Resubmissions

10/07/2024, 16:21

240710-tt4g1sxemn 8

10/07/2024, 16:21

240710-ttm52azejb 8

Analysis

  • max time kernel
    4s
  • max time network
    13s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    10/07/2024, 16:21

General

  • Target

    Built.exe

  • Size

    47.0MB

  • MD5

    0335d9e2a35d3c01f450a6a5aed16a1d

  • SHA1

    e87d6daf1a77258a01e2cce3fe13e060579965bc

  • SHA256

    8d7299e5a8afb21de858dab6034de69287bc6fabbd2c61ab38e7941fae4ee118

  • SHA512

    026f7670bdeb06bd2678e71860a530a1eb2db26cafb96f1873307a01ca39cda52617a7fdd1c920ac681634f99505ea67ec635e34fda342adc0950e4a3370b2b4

  • SSDEEP

    786432:R3on1HvSzxAMNOFZArYsbPv0p7OZYuZpuxa5VJQnlDNoS:RYn1HvSpNOXmbuWbuxOVJQtNh

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Run Powershell and hide display window.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Hide Artifacts: Hidden Window 1 TTPs 1 IoCs

    Windows that would typically be displayed when an application carries out an operation can be hidden.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • An obfuscated cmd.exe command-line is typically used to evade detection. 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Built.exe
    "C:\Users\Admin\AppData\Local\Temp\Built.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2028
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "type .\temp.ps1 | powershell.exe -noprofile -"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4868
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /S /D /c" type .\temp.ps1 "
        3⤵
          PID:2056
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -noprofile -
          3⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4256
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\4dtfbcmt\4dtfbcmt.cmdline"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:8
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6CC4.tmp" "c:\Users\Admin\AppData\Local\Temp\4dtfbcmt\CSC309E4B7FB783464192B1C926C39ED993.TMP"
              5⤵
                PID:1736
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /d /s /c "curl http://api.ipify.org/ --ssl-no-revoke"
          2⤵
            PID:3668
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /d /s /c "tasklist"
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1456
            • C:\Windows\system32\tasklist.exe
              tasklist
              3⤵
              • Enumerates processes with tasklist
              • Suspicious use of AdjustPrivilegeToken
              PID:516
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /d /s /c "tasklist"
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:524
            • C:\Windows\system32\tasklist.exe
              tasklist
              3⤵
              • Enumerates processes with tasklist
              • Suspicious use of AdjustPrivilegeToken
              PID:2320
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /d /s /c "powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,57,127,181,52,40,252,34,72,131,44,63,89,128,239,70,113,0,0,0,0,2,0,0,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,11,255,216,153,250,77,82,111,126,95,98,94,219,115,174,189,160,139,237,110,251,196,56,179,203,228,197,181,15,120,67,20,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,30,133,100,191,15,223,21,248,203,88,227,180,113,230,106,207,51,98,112,135,217,240,250,205,108,213,119,246,2,158,201,93,48,0,0,0,178,101,198,205,60,104,197,46,221,160,198,102,133,127,127,90,15,146,64,171,161,165,85,208,32,230,17,132,195,114,136,96,252,86,8,99,164,60,179,237,198,141,203,205,95,178,246,118,64,0,0,0,48,174,109,113,48,104,148,66,11,129,145,197,20,137,225,112,70,116,236,62,53,35,210,159,99,40,19,59,102,209,13,191,44,242,249,158,237,154,21,93,58,208,230,170,117,133,63,219,175,75,182,195,205,244,44,132,173,14,239,143,205,34,169,63), $null, 'CurrentUser')"
            2⤵
            • An obfuscated cmd.exe command-line is typically used to evade detection.
            • Suspicious use of WriteProcessMemory
            PID:3024
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,57,127,181,52,40,252,34,72,131,44,63,89,128,239,70,113,0,0,0,0,2,0,0,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,11,255,216,153,250,77,82,111,126,95,98,94,219,115,174,189,160,139,237,110,251,196,56,179,203,228,197,181,15,120,67,20,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,30,133,100,191,15,223,21,248,203,88,227,180,113,230,106,207,51,98,112,135,217,240,250,205,108,213,119,246,2,158,201,93,48,0,0,0,178,101,198,205,60,104,197,46,221,160,198,102,133,127,127,90,15,146,64,171,161,165,85,208,32,230,17,132,195,114,136,96,252,86,8,99,164,60,179,237,198,141,203,205,95,178,246,118,64,0,0,0,48,174,109,113,48,104,148,66,11,129,145,197,20,137,225,112,70,116,236,62,53,35,210,159,99,40,19,59,102,209,13,191,44,242,249,158,237,154,21,93,58,208,230,170,117,133,63,219,175,75,182,195,205,244,44,132,173,14,239,143,205,34,169,63), $null, 'CurrentUser')
              3⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1500
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /d /s /c "wmic diskdrive get serialnumber"
            2⤵
              PID:4460
              • C:\Windows\System32\Wbem\WMIC.exe
                wmic diskdrive get serialnumber
                3⤵
                  PID:2464
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /d /s /c "reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v Steam /f"
                2⤵
                  PID:4464
                  • C:\Windows\system32\reg.exe
                    reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v Steam /f
                    3⤵
                      PID:4260
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /d /s /c "schtasks /create /tn "GoogleUpdateTaskMachineUAC" /tr "cscript //nologo C:\ProgramData\edge\Updater\RunBatHidden.vbs" /sc minute /mo 10 /f /RU SYSTEM"
                    2⤵
                      PID:1100
                      • C:\Windows\system32\schtasks.exe
                        schtasks /create /tn "GoogleUpdateTaskMachineUAC" /tr "cscript //nologo C:\ProgramData\edge\Updater\RunBatHidden.vbs" /sc minute /mo 10 /f /RU SYSTEM
                        3⤵
                        • Scheduled Task/Job: Scheduled Task
                        PID:3156
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /d /s /c "powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -File "C:\ProgramData\edge\Updater\Get-Clipboard.ps1""
                      2⤵
                      • Hide Artifacts: Hidden Window
                      PID:1432
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -File "C:\ProgramData\edge\Updater\Get-Clipboard.ps1"
                        3⤵
                        • Command and Scripting Interpreter: PowerShell
                        PID:2940
                        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ld4bjlij\ld4bjlij.cmdline"
                          4⤵
                            PID:4804
                            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES74A3.tmp" "c:\Users\Admin\AppData\Local\Temp\ld4bjlij\CSCA0E18DE823C4282B769C5C7DD65A9.TMP"
                              5⤵
                                PID:4304
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /d /s /c "wmic bios get smbiosbiosversion"
                          2⤵
                            PID:5100
                            • C:\Windows\System32\Wbem\WMIC.exe
                              wmic bios get smbiosbiosversion
                              3⤵
                                PID:368
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /d /s /c "cscript //nologo "C:\ProgramData\edge\Updater\RunBatHidden.vbs""
                              2⤵
                                PID:1908
                                • C:\Windows\system32\cscript.exe
                                  cscript //nologo "C:\ProgramData\edge\Updater\RunBatHidden.vbs"
                                  3⤵
                                    PID:3840
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /c ""C:\ProgramData\edge\Updater\CheckEpicGamesLauncher.bat" "
                                      4⤵
                                        PID:4768
                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          powershell Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup"
                                          5⤵
                                          • Command and Scripting Interpreter: PowerShell
                                          PID:4236
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /d /s /c "wmic baseboard get serialnumber"
                                    2⤵
                                      PID:4908
                                      • C:\Windows\System32\Wbem\WMIC.exe
                                        wmic baseboard get serialnumber
                                        3⤵
                                          PID:1652
                                      • C:\Windows\system32\cmd.exe
                                        C:\Windows\system32\cmd.exe /d /s /c "wmic MemoryChip get /format:list | find /i "Speed""
                                        2⤵
                                          PID:3964
                                          • C:\Windows\System32\Wbem\WMIC.exe
                                            wmic MemoryChip get /format:list
                                            3⤵
                                              PID:3076
                                            • C:\Windows\system32\find.exe
                                              find /i "Speed"
                                              3⤵
                                                PID:2220
                                            • C:\Windows\system32\cmd.exe
                                              C:\Windows\system32\cmd.exe /d /s /c "wmic path win32_computersystemproduct get uuid"
                                              2⤵
                                                PID:760
                                                • C:\Windows\System32\Wbem\WMIC.exe
                                                  wmic path win32_computersystemproduct get uuid
                                                  3⤵
                                                    PID:1108
                                                • C:\Windows\system32\cmd.exe
                                                  C:\Windows\system32\cmd.exe /d /s /c "powershell wininit.exe"
                                                  2⤵
                                                    PID:4220
                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      powershell wininit.exe
                                                      3⤵
                                                        PID:3532
                                                        • C:\Windows\system32\wininit.exe
                                                          "C:\Windows\system32\wininit.exe"
                                                          4⤵
                                                            PID:4684

                                                    Network

                                                    MITRE ATT&CK Enterprise v15

                                                    Replay Monitor

                                                    Loading Replay Monitor...

                                                    Downloads

                                                    • C:\ProgramData\edge\Updater\CheckEpicGamesLauncher.bat

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      19da1b26f897f892f5f05cd446a564a0

                                                      SHA1

                                                      acdf68e279f281cb18da6c7e2bdfecad3de5608b

                                                      SHA256

                                                      4ba5bc28cf9a69d34ac9e9972c190c3f9776f32402a6d8e2479619a0dbe684e1

                                                      SHA512

                                                      fdd36456bc83fa21f9dfe96784b896b2e9a1559f1a6bf3ecec66dfc85223fceaa16352b15546a8a1904bf30d9330008fb26bb0ea90f0b680173f0758f1c1e087

                                                    • C:\ProgramData\edge\Updater\Get-Clipboard.ps1

                                                      Filesize

                                                      3KB

                                                      MD5

                                                      a8834c224450d76421d8e4a34b08691f

                                                      SHA1

                                                      73ed4011bc60ba616b7b81ff9c9cad82fb517c68

                                                      SHA256

                                                      817c184e6a3e7d1ff60b33ec777e23e8e0697e84efde8e422833f05584e00ea5

                                                      SHA512

                                                      672b3eca54dff4316db904d16c2333247e816e0cd8ef2d866111ddb49ab491568cc12d7263891707403dd14962326404c13855d5de1ae148114a51cb7d5e5596

                                                    • C:\ProgramData\edge\Updater\RunBatHidden.vbs

                                                      Filesize

                                                      146B

                                                      MD5

                                                      14a9867ec0265ebf974e440fcd67d837

                                                      SHA1

                                                      ae0e43c2daf4c913f5db17f4d9197f34ab52e254

                                                      SHA256

                                                      cca09191a1a96d288a4873f79a0916d9984bd6be8dcbd0c25d60436d46a15ca1

                                                      SHA512

                                                      36c69c26fd84b9637b370a5fe214a90778c9ade3b11664e961fe14226e0300f29c2f43d3a1d1c655d9f2951918769259928bbbc5a9d83596a1afc42420fc1a54

                                                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                      Filesize

                                                      3KB

                                                      MD5

                                                      42d4b1d78e6e092af15c7aef34e5cf45

                                                      SHA1

                                                      6cf9d0e674430680f67260194d3185667a2bb77b

                                                      SHA256

                                                      c4089b4313f7b8b74956faa2c4e15b9ffb1d9e5e29ac7e00a20c48b8f7aef5e0

                                                      SHA512

                                                      d31f065208766eea61facc91b23babb4c94906fb564dc06d114cbbc4068516f94032c764c188bed492509010c5dbe61f096d3e986e0ae3e70a170a9986458930

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      ac39344fb1227ef8fd9a087a756e39b1

                                                      SHA1

                                                      3d3e100dd8ded40e40fe2d62cbb272cdec3d41fd

                                                      SHA256

                                                      bdec011ca4353a95a10389308e9c72f587a45208d09056710c9f0c38106f2e9b

                                                      SHA512

                                                      439be60df26b32a98c7869318b98a9c6346c10402c377b34d59fb001f796b037a9dd09f0851da55adbbb14b10c07667412765aea08745650a726b2ea3b31390d

                                                    • C:\Users\Admin\AppData\Local\Temp\33949a8f7224e35b98785565c0595dcdU00WQC\SkipBackup.csv

                                                      Filesize

                                                      2.2MB

                                                      MD5

                                                      76c43025f98b31f4c515b5b486a444a0

                                                      SHA1

                                                      5f1577af4324fd092e886808d0821c5e67f9b1fc

                                                      SHA256

                                                      28d3eab096a07d401ccadcf7c174c782b2efb1584970a4365b88f00fa13d1168

                                                      SHA512

                                                      9975d7d447a1a9e6c62b069d195c69260e1657ab8f73227b874427584de1d02787a751fb0dced78928ecf886b9e1dd1a40b6c3af7812d5feb519d6d4bb90304c

                                                    • C:\Users\Admin\AppData\Local\Temp\4dtfbcmt\4dtfbcmt.dll

                                                      Filesize

                                                      3KB

                                                      MD5

                                                      13fa9477a2a438822d0c7e2edad2a1a2

                                                      SHA1

                                                      df7615afae6f5f920ca3fe2a09b2aca9f0d69297

                                                      SHA256

                                                      78a8c6e860c2a9140065754717e665d5a48a8728c40c082eb9f50bc431b11a7a

                                                      SHA512

                                                      902f5a890b834bac0222d0a3878e4aea859c10da3ed1c5cef8f1fe7510deced5a3ade077775258b1fe47424bd29c086c5270d4c4b9786fe77471ccf111561a0c

                                                    • C:\Users\Admin\AppData\Local\Temp\RES6CC4.tmp

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      ed8b9851e8714e6d7763a6fcc803f38e

                                                      SHA1

                                                      82fc522d64fb22fb954c3d58c3a4aebbf444e723

                                                      SHA256

                                                      ce282a72d64b0b5437f1e2a0486a8c77d2d400d1a0e8c370c0f56e2adcb186f3

                                                      SHA512

                                                      9120888473cbea594a2e33654b83f011edd155782f463cc3b6b638c1d06f5e3d279dbb330368fad878b3c65c68f3bceaf798534e8466df470b53b0eb59584ce3

                                                    • C:\Users\Admin\AppData\Local\Temp\RES74A3.tmp

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      849e3d38160ab702581b4dc0d9fda3b1

                                                      SHA1

                                                      ced51f980d201bf5aeab30e023f6349c0171768c

                                                      SHA256

                                                      a5238226eabd3f5a7ff8249dcbf6d9f8d2ee05c875f572457088abd5f66aeed5

                                                      SHA512

                                                      f02163eb38aec648d574e1ff465b36b71028726ffbe04cffbdafcfa0c05d9a58853a9a05d89dd6db8424420d7ec4d758d398b4d00758d007287e9ff070aa290e

                                                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_q3y40ujn.otd.ps1

                                                      Filesize

                                                      1B

                                                      MD5

                                                      c4ca4238a0b923820dcc509a6f75849b

                                                      SHA1

                                                      356a192b7913b04c54574d18c28d46e6395428ab

                                                      SHA256

                                                      6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

                                                      SHA512

                                                      4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

                                                    • C:\Users\Admin\AppData\Local\Temp\ld4bjlij\ld4bjlij.dll

                                                      Filesize

                                                      3KB

                                                      MD5

                                                      bc756127589d4273d965085a81a92693

                                                      SHA1

                                                      eb328906bbf2f8ea27828f4602458a4551b04cf2

                                                      SHA256

                                                      78ce0cee67da78d2b34121171967d64e971860661dc12bf0c883bf53a046647f

                                                      SHA512

                                                      9147907e55c09ed3a93315705d8e13c10db99e550857aa6af44b965814d103e07ef4d7d751f4d2ce276ffb9978585e2e8f970b8a55da55d94c43968098a1d6fb

                                                    • C:\Users\Admin\AppData\Local\Temp\pkg\f806f89dc41dde00ca7124dc1e649bdc9b08ff2eff5c891b764f3e5aefa9548c\sqlite3\build\Release\node_sqlite3.node

                                                      Filesize

                                                      1.8MB

                                                      MD5

                                                      66a65322c9d362a23cf3d3f7735d5430

                                                      SHA1

                                                      ed59f3e4b0b16b759b866ef7293d26a1512b952e

                                                      SHA256

                                                      f806f89dc41dde00ca7124dc1e649bdc9b08ff2eff5c891b764f3e5aefa9548c

                                                      SHA512

                                                      0a44d12852fc4c74658a49f886c4bc7c715c48a7cb5a3dcf40c9f1d305ca991dd2c2cb3d0b5fd070b307a8f331938c5213188cbb2d27d47737cc1c4f34a1ea21

                                                    • C:\Users\Admin\AppData\Local\Temp\temp.ps1

                                                      Filesize

                                                      379B

                                                      MD5

                                                      18047e197c6820559730d01035b2955a

                                                      SHA1

                                                      277179be54bba04c0863aebd496f53b129d47464

                                                      SHA256

                                                      348342fd00e113a58641b2c35dd6a8f2c1fb2f1b16d8dff9f77b05f29e229ef3

                                                      SHA512

                                                      1942acd6353310623561efb33d644ba45ab62c1ddfabb1a1b3b1dd93f7d03df0884e2f2fc927676dc3cd3b563d159e3043d2eff81708c556431be9baf4ccb877

                                                    • \??\c:\Users\Admin\AppData\Local\Temp\4dtfbcmt\4dtfbcmt.0.cs

                                                      Filesize

                                                      311B

                                                      MD5

                                                      7bc8de6ac8041186ed68c07205656943

                                                      SHA1

                                                      673f31957ab1b6ad3dc769e86aedc7ed4b4e0a75

                                                      SHA256

                                                      36865e3bca9857e07b1137ada07318b9caaef9608256a6a6a7fd426ee03e1697

                                                      SHA512

                                                      0495839c79597e81d447672f8e85b03d0401f81c7b2011a830874c33812c54dab25b0f89a202bbb71abb4ffc7cb2c07cc37c008b132d4d5d796aebdd12741dba

                                                    • \??\c:\Users\Admin\AppData\Local\Temp\4dtfbcmt\4dtfbcmt.cmdline

                                                      Filesize

                                                      369B

                                                      MD5

                                                      b3d33ce843bc2452bf9a60253561a7de

                                                      SHA1

                                                      ff90729b41335edd505c07ed222bf40a767c7985

                                                      SHA256

                                                      d051503c3e348047c075e9161912729e533c91e24ec86875664ee219c55ba809

                                                      SHA512

                                                      1336edd3d470ba48c8309adba435bb1927887844d736e4ad8824eb6972f734fffcc1b69cb64e9808ef842b56889375310ba5c084f9d214809ea121b753024b48

                                                    • \??\c:\Users\Admin\AppData\Local\Temp\4dtfbcmt\CSC309E4B7FB783464192B1C926C39ED993.TMP

                                                      Filesize

                                                      652B

                                                      MD5

                                                      e7c4d06de71f4042ebe705039fc727e7

                                                      SHA1

                                                      485863a444ed8674586db2cc27e8bbd7f7e528d3

                                                      SHA256

                                                      ad13db7056e38165ee5138fe2a08d4d54a973ba0bfbbf67e60104ae5e14f2ce4

                                                      SHA512

                                                      6f542a1852597af29b1d55a47b405b649c6127590c1784552aa776c81446ae2d92076651660b2a06b5bb37494dad697f5d12b4e2c44f6a63c708fbd164635dbd

                                                    • \??\c:\Users\Admin\AppData\Local\Temp\ld4bjlij\CSCA0E18DE823C4282B769C5C7DD65A9.TMP

                                                      Filesize

                                                      652B

                                                      MD5

                                                      bd01e3403f2ea09bcf5eaf5859c2b322

                                                      SHA1

                                                      28599c1ef086a76cc6115455ffd0cbc7916f546a

                                                      SHA256

                                                      29e4a32da08474eb8fd4c14d42b334c849f97f4c229c88421d706ede78d700d2

                                                      SHA512

                                                      918460699abdc88374972c19d8f74fe10eac343ae0d03702d7dfc11e0dc28262cd4ef97f5ec118af3ffb5575d64589061cbb4199dd891e0bf1a7b64c826cb639

                                                    • \??\c:\Users\Admin\AppData\Local\Temp\ld4bjlij\ld4bjlij.0.cs

                                                      Filesize

                                                      426B

                                                      MD5

                                                      b462a7b0998b386a2047c941506f7c1b

                                                      SHA1

                                                      61e8aa007164305a51fa2f1cebaf3f8e60a6a59f

                                                      SHA256

                                                      a81f86cd4d33ebbf2b725df6702b8f6b3c31627bf52eb1cadc1e40b1c0c2bb35

                                                      SHA512

                                                      eb41b838cc5726f4d1601d3c68d455203d3c23f17469b3c8cbdd552f479f14829856d699f310dec05fe7504a2ae511d0b7ffff6b66ceadb5a225efe3e2f3a020

                                                    • \??\c:\Users\Admin\AppData\Local\Temp\ld4bjlij\ld4bjlij.cmdline

                                                      Filesize

                                                      369B

                                                      MD5

                                                      e6daa46e6c2966ec6c7ec0476bf991ef

                                                      SHA1

                                                      726fed6051bcffb2df860d53e1783355da876007

                                                      SHA256

                                                      a0e559f2f2d3a03022d7d2c85753a6eb1a960c5c5c24a52854cb04e4bf49009a

                                                      SHA512

                                                      07b9f5a02649b44bf79095600b916870b69e50ac21d505e989f56ceb885355e5d6ac56e3bba7de73817d22a68bff26539ca53bd2530d910b6eb28fa096a2a2df

                                                    • memory/1500-247-0x00000233ED5C0000-0x00000233ED610000-memory.dmp

                                                      Filesize

                                                      320KB

                                                    • memory/2940-344-0x00000178F21F0000-0x00000178F21F8000-memory.dmp

                                                      Filesize

                                                      32KB

                                                    • memory/4256-116-0x00007FFAA4D40000-0x00007FFAA572C000-memory.dmp

                                                      Filesize

                                                      9.9MB

                                                    • memory/4256-211-0x00007FFAA4D40000-0x00007FFAA572C000-memory.dmp

                                                      Filesize

                                                      9.9MB

                                                    • memory/4256-186-0x0000024BDE0A0000-0x0000024BDE0A8000-memory.dmp

                                                      Filesize

                                                      32KB

                                                    • memory/4256-117-0x0000024BDE3E0000-0x0000024BDE456000-memory.dmp

                                                      Filesize

                                                      472KB

                                                    • memory/4256-105-0x0000024BDE0C0000-0x0000024BDE0FC000-memory.dmp

                                                      Filesize

                                                      240KB

                                                    • memory/4256-79-0x00007FFAA4D40000-0x00007FFAA572C000-memory.dmp

                                                      Filesize

                                                      9.9MB

                                                    • memory/4256-77-0x0000024BDDBD0000-0x0000024BDDBF2000-memory.dmp

                                                      Filesize

                                                      136KB

                                                    • memory/4256-75-0x00007FFAA4D43000-0x00007FFAA4D44000-memory.dmp

                                                      Filesize

                                                      4KB