Analysis

  • max time kernel
    79s
  • max time network
    103s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-06-2024 19:25

General

  • Target

    MF_WindowsInstaller.ps1

  • Size

    11KB

  • MD5

    266c4c475454ab9d7f6e9be97bb60964

  • SHA1

    76e74e4930a436ed7158078be0b9fc8c8e8e0a71

  • SHA256

    c79377a9a222fbd6578c7c1129b4f1e751f4b556ff0b751483d2b7b7ef82b268

  • SHA512

    7fe007c7407daa72900be1a284d58f740ef4963c65649b856653040ac3fa8fc401ad2e4f2b0795656e40a895cec198c44549e07e39725692d49e9136e40aa272

  • SSDEEP

    192:jd0/OrwjHUIy0DvUizkYeOcJlQwHx7cprxi8RZkeuYT1bLKRoguwCsXsoz+ppjGR:jyWrwoAQizkY2JSU7Mrw8Rme/T1bOw7Y

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\MF_WindowsInstaller.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2556
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\xdcys4jv\xdcys4jv.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:668
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3D76.tmp" "c:\Users\Admin\AppData\Local\Temp\xdcys4jv\CSC4FDF3D25D3D240349BDEEAC8E18D4345.TMP"
        3⤵
          PID:4868
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\5q4njjmz\5q4njjmz.cmdline"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2616
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3DF3.tmp" "c:\Users\Admin\AppData\Local\Temp\5q4njjmz\CSCF4BB492731CA435EAF8E55191215813A.TMP"
          3⤵
            PID:1652
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\yujesf3p\yujesf3p.cmdline"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:5008
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
            C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3E80.tmp" "c:\Users\Admin\AppData\Local\Temp\yujesf3p\CSCD962BA75395A4B468D86E9F56F4CA057.TMP"
            3⤵
              PID:3940
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\opnkukq4\opnkukq4.cmdline"
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2568
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3EFD.tmp" "c:\Users\Admin\AppData\Local\Temp\opnkukq4\CSC431980CF97464811B44A47BED8491227.TMP"
              3⤵
                PID:3584
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
              "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\aiv2yl10\aiv2yl10.cmdline"
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:1356
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3F5B.tmp" "c:\Users\Admin\AppData\Local\Temp\aiv2yl10\CSC15A2F37E28D240F3A3CBB284B938118B.TMP"
                3⤵
                  PID:2676
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\sxrv2rxe\sxrv2rxe.cmdline"
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:2264
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                  C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3FB8.tmp" "c:\Users\Admin\AppData\Local\Temp\sxrv2rxe\CSC12E01D0578DE47058D1897C1E76CF1FC.TMP"
                  3⤵
                    PID:1096
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                  "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\qwrd5ejk\qwrd5ejk.cmdline"
                  2⤵
                  • Suspicious use of WriteProcessMemory
                  PID:4896
                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES4016.tmp" "c:\Users\Admin\AppData\Local\Temp\qwrd5ejk\CSC7EDEBDCCEDF54EF6BF6AED5974871FA.TMP"
                    3⤵
                      PID:4460
                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                    "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\tf00myze\tf00myze.cmdline"
                    2⤵
                    • Suspicious use of WriteProcessMemory
                    PID:2008
                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES4064.tmp" "c:\Users\Admin\AppData\Local\Temp\tf00myze\CSC3F1A06C9596943D289D7D984EA1517B.TMP"
                      3⤵
                        PID:3528
                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\frp1vlzo\frp1vlzo.cmdline"
                      2⤵
                      • Suspicious use of WriteProcessMemory
                      PID:3544
                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES40B2.tmp" "c:\Users\Admin\AppData\Local\Temp\frp1vlzo\CSCDAA435234AAF42C4A9B16A8EE42F0B4.TMP"
                        3⤵
                          PID:760
                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\5pkafcrl\5pkafcrl.cmdline"
                        2⤵
                        • Suspicious use of WriteProcessMemory
                        PID:4116
                        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES4100.tmp" "c:\Users\Admin\AppData\Local\Temp\5pkafcrl\CSC4DB3B9E68A844CA3B7FAA187A16AAEE5.TMP"
                          3⤵
                            PID:1564

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Temp\5pkafcrl\5pkafcrl.dll

                        Filesize

                        3KB

                        MD5

                        c2559b9dac595d0c1246c53c9cc3c9a4

                        SHA1

                        6c02bde99bae6b80f9603ebf9e12177f0658b689

                        SHA256

                        214050299f60840be6516e9aa84749dd051bf1210912d86b866c5217559e18c4

                        SHA512

                        faaf410392f8140d4b0ddd104ac03a38acdffd1e0e22db9029dc6e0aed5792da6a8597b6a9e4453fee3d861c5bf99faff14f2716a4507b9fab084f95e67f70c7

                      • C:\Users\Admin\AppData\Local\Temp\5q4njjmz\5q4njjmz.dll

                        Filesize

                        4KB

                        MD5

                        cd72365c12201fab0adcc9b8db02d61b

                        SHA1

                        78be15bce307315f6ae5572f91d54e926be08e85

                        SHA256

                        8bfa56e4bcb308706dcd44fb5efb5339ab8ccc03235adb258f77136bf154a3b4

                        SHA512

                        1981e2aa155be837760690b813d903d3d0de66af2c399ac0a39f2166cdb61548b8092e0c52c8d27df34ae4b6c5f10e4553a56b63835e8792f00ac6cc0fce613c

                      • C:\Users\Admin\AppData\Local\Temp\RES3D76.tmp

                        Filesize

                        1KB

                        MD5

                        516fcf86add6c4fc9641b8fae63b39c7

                        SHA1

                        237ff9c229bd77037291db9477d5c4debc8d5a44

                        SHA256

                        db855c8943033ece1568fe2cb4a7f7c7c5b6408f8a2a491656ab7d3f0d455409

                        SHA512

                        4de51a8a698340e12908de5eff87fba3835e78eff8b3b12c2e6be8f84f610618afdd68c8c72ad6ea9c8d60d4c905fc018a6a0ff61ce55347c3bd80718ddba1d1

                      • C:\Users\Admin\AppData\Local\Temp\RES3DF3.tmp

                        Filesize

                        1KB

                        MD5

                        5b4d056c94f3f03def19b6f02db54a17

                        SHA1

                        ef309f085eb558257a108ac72b60287ef2d3c9f1

                        SHA256

                        562d84d8669e351f1df1be9ac6e3632d0fd36ab91c09d2a1ec6a85e8fa5f025d

                        SHA512

                        d953be3837a502704bac2d324051099ecc25a9c5b8168fc7349772ce57a3588393b0358b065ef9aaf3b472e1b703c29e38ce43b490deb7682dfe3ef29c09d629

                      • C:\Users\Admin\AppData\Local\Temp\RES3E80.tmp

                        Filesize

                        1KB

                        MD5

                        e237681b0b2f91adff45992e915af2e9

                        SHA1

                        853467b8a32e5438f6d631f58d152590fda55277

                        SHA256

                        297ac846d40bc625db1baddab868e97ce763d58a1fd16cbeeac309caed655a35

                        SHA512

                        ed1e302efd1336a355423e4c19e5eee4664d8cf922a49c2d66d7493f0fb8b983de643ef2203db26f1324caf0c63b5274006a5b9ab8fd38580905855134738e93

                      • C:\Users\Admin\AppData\Local\Temp\RES3EFD.tmp

                        Filesize

                        1KB

                        MD5

                        1981d2bbd401a28d55415018dbc4f5e2

                        SHA1

                        3f38a88bbd4b9a4a71a4507158b8aee70ad07f8c

                        SHA256

                        f5e70bdbe8b31248f5c2ea4d3368dac945054b75fe6ddf9f7fa02d3d86de0ec7

                        SHA512

                        284e9c57320815350ef2d837294e0dc3dcb4df11160bf59d1534560a8311c9caf6150ce4da510e4c6006cea919197428166476bcff70f4089a95d74ded831578

                      • C:\Users\Admin\AppData\Local\Temp\RES3F5B.tmp

                        Filesize

                        1KB

                        MD5

                        d521785795df299fbdba782c6f6a8945

                        SHA1

                        5e880811e04c69ca7efca809206a50d012c3e302

                        SHA256

                        23601e0fed3743d144f33a06045f07a520764be22d8134b814637a5bb91dab58

                        SHA512

                        52ea3684d78815672ac3d4e67a1859d40d4dc859248dbdad99d27e51f8d4856d5a0ac2e7c77e7798168cf34998847828362bd95ee7f3899d681baa85330d2ed9

                      • C:\Users\Admin\AppData\Local\Temp\RES3FB8.tmp

                        Filesize

                        1KB

                        MD5

                        8f058a16732b73568efebfb7221c4220

                        SHA1

                        18219a5890ec6f3a46c7ad46364f8d5397ea5f4a

                        SHA256

                        7a590aa0e2d8b886bc3de5456cd821a8bad55da2a91a3847e02803d60e991df3

                        SHA512

                        97233c5bc3a1c2647a804f5b23d41688b74deb79dea8231d42b89d4b395358d8fd168b3a341bbdfb67717842938377b68c59bed0185770effe29b0fe772954f2

                      • C:\Users\Admin\AppData\Local\Temp\RES4016.tmp

                        Filesize

                        1KB

                        MD5

                        e7095d74bc71de58ef3f2ce5697cfa55

                        SHA1

                        f48b6e00a084445465326985073c3f3d9ec03ecf

                        SHA256

                        61f7896de46e3a90e9eb045bf261d18cdb376c781da07d5decc371c549b55115

                        SHA512

                        11ba48d85f806430faa3159581ca0d9c336c5e89034959bba4375a7a323629c05bfa98d3f33b65d59b93c2736452d66c41c434b227ff943d109e7ccff63b9657

                      • C:\Users\Admin\AppData\Local\Temp\RES4064.tmp

                        Filesize

                        1KB

                        MD5

                        f68811d4630eafe61e8309aabf6a3f56

                        SHA1

                        f7622220294e527fa857d1e4357a48d2c625a690

                        SHA256

                        6af9a22d782992da446b86f10264eb7a64f23ea48d0186c43fd056bff69391f6

                        SHA512

                        b8165d8f461fada920ae8eade83e8894851b67c7cc83b638f76b32ba7d1c46d1022823b367777a9fe226311ff0281c0dbc8c55b559826e534be6daf030cecc5d

                      • C:\Users\Admin\AppData\Local\Temp\RES40B2.tmp

                        Filesize

                        1KB

                        MD5

                        397bd97625273054f1f2f447f5ca6587

                        SHA1

                        fb70ff2db673a3f2c10bf50f126ab239f0c863f7

                        SHA256

                        1d0e4a00a4366466b32553a4ed4204147047dd2914f16cfdb89dd699eebe11c8

                        SHA512

                        e4a04948ba315618048d980340666c4e5416604dab6a2a07f54e3a303c7cffe5eb37ce67ce7b05d0305b6bba2d221f27a3482302113d48b8365b37de197eb962

                      • C:\Users\Admin\AppData\Local\Temp\RES4100.tmp

                        Filesize

                        1KB

                        MD5

                        5d651c1e1e6d67d6c5b9f8c1272d84e5

                        SHA1

                        dead4951787bbe079d449283ea206373a744d1ef

                        SHA256

                        484594604d1792838767e07835c8c2ddbb27d911a7e228cb6ea3262412205290

                        SHA512

                        2e592b97f88414d10954215101a2312ec2be5052149b5f28b294eb977c3cc16ee506734cad8b6b674ffd664a7ea7c94da88686418cc9f7b83091986c4e7c7bc1

                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_acqh5xpj.bz5.ps1

                        Filesize

                        60B

                        MD5

                        d17fe0a3f47be24a6453e9ef58c94641

                        SHA1

                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                        SHA256

                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                        SHA512

                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                      • C:\Users\Admin\AppData\Local\Temp\aiv2yl10\aiv2yl10.dll

                        Filesize

                        4KB

                        MD5

                        e9840791805c8690faa2927a5d4f93e4

                        SHA1

                        3eb6bf3d0049b451f76b8d7a9512c8bed9958e97

                        SHA256

                        dc144503c562e6ee7e6006f22386e756c26b11388e8da0e11bb550a3dd137a0e

                        SHA512

                        a3778220778a45186d1d0e5c31df40c4dab9ac522781388c99c27f21b8d713c98eccbda7f0189b4616251146e6601c197e07d685317f5e20c22ba8b9753bf1e5

                      • C:\Users\Admin\AppData\Local\Temp\frp1vlzo\frp1vlzo.dll

                        Filesize

                        4KB

                        MD5

                        a3ddf590d39ff50cae363cae35f081d1

                        SHA1

                        fbd894252132275b65878fad8eb282171492990a

                        SHA256

                        1e2ef680d5153ac78c885637a60fe9f4b0f2fed12b5c7bde3c060763415cd00e

                        SHA512

                        03c50d264fd0e7540f0fcfb198b6e0539d8ac987d92ae1fe0bb08eb89da11090881ee982e8a823364e98ae8b0d62969565b172c1709a241e9c30361df08d9b68

                      • C:\Users\Admin\AppData\Local\Temp\opnkukq4\opnkukq4.dll

                        Filesize

                        4KB

                        MD5

                        8f20d2a22361382ae0d3067308feec33

                        SHA1

                        9bf51dba04bfc4b989e6e9bbdf4dbfb562b92e25

                        SHA256

                        32179aa46e3eccf3d4f09d66c93ca06f9605a781bec9963046ba3da13ec1203f

                        SHA512

                        e99151d2ae07129aba4de1ef581fcabd30d731a37688ae1fadf9d7bed67b896498274454166beee8b9a4a08fa17c780e1b787d3398cefa6a912fe5e6b430ed4e

                      • C:\Users\Admin\AppData\Local\Temp\qwrd5ejk\qwrd5ejk.dll

                        Filesize

                        4KB

                        MD5

                        854e15081bfef975201f186a7621ff21

                        SHA1

                        a3b257b4edea70dc5a380617622e285001639627

                        SHA256

                        f72722f70b9c693f61dde9500267806e2099cc041a04023ac1b6d16288bfe594

                        SHA512

                        a86aada6be393dbe413700ed2214f681db6919237f8d3fdca2842300ea4c8796ea56007adfdd7c2c731a4028a92f4e137a878366e5f1649d266f6cc0a41c04fa

                      • C:\Users\Admin\AppData\Local\Temp\sxrv2rxe\sxrv2rxe.dll

                        Filesize

                        4KB

                        MD5

                        ce605286113083572ebd74c196d10843

                        SHA1

                        402d65149721301ec05ba3059b77a788b8a97725

                        SHA256

                        9f6464100d9b727bfa91680868d74e6ce97fb344e2be3da508e31b4dbb4a2b40

                        SHA512

                        fc70fbe5d7802ea628af6987a529f2c770763c7e6c720e1693c106064c4b1722ae423fa3021e41f953d184a7fb7b752f3ac310547d095a202942ae9b08141cd9

                      • C:\Users\Admin\AppData\Local\Temp\tf00myze\tf00myze.dll

                        Filesize

                        4KB

                        MD5

                        fd855160c63fce4eb4edb1403776bb1a

                        SHA1

                        5be560c0aac31d3e8dd42822375e60d599a2097c

                        SHA256

                        4b2dcd8d9392b56b3dc08236ff9182490b5e8f92ff05f178bf72c830de681301

                        SHA512

                        9b7fb4fa4f2099e7260df53eb907ccbdd4f14fb1107d2da5346b714b63dd36a289bb28a3d8b3a5c61ab47ee337e9062ee6279ce29cf5122fbfc07bb89aae3cdc

                      • C:\Users\Admin\AppData\Local\Temp\xdcys4jv\xdcys4jv.dll

                        Filesize

                        3KB

                        MD5

                        cdbc655280c18d358546853c14790167

                        SHA1

                        f5308b0b5f7ce882d8c1f51a76a3dc916aaec3df

                        SHA256

                        7313435201529f3cbf48bdc4da512220f0c2df37d87b2231e969b04cf894fdca

                        SHA512

                        a155b3e8b116444c66fa6db882f9a9acc00ad6b2b8f1822d8b4c421401d9d59a00a1cbcd1716dbddc4d7c87a26afa49392b5ddbc3e1e97e2b31a88baefeb3327

                      • C:\Users\Admin\AppData\Local\Temp\yujesf3p\yujesf3p.dll

                        Filesize

                        3KB

                        MD5

                        dacd58ed0d4a5771f495f57bde720774

                        SHA1

                        5edd4d245e7a1e980403901ec27b4a5d65a8ce82

                        SHA256

                        f0ac2711a820b46298391fe7bd5e82b2444a77b2cd5b64b757a132de550a67e1

                        SHA512

                        463ac694a9564c0df8410bf50fe79a163c863fa383745911a39d21bcf64ee8e49b2bc1f6de3cee86af1f1d45ef61acdcb6374569d3a57019ab61c27e543fa1b8

                      • \??\c:\Users\Admin\AppData\Local\Temp\5pkafcrl\5pkafcrl.0.cs

                        Filesize

                        491B

                        MD5

                        8948c11b2b0c692db7c9fbf6d30f9690

                        SHA1

                        fa609a02a8b7970ee332e677ac2565f52c5138fb

                        SHA256

                        edd571b5162de1875f36edff6ef97b67dae2f7533fddb703eddee4bf209b1c0f

                        SHA512

                        82609c9a063f0c7c3487ed8fcceea8e4a81a70cd2a6a63b7f1de0020e6f585cd7e1e106b9bedc55397051e7e1cc00d437cf1b9d315282367b250946a78b52fc2

                      • \??\c:\Users\Admin\AppData\Local\Temp\5pkafcrl\5pkafcrl.cmdline

                        Filesize

                        369B

                        MD5

                        bd551d41358bf49b09d90bd1c256d299

                        SHA1

                        df04cb0f803f73f0f0ecc3ebeeb6fb3c5082317b

                        SHA256

                        0744318c02aa1da18e594e53e01f72fe83358c6e3037040edf702bf034af0dac

                        SHA512

                        669f8fa93c894ec6a027243474f6fd11918341318cf610d5261a732c6fdb9f1ec2afacc2ef34a27ca7abc09a8118fa9dc892509597952c48e1d26f10796d40a7

                      • \??\c:\Users\Admin\AppData\Local\Temp\5pkafcrl\CSC4DB3B9E68A844CA3B7FAA187A16AAEE5.TMP

                        Filesize

                        652B

                        MD5

                        5d5c6d61e7933d1e2db5be1edeb21db8

                        SHA1

                        4d15bd9d43566414cac5adbd69bf260abf04ac0d

                        SHA256

                        5124cf26667a2acdabe78f644089e27d42bce5c6afcb7f80f835c6ea6e914756

                        SHA512

                        8465d059cece24ce64a6e5863afd398dde696cc7634340753e55c57bba1ef41260e2773dd2e533408009c3df292cbb0e18519db1bd244b3ccea2d4854371a8fc

                      • \??\c:\Users\Admin\AppData\Local\Temp\5q4njjmz\5q4njjmz.0.cs

                        Filesize

                        3KB

                        MD5

                        b45d51b75ba2ea57f9144540d15b277c

                        SHA1

                        93a9e794ed197cddd8078923bdf76d816e14c3ab

                        SHA256

                        5af1a96100851358b3cf1db306cb05e74df8103671fe388e8f39689bd4d70b2c

                        SHA512

                        39c733b335989ea49b78ed14b840a5e63d0bcb5fc10e61506de6a9b241994139bdc17effa8bf80930637c381682f9ed80cb6afd16bfe45a95f17e97a26967d8b

                      • \??\c:\Users\Admin\AppData\Local\Temp\5q4njjmz\5q4njjmz.cmdline

                        Filesize

                        369B

                        MD5

                        ec73e251ac1d4fe50238f8b00a363cea

                        SHA1

                        e1ab33eb1a1416dbcb4bfbc48faafc45b02b4e21

                        SHA256

                        b5cb3e7a9006548351cc0816916ff3e5951ba008ecc4d6924d2583bdbe0c777f

                        SHA512

                        8903ad451683ceb2e4ac1a2b184ff7345458e977770e287767a8f8b9abfec015b383a77edac80ffae6e3e681aee46a9cd06ec488c4550a2d023dfbc319f87420

                      • \??\c:\Users\Admin\AppData\Local\Temp\5q4njjmz\CSCF4BB492731CA435EAF8E55191215813A.TMP

                        Filesize

                        652B

                        MD5

                        250e907b5f994d86d9819690d44132c8

                        SHA1

                        837d81e20c9e2ee76aa94740066c85c477120c48

                        SHA256

                        5a112a9fe2d4a67a1178a021f7d6f517eb3788323b42a908abe1d0128d318663

                        SHA512

                        fc1de27978797da9585c6e6ffd062cbb2e8fe2213694cb1d0ffa46f877ac708ab1d1548f5e87328c5f12f6991f912c2e6978fbd1f543564f9f364a8c622de7e8

                      • \??\c:\Users\Admin\AppData\Local\Temp\aiv2yl10\CSC15A2F37E28D240F3A3CBB284B938118B.TMP

                        Filesize

                        652B

                        MD5

                        4193f8336dbd779bcadb43a9b2a032d7

                        SHA1

                        720ec30d4db13c0ca316f026c13b686d34045828

                        SHA256

                        a4cd1aa78ba852eeb0b91c0e2fa8e592240a7212a22a1ad53b46108ac0473bf3

                        SHA512

                        710e8efc2b1568e3013c8a249f8da42cb30475a708cfdb6e3fce0ec996146d0ddc8bceb20f91a9d705c2794af637ba72514425b74b9024ee5f5077a1aaac6dbc

                      • \??\c:\Users\Admin\AppData\Local\Temp\aiv2yl10\aiv2yl10.0.cs

                        Filesize

                        2KB

                        MD5

                        b6938b17a41a844d693dfa48871cea49

                        SHA1

                        766bcbab3987d769aabe675489a3a20c52ea7b3b

                        SHA256

                        ab342ea0a8177af50f2a116f85df9064603ebf929081279409f2a19b97179aa2

                        SHA512

                        c0f14964edd8743d0d383ba763d03485b70d4783a0ada7c87a1e4f443c541496d4386097b6550a03c23153e036ce10a39976be69b187dd95ec27fcbd7b9b62d2

                      • \??\c:\Users\Admin\AppData\Local\Temp\aiv2yl10\aiv2yl10.cmdline

                        Filesize

                        369B

                        MD5

                        6794bd03e7527bf8ec205af10ab68150

                        SHA1

                        6ec42d4914f6f7065b532f3d3af92676482baac5

                        SHA256

                        5af71f795fa563f9bc9dfc9a0cda47a7dde748d1105526547180081bf6ebe930

                        SHA512

                        d63d6767a8ab13f74edd4dd08cf6fb81b6ca1bd0e886beb35265d024e4356a5f934a535e01a3a4d2a80c55c367c5499ca11621aeb6ea88111f7bd48396849919

                      • \??\c:\Users\Admin\AppData\Local\Temp\frp1vlzo\CSCDAA435234AAF42C4A9B16A8EE42F0B4.TMP

                        Filesize

                        652B

                        MD5

                        0a89b2095fdc2b8e8870e0b59123b5ef

                        SHA1

                        b2e0a143e627f24957f93813c77c334b322552f5

                        SHA256

                        f0991eb67e8f869da4f32ea80d21dec9069c25aa1f5b432f8a2aac36640e125a

                        SHA512

                        6039cb075c53b505769f2709397a562f823f9a2d288d13547a7dc403d3541aeea3760d64d0b9655ec99739164b81ff19363f451f36d9c818c142b25d052b6b60

                      • \??\c:\Users\Admin\AppData\Local\Temp\frp1vlzo\frp1vlzo.0.cs

                        Filesize

                        1KB

                        MD5

                        5b29a005ce6bb5a523d98ecfddc7c224

                        SHA1

                        3dda7f1e097097326ca2700a09fffa033b323bad

                        SHA256

                        9c17699d5de425fbfaa184c5a4fc95f6305c2665a41cec309404d4523be9022f

                        SHA512

                        31b417f4c0fff237bfe4d9b85c571d750eaf723a13a366eac672e8507dbf404b92f8d0c026d9f70898b2d629b1cf27eb6f9ac3e53889077d6f7369b67f35c80d

                      • \??\c:\Users\Admin\AppData\Local\Temp\frp1vlzo\frp1vlzo.cmdline

                        Filesize

                        369B

                        MD5

                        0b625e4cdf5906be4216579b3e1c3595

                        SHA1

                        a68bba9424a3c22ac6c7eb371e2e3f6a73cbdf72

                        SHA256

                        f4b36a3d58ad682dc9a98fd15bb3de39f804a974f8d6d5ad9673233465cb19c1

                        SHA512

                        ea6751b7995074c0c9aaac502f9262d2d1d2ae19851260c6d023d973b2b2b01d369c9932b93621b76d5dfb5bdc0f01d39168077a7aff47b261c9d764221eb666

                      • \??\c:\Users\Admin\AppData\Local\Temp\opnkukq4\CSC431980CF97464811B44A47BED8491227.TMP

                        Filesize

                        652B

                        MD5

                        248375a56ac80301861c893955d76515

                        SHA1

                        7620592bfb3f416c652b104c831076dd91c8774c

                        SHA256

                        5cea2ee39a7c3c63b931323290cb7877ea20ea556b53e80abf5e05a89343a904

                        SHA512

                        7a7e24070ded3acdcadf1abbffa81312bd56b0d65329ba4e8c60fb14ed19400883577542d7703808b484fb92d5bafe6b99260568b29e68dd85781a58c1acd327

                      • \??\c:\Users\Admin\AppData\Local\Temp\opnkukq4\opnkukq4.0.cs

                        Filesize

                        4KB

                        MD5

                        b76ed05a2169cca7c1d580d592a2f1b6

                        SHA1

                        8f4f3001ea54aa47c8f268870932439ad6ece06e

                        SHA256

                        362c2f0b65870ec918c90fa0154bda1977e6bd9cb31c2491055b3ef10613b3ce

                        SHA512

                        25e6c858db6380604ed6009420e6f6fefe2ca880a8fefa54c043ba44591a42467553d8656e537758fed9e1bbe1d87d8eeee57973665ab4e2c11176c136e81fb8

                      • \??\c:\Users\Admin\AppData\Local\Temp\opnkukq4\opnkukq4.cmdline

                        Filesize

                        369B

                        MD5

                        5c2caab629711a021fa59179ea1ed38c

                        SHA1

                        0ffebe729758c685d15df5961d130da98a26c5dd

                        SHA256

                        ae0e170f1167b8a76db72495738c7e14ad7f0251b95954c4d526b12a280024f2

                        SHA512

                        e2e6aaa0757ec78310d6145569e9fa83e6cb6955931e26e502b934321d9279486d1d571da049387c33cab8a6d1312b5dd7117260803368955bf1be9625b76187

                      • \??\c:\Users\Admin\AppData\Local\Temp\qwrd5ejk\CSC7EDEBDCCEDF54EF6BF6AED5974871FA.TMP

                        Filesize

                        652B

                        MD5

                        78663eee280ca50f9a163702425510b2

                        SHA1

                        f9b5cac115a8b75096163a841f8466cc4349569b

                        SHA256

                        e511dc36c98effc4000f17311a8caf9729a31a45e549a96032f507e1d2eb2c56

                        SHA512

                        7cd1c1d56ada3cc10a2a46e8322dbab9f82d6c7390eb757f97f58b2df0bba4594b32ae5e6bc4f6a72869a1a41475aa3f7177306268810bed761d0a65a0992a31

                      • \??\c:\Users\Admin\AppData\Local\Temp\qwrd5ejk\qwrd5ejk.0.cs

                        Filesize

                        3KB

                        MD5

                        a1b43ae226500e2098274f80a3f5994e

                        SHA1

                        251ce67388cc5aaeffd1803fbc488ea83d8cbbb9

                        SHA256

                        a608d8f27909b0b4fccc9944d3e78a44b0d35add11bda78cfbde45882efc249c

                        SHA512

                        32b7c5bbb6f5940f88b909a1dad6925d9267da5efd427c4d7d6acce19628986722e8a0c48dc8afb6ae6f33d1b99840505148d683f71cdb36cc7935c6e64efb4d

                      • \??\c:\Users\Admin\AppData\Local\Temp\qwrd5ejk\qwrd5ejk.cmdline

                        Filesize

                        369B

                        MD5

                        aad39671f3e28e4e2a51578f40fa9a27

                        SHA1

                        21496921a2be539837ee2dc35d7af1ee98343545

                        SHA256

                        fa5b5dd6c4e596dfddb75710b0d18f1899b56d7140c2d7324412ebc8ae3fc4b4

                        SHA512

                        d277b3a20063519d6c6641544586b4af642fe18e48f6d326150c077c09c2d4430848f4f8484bbdcc6d0c71b77f65e7b1b34bc85482a98ac36615141f374bf189

                      • \??\c:\Users\Admin\AppData\Local\Temp\sxrv2rxe\CSC12E01D0578DE47058D1897C1E76CF1FC.TMP

                        Filesize

                        652B

                        MD5

                        8e84938d55ef34c191007fabaa56adfd

                        SHA1

                        7b5a660ad0ec4b67325f55373faad510f4e6708a

                        SHA256

                        62423da2171c102753552da6f3ab40b0d8f7c01379e3ca2af37eca879d5f8946

                        SHA512

                        166babd4db282c57cc62bd73981fb58c2984bfa1c60073191e1c8489b9fe88d9c8e887c1e3327d358f67f4eb5e905e21554d7881bf3ecd2938c19ddeecba1e38

                      • \??\c:\Users\Admin\AppData\Local\Temp\sxrv2rxe\sxrv2rxe.0.cs

                        Filesize

                        1KB

                        MD5

                        f15c3c3a15448bb071a67230294f2dcd

                        SHA1

                        77006af330e2cd5f08ffd2b5cd6c0e6232add424

                        SHA256

                        98d5db570c23af71e8cee9cd7dde564265bcd2c975cca28095626370ae795155

                        SHA512

                        6c7bd04b7965f17aeff8fae96a3882a72f1faf20c68a60dcf14cd000b60468b2e9b8a17c183c30086dd1b6a6c030337ed53655aa719a463f4d9ca93c23f126c4

                      • \??\c:\Users\Admin\AppData\Local\Temp\sxrv2rxe\sxrv2rxe.cmdline

                        Filesize

                        369B

                        MD5

                        5a91cc07caa2c8b9864ca6710eeee169

                        SHA1

                        41bd0016acc3dc3fa1f04d29bf9e744eb48dc78b

                        SHA256

                        a2bf1510b4f9b1d9661e6fa06d88947be4d6b6471387c4fdcd7ba68e6f1f8814

                        SHA512

                        3cbcdcd713d944b83c5853f84fc763bf65cf4c85780eebf6e8f2162bab05d7536866301510599f5fc782ec819380348a445fcaf543aae690ee8887a59050664a

                      • \??\c:\Users\Admin\AppData\Local\Temp\tf00myze\CSC3F1A06C9596943D289D7D984EA1517B.TMP

                        Filesize

                        652B

                        MD5

                        912f3e274946f3f8f6b825481e9c0fe0

                        SHA1

                        de2b2c27fe257bd47765e23c995387561016e335

                        SHA256

                        37858f6d859c17f8545b7d4a2f59663e8ecad58f24283be6db35efa10d2ee66d

                        SHA512

                        3ef0a9fe86f6437fd6d2ece02e18e317aeb9c0df421746f169f69a5dc766b730094689f0a6235c5c02cc6cc0d5376b01e93d7ba507664f94f8b50e01e571ff9e

                      • \??\c:\Users\Admin\AppData\Local\Temp\tf00myze\tf00myze.0.cs

                        Filesize

                        3KB

                        MD5

                        55af61a4a1274969107d46c68bc54a88

                        SHA1

                        77fd4fb2f1210db76d39f7fb18099c2da9d91e24

                        SHA256

                        678d0406ab36130c407e5d75477d83dacbe38b37d8fb09ee49cdb800e8586dac

                        SHA512

                        a7d19aefc2f7ae1eb70dda29e6ef64e75b576a437a53b5c04955676a9478523b3cde52864ccec73eefcb949a15c837ec040749a436243f12dcef194817552546

                      • \??\c:\Users\Admin\AppData\Local\Temp\tf00myze\tf00myze.cmdline

                        Filesize

                        369B

                        MD5

                        ed59e3620b9204c5ce4173a8396b148e

                        SHA1

                        51554562f849f5575266ed2f36b4dbb6be132a87

                        SHA256

                        a64e15a2391abe9d2ce63b879db0cb4ecce141f6cb4066774a6032b5ffad6bb0

                        SHA512

                        71318e44a7e51fffd59dee71ebd107ce5e1325b5f9d7b20bcb3312e3dfec3a6a458a625326588506f4f18a0519f55379d52592b2995a3cc43fdd4cc5d24bcb57

                      • \??\c:\Users\Admin\AppData\Local\Temp\xdcys4jv\CSC4FDF3D25D3D240349BDEEAC8E18D4345.TMP

                        Filesize

                        652B

                        MD5

                        080fc10d19b7d139ab1ca0053e9e566c

                        SHA1

                        08d2fbaa09a2c2512ed991f7fd1ae7abd1f1e3c0

                        SHA256

                        21e4417108910240e9cfda152bdab7ab9ce4fd545d28bf471b5cda235c8283db

                        SHA512

                        9a86d15405f0d9757442ae1db20d855d559a7768acf7520263b0c890900582434705544b6787af9859335588a1ac038ba862eb4254bf88af06da71d4ee519047

                      • \??\c:\Users\Admin\AppData\Local\Temp\xdcys4jv\xdcys4jv.0.cs

                        Filesize

                        1KB

                        MD5

                        d8bf7e4044f0dc3a61b275dd7e109be2

                        SHA1

                        94672dd2a3611399b3cd75644ca4ffd69df51158

                        SHA256

                        0dcffbd6cfd1e5e499b37dde49d9c360bb129cdf15e76ec04470136c0467caf6

                        SHA512

                        b80c9964b78d60223da9e94b411d26e0f96bf69b9f0c45f71da57fa9e7b09e04ea139ec9b17c436bc792833f3fa71779a8def6b91a2c156af75bb87ed3e1d30b

                      • \??\c:\Users\Admin\AppData\Local\Temp\xdcys4jv\xdcys4jv.cmdline

                        Filesize

                        474B

                        MD5

                        761b3238c8f0182ac3d33437a507e3a1

                        SHA1

                        6ffe4cd68e4bbca0f48bae905b4d690b88b6abf0

                        SHA256

                        5a36687e34cc9d0bc2018dd8903010bdd1122f37084acedcf989a73f0dad3b69

                        SHA512

                        7ff8da5e432158dd451648cd03a4afbe0e4aa4d6d7804164fea5a9af18ca3567b480f3527a7a5fcd839c3f047f2ee38d7d72c5abda67f79b1fa4e36b2b194cb8

                      • \??\c:\Users\Admin\AppData\Local\Temp\yujesf3p\CSCD962BA75395A4B468D86E9F56F4CA057.TMP

                        Filesize

                        652B

                        MD5

                        d80e4808dc6d6089dc4bce74b3015c81

                        SHA1

                        dcb6ad5b469e00e62809ba0a65e1fe33cde7b2f0

                        SHA256

                        b4e507c1b3632a435b5b2d89bf764a4adf96984bc9ffbe7bb6750861300ceb67

                        SHA512

                        3e65066f8c3363f3f477ddd90f69035a9828f2202cfa89e34ad0f3e93919facff710150a9a538ece88d8a5ce4497fdb8dcdae2ccc933f20ddfa1be1c6181b0bd

                      • \??\c:\Users\Admin\AppData\Local\Temp\yujesf3p\yujesf3p.0.cs

                        Filesize

                        1KB

                        MD5

                        ec748351b30bcef27edcc9fbb112cc89

                        SHA1

                        1960b26f6208bc4351493dc047ea53b5261557bc

                        SHA256

                        5f1f61e898f72919ef51b049974bfa4f0d7babaf6f5506ac4af2c20f55f06578

                        SHA512

                        34111e7311a66d7ff3e493d6aa3d277614c0243104cb71bb06d8785bf07c4a87db5757ddc150549c4b8089a336b8f2c0ae03266c3491995665d30f74ece7bccb

                      • \??\c:\Users\Admin\AppData\Local\Temp\yujesf3p\yujesf3p.cmdline

                        Filesize

                        369B

                        MD5

                        8d5853304ba73b36ed50176679d81d41

                        SHA1

                        df3f51102b3678070ff71f7ac2a52cbaf11ed578

                        SHA256

                        2fdeedc234c347ddd3bd8617c79d7bb4b5d79ab25177b576b0217a36ac7d7473

                        SHA512

                        2eca0705fbe4146fcb96b67000e0e875d8209b0a4f466489e94c7b01324aa07f552e146d870d612a82a0a6887e73ff040fadeafe290e54265a9db6e9fd322a5f

                      • memory/2556-25-0x00000171F1E70000-0x00000171F1E78000-memory.dmp

                        Filesize

                        32KB

                      • memory/2556-123-0x00000171F4320000-0x00000171F4328000-memory.dmp

                        Filesize

                        32KB

                      • memory/2556-95-0x00000171F4300000-0x00000171F4308000-memory.dmp

                        Filesize

                        32KB

                      • memory/2556-137-0x00000171F4330000-0x00000171F4338000-memory.dmp

                        Filesize

                        32KB

                      • memory/2556-0-0x00007FFBF7F63000-0x00007FFBF7F65000-memory.dmp

                        Filesize

                        8KB

                      • memory/2556-39-0x00000171F42B0000-0x00000171F42B8000-memory.dmp

                        Filesize

                        32KB

                      • memory/2556-53-0x00000171F42D0000-0x00000171F42D8000-memory.dmp

                        Filesize

                        32KB

                      • memory/2556-109-0x00000171F4310000-0x00000171F4318000-memory.dmp

                        Filesize

                        32KB

                      • memory/2556-81-0x00000171F42F0000-0x00000171F42F8000-memory.dmp

                        Filesize

                        32KB

                      • memory/2556-67-0x00000171F42E0000-0x00000171F42E8000-memory.dmp

                        Filesize

                        32KB

                      • memory/2556-151-0x00000171F4340000-0x00000171F4348000-memory.dmp

                        Filesize

                        32KB

                      • memory/2556-12-0x00007FFBF7F60000-0x00007FFBF8A21000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/2556-11-0x00007FFBF7F60000-0x00007FFBF8A21000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/2556-10-0x00000171F4070000-0x00000171F4092000-memory.dmp

                        Filesize

                        136KB

                      • memory/2556-158-0x00007FFBF7F60000-0x00007FFBF8A21000-memory.dmp

                        Filesize

                        10.8MB