b97e54d8a4e53e3a162882ae525ce3e702aebb6e727e6847060525a4e11256a72871f44f0d1fbac0628bd3bedf0362352da9408e

                      • \??\c:\Users\Admin\AppData\Local\Temp\own2ekrc\own2ekrc.0.cs

                        Filesize

                        491B

                        MD5

                        8948c11b2b0c692db7c9fbf6d30f9690

                        SHA1

                        fa609a02a8b7970ee332e677ac2565f52c5138fb

                        SHA256

                        edd571b5162de1875f36edff6ef97b67dae2f7533fddb703eddee4bf209b1c0f

                        SHA512

                        82609c9a063f0c7c3487ed8fcceea8e4a81a70cd2a6a63b7f1de0020e6f585cd7e1e106b9bedc55397051e7e1cc00d437cf1b9d315282367b250946a78b52fc2

                      • \??\c:\Users\Admin\AppData\Local\Temp\own2ekrc\own2ekrc.cmdline

                        Filesize

                        369B

                        MD5

                        1a823232c6a04aed3d51b7669f35fd47

                        SHA1

                        10116163239b01bf74965c89e2b1f291b9ad54a0

                        SHA256

                        5b8846e7e94ae433952ecff1847e10959dfc5ec2af51f68f7d8021018f18b748

                        SHA512

                        0cc2fbce23b28642a0603582b4f1182ad71c297bcb9c284af9f9f49c2255579f0cc50f2282a16b28f433c9bdba1c77b08891833c98d5b08690af7d7969edc4f2

                      • \??\c:\Users\Admin\AppData\Local\Temp\rk0pbyiv\CSC25B0CCB0B90640DDBE280F774C694C.TMP

                        Filesize

                        652B

                        MD5

                        8750a578a8c0fb470204dca059b22b3f

                        SHA1

                        f9cfcd5c7e4b8a76fec14033831df04256ee5eb0

                        SHA256

                        09b6b9df13cff7b6a8c4b596f3842bd7d5bbbd6aa1508840f779638d103de293

                        SHA512

                        642c64016cb2fff252653c161c5f615630d57cbcf83ddd4a4544589a51f269b6049650beb3c75f3dc6752cf1e7d771503e80bed1b6a04645092ecb1e7ef06bab

                      • \??\c:\Users\Admin\AppData\Local\Temp\rk0pbyiv\rk0pbyiv.0.cs

                        Filesize

                        4KB

                        MD5

                        b76ed05a2169cca7c1d580d592a2f1b6

                        SHA1

                        8f4f3001ea54aa47c8f268870932439ad6ece06e

                        SHA256

                        362c2f0b65870ec918c90fa0154bda1977e6bd9cb31c2491055b3ef10613b3ce

                        SHA512

                        25e6c858db6380604ed6009420e6f6fefe2ca880a8fefa54c043ba44591a42467553d8656e537758fed9e1bbe1d87d8eeee57973665ab4e2c11176c136e81fb8

                      • \??\c:\Users\Admin\AppData\Local\Temp\rk0pbyiv\rk0pbyiv.cmdline

                        Filesize

                        369B

                        MD5

                        23c0ba4dbee9a36260c70400e1a51ade

                        SHA1

                        f0246030e8c34fb08072c19282f241ea045b474e

                        SHA256

                        8c8e4138bf60c8d6d89ed94c23501c8c823df769857303fdd3b2d14eedb01120

                        SHA512

                        0cdd466768f77f2b0d9bc83efc4302cc8a2086729429f79497997b103ef0d4451aca925fd62a4ed16dac28a9dbb7958b45a3b5c41d06296646fcf9ddc2a184e6

                      • \??\c:\Users\Admin\AppData\Local\Temp\sj5ryeiq\CSCDA3AB6D1C0154C308B2349AB3DD23237.TMP

                        Filesize

                        652B

                        MD5

                        68db1ccb5c20dca101159cccd2c26c34

                        SHA1

                        1d18ed0af0de55a05b0512f07ac5bbb8176fb8c9

                        SHA256

                        090175d0953be718f11a4631dbee2ddc6c8e2f2d94c17721afd20f5badca62c6

                        SHA512

                        700108f6beee488cabffe5bc07ef9dddf241dd3de796114d143c5facbd9df367d602267d56b5c0891fcbae1917f522dec84870bd337677a31a23b2a263b0a255

                      • \??\c:\Users\Admin\AppData\Local\Temp\sj5ryeiq\sj5ryeiq.0.cs

                        Filesize

                        1KB

                        MD5

                        ec748351b30bcef27edcc9fbb112cc89

                        SHA1

                        1960b26f6208bc4351493dc047ea53b5261557bc

                        SHA256

                        5f1f61e898f72919ef51b049974bfa4f0d7babaf6f5506ac4af2c20f55f06578

                        SHA512

                        34111e7311a66d7ff3e493d6aa3d277614c0243104cb71bb06d8785bf07c4a87db5757ddc150549c4b8089a336b8f2c0ae03266c3491995665d30f74ece7bccb

                      • \??\c:\Users\Admin\AppData\Local\Temp\sj5ryeiq\sj5ryeiq.cmdline

                        Filesize

                        369B

                        MD5

                        aaeae561ab472ac728fa5a016105c234

                        SHA1

                        6848644f433ca930c52d3c037737b280b86def2b

                        SHA256

                        97f4d5740b366f12f223232e905ca5768d758c793c84925c06995b3fec282bf9

                        SHA512

                        7df1941da153c5cf2b0ae66343ed68a344fef11f5fb8f5dade3e39e9743e8f674ec7a26fe4f439cbcd125ca15110055506e8d00a16b2df2370615d22d8641354

                      • \??\c:\Users\Admin\AppData\Local\Temp\wcfm2qnw\CSC8E5D5638501848C8984C1D605ED143E1.TMP

                        Filesize

                        652B

                        MD5

                        912e0a0542d120fd4641df810d5b4d48

                        SHA1

                        7467cb9e3dc175b91d4c5103192bb3817deb5c49

                        SHA256

                        629c43a452eb6cea8d5bad32bc55e03045827a0e1805e536543576b7fca256fc

                        SHA512

                        e1e3587f562a6ac99cef080dbc5c5ace1fe052c020fa1cc5ba6a30f96a1a051f5774fcc814526ba5ac13b10c44e47ec8b42438aaaff09893d8a4d4bb39127bff

                      • \??\c:\Users\Admin\AppData\Local\Temp\wcfm2qnw\wcfm2qnw.0.cs

                        Filesize

                        2KB

                        MD5

                        b6938b17a41a844d693dfa48871cea49

                        SHA1

                        766bcbab3987d769aabe675489a3a20c52ea7b3b

                        SHA256

                        ab342ea0a8177af50f2a116f85df9064603ebf929081279409f2a19b97179aa2

                        SHA512

                        c0f14964edd8743d0d383ba763d03485b70d4783a0ada7c87a1e4f443c541496d4386097b6550a03c23153e036ce10a39976be69b187dd95ec27fcbd7b9b62d2

                      • \??\c:\Users\Admin\AppData\Local\Temp\wcfm2qnw\wcfm2qnw.cmdline

                        Filesize

                        369B

                        MD5

                        7b94f4d94cec882ac0e247882206c300

                        SHA1

                        1092f2b3e589fef14487cab2b76f5b951b954d51

                        SHA256

                        e6f3aa012ebf57b9d7bfbf5b6549d3736c0bcc1f89b1e81a4fede240864ec85f

                        SHA512

                        c53790612ae7807608cd107217172e4ae8d6a71df6978a354e9040cd0070eb81f9621ddb6dc4e369d64a3860a85fc0f89ceef24a6b49eabdacead21a8522c7de

                      • memory/1952-123-0x0000022DB4D40000-0x0000022DB4D48000-memory.dmp

                        Filesize

                        32KB

                      • memory/1952-25-0x0000022DB4CB0000-0x0000022DB4CB8000-memory.dmp

                        Filesize

                        32KB

                      • memory/1952-109-0x0000022DB4D30000-0x0000022DB4D38000-memory.dmp

                        Filesize

                        32KB

                      • memory/1952-157-0x00007FFF543D0000-0x00007FFF54E91000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/1952-53-0x0000022DB4CF0000-0x0000022DB4CF8000-memory.dmp

                        Filesize

                        32KB

                      • memory/1952-95-0x0000022DB4D20000-0x0000022DB4D28000-memory.dmp

                        Filesize

                        32KB

                      • memory/1952-81-0x0000022DB4D10000-0x0000022DB4D18000-memory.dmp

                        Filesize

                        32KB

                      • memory/1952-137-0x0000022DB4D50000-0x0000022DB4D58000-memory.dmp

                        Filesize

                        32KB

                      • memory/1952-67-0x0000022DB4D00000-0x0000022DB4D08000-memory.dmp

                        Filesize

                        32KB

                      • memory/1952-0-0x00007FFF543D3000-0x00007FFF543D5000-memory.dmp

                        Filesize

                        8KB

                      • memory/1952-151-0x0000022DB4D60000-0x0000022DB4D68000-memory.dmp

                        Filesize

                        32KB

                      • memory/1952-39-0x0000022DB4CD0000-0x0000022DB4CD8000-memory.dmp

                        Filesize

                        32KB

                      • memory/1952-12-0x00007FFF543D0000-0x00007FFF54E91000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/1952-11-0x00007FFF543D0000-0x00007FFF54E91000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/1952-6-0x0000022DB4980000-0x0000022DB49A2000-memory.dmp

                        Filesize

                        136KB