Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    27/02/2025, 10:04

General

  • Target

    2020.10.29_CISA-MAR-10310246_Powershell_Backdoor/134919151466c9292bdcb7c24c32c841a5183d880072b0ad5e8b3a3a830afef8.ps1

  • Size

    4.1MB

  • MD5

    65419948186842f8f3ef07cafb71f59a

  • SHA1

    93537b0814177e2101663306aa17332b9303e08a

  • SHA256

    134919151466c9292bdcb7c24c32c841a5183d880072b0ad5e8b3a3a830afef8

  • SHA512

    83d093c6febacb11fcde57fee98c2385f628e5cd3629bfabd0f9e4d2c5de18c6336b3d3aff8081b06a827e742876d19ae370e81890c247daac73d4f8b7ea5f90

  • SSDEEP

    24576:+vq2EYNg0gX792UHDoSe9Ov2a8p+JnHZUoWYWUpcfm3WuPhu/aqJOFKs4Wuw054o:Drr9q0v4ubJmg4OFuwkOM5NZihxs

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Using powershell.exe command.

  • Drops file in System32 directory 1 IoCs
  • Obfuscated Files or Information: Fileless Storage 1 TTPs 1 IoCs

    Fileless storage can be broadly defined as any format other than a file.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1172
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\2020.10.29_CISA-MAR-10310246_Powershell_Backdoor\134919151466c9292bdcb7c24c32c841a5183d880072b0ad5e8b3a3a830afef8.ps1
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2384
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
        "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\cqsmzdr8.cmdline"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2844
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD49E.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCD49D.tmp"
          4⤵
            PID:2000
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -v 2 "$GS459ea = 'QNIGKTKGN9673372myjtwdye'; [Text.Encoding]::ASCII.GetString([Convert]::FromBase64String((gp HKLM:\SOFTWARE\Microsoft\SQMClient\Windows).WSqmCons))|iex"
          3⤵
          • Command and Scripting Interpreter: PowerShell
          • Obfuscated Files or Information: Fileless Storage
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2788
          • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
            "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\chkvo6ti.cmdline"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2192
            • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
              C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESDC8A.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCDC89.tmp"
              5⤵
                PID:2740
            • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
              "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\tod_dosk.cmdline"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:2604
              • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESDCE8.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCDCE7.tmp"
                5⤵
                  PID:1712
              • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
                "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\rt5ykpg6.cmdline"
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:2612
                • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                  C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESDD74.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCDD73.tmp"
                  5⤵
                    PID:2144
            • \??\c:\program files\internet explorer\iexplore.exe
              "c:\program files\internet explorer\iexplore.exe"
              2⤵
                PID:836
              • C:\Windows\System32\calc.exe
                "C:\Windows\System32\calc.exe"
                2⤵
                  PID:2488
                • \??\c:\program files\internet explorer\iexplore.exe
                  "c:\program files\internet explorer\iexplore.exe"
                  2⤵
                    PID:2896
                  • C:\Windows\System32\calc.exe
                    "C:\Windows\System32\calc.exe"
                    2⤵
                      PID:2272

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\05DDC6AA91765AACACDB0A5F96DF8199

                    Filesize

                    854B

                    MD5

                    e935bc5762068caf3e24a2683b1b8a88

                    SHA1

                    82b70eb774c0756837fe8d7acbfeec05ecbf5463

                    SHA256

                    a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d

                    SHA512

                    bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

                    Filesize

                    1KB

                    MD5

                    1e1fcb1c415a69b3fed8929680be8050

                    SHA1

                    fe067b98d2d9f0d02ff82cf47ea261a6322ab4c7

                    SHA256

                    795332af25569bcf9a01561c19f78ccf11cd68335c9ba83b912e9cb2295b6e75

                    SHA512

                    bc32e1b87e1510211573878f3bc5317556d4bbd596ef7bfec7c4939febff2a016cd822a29c5ec7fff14564bac02c37609d5a0c2d54e1e8a056aa9428aca2668e

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\4FA45AE1010E09657982D8D28B3BD38E_2BB941531B2B417CB9B9143D82A69960

                    Filesize

                    472B

                    MD5

                    a647eb75fbe4d938040c6d0fb977b349

                    SHA1

                    4530038c8540a182c591ada9213fdd76a074069c

                    SHA256

                    f8cfb17fa66231474c76357acdf5480e7d0757c365e3d171fa4d9c54510d6761

                    SHA512

                    a9b626b3dd9200f20ebe75f0b8c881e9671be5165b104222ffb8744a74bb3aff949c243ca81a1ba7e2c50b889929e58eca9d7e23faf8ceb36c5be180ba73b004

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6DA548C7E5915679F87E910D6581DEF1_A000C89199F47679C214E2850CD5B625

                    Filesize

                    472B

                    MD5

                    7e494f4381fc293282108942a958a2df

                    SHA1

                    70d63e208234be74e96b9ff095c502157d7483c0

                    SHA256

                    677405d1bea41862c4d1ce40eacc5912f069c00bdd8117ae14ad377e1c83f91b

                    SHA512

                    167a3f0add0a68d27bd0c1b3816fee952d4d50199d3a10a8c03815020c0538e5fd94c993177ca0fee76b500b96a7eff16a7ce2823a6de336e6d1a10165d66171

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199

                    Filesize

                    170B

                    MD5

                    cf39f6cf02389a1690d230214cb608e0

                    SHA1

                    db8d1dc6a66a6c33f81a9d2400e0df4ec20f77a0

                    SHA256

                    57962db820e606eb0b12cc2d54d386aa36bdb293e37a624236fb4131972362f3

                    SHA512

                    5179cb56ac4ac07cd7af2660b598271dbce9f901cba470c93f669778e0cc58b8d2768096e95e62c40391d19a48d9b94bf371f2b71e793d19417d2d87b235c17e

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

                    Filesize

                    410B

                    MD5

                    fbdcfe4e026d821fe095350db9c54326

                    SHA1

                    914fb8d4c2ccf6a2a952cde706abafcd8bde7c1e

                    SHA256

                    8404b46a1b296246329794acd4ad32a6952f1d837e0d41eda8ad0feeb2202a7e

                    SHA512

                    b8e21ee701b78fe0456a40426feea39fd88a5f714ec44149f00618ed047519561e78c1d7a497a49e7f78c81de5ba226ab3cc4918290089e17363de897496be58

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\4FA45AE1010E09657982D8D28B3BD38E_2BB941531B2B417CB9B9143D82A69960

                    Filesize

                    402B

                    MD5

                    30c8f2af5e4271b2ca2d3352e7daaa6c

                    SHA1

                    03f13c7cfb9b7e03e44c39d781bd39544f9d7123

                    SHA256

                    a328a1a7bc42c280cb11552804ad0e28360072a6a0ffbd520b12dff37c356120

                    SHA512

                    7f638d7ad16102dceb21dfa8b01563842290316c7ff7dd070ed6d8170817164955c45286a6763dbf1f35c729c6ec83f4194ee02e2b23481a7d1ac39fc305f369

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6DA548C7E5915679F87E910D6581DEF1_A000C89199F47679C214E2850CD5B625

                    Filesize

                    398B

                    MD5

                    3b07fbfc3aa9338d113696fd9009d5fb

                    SHA1

                    7058babc20d32f3a426788b91677e31601483572

                    SHA256

                    3f13e2c8017f613708232184b2249c133b608d24db3b40cdafda7c3f6eae8120

                    SHA512

                    98956e1e28583c80249de9d00cd053a1bd9c1204adf0e04f829f64e7aa5d1cf26ff6a4170029590c0e3dffdaffd8ae43124def7e2604a9beb2865b2be8210f7c

                  • C:\Users\Admin\AppData\Local\Temp\Cab474.tmp

                    Filesize

                    70KB

                    MD5

                    49aebf8cbd62d92ac215b2923fb1b9f5

                    SHA1

                    1723be06719828dda65ad804298d0431f6aff976

                    SHA256

                    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                    SHA512

                    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                  • C:\Users\Admin\AppData\Local\Temp\RESD49E.tmp

                    Filesize

                    1KB

                    MD5

                    b03e19b92a8b52f014e9406f4a1be23f

                    SHA1

                    942e3479da8c2a389ebe515576864acb9a55f802

                    SHA256

                    8c52eb5891f4390448730f860ea53a29a4ae138745dc5d93e05cf62d5e503095

                    SHA512

                    df5585ead75ec482604e1a66b9c5260fa17903c5db09b8c5d88de4974e9a950b7eb8033828e041c09f917597ef0ee5d7b80819555c06501da3239db98e13504f

                  • C:\Users\Admin\AppData\Local\Temp\RESDC8A.tmp

                    Filesize

                    1KB

                    MD5

                    cc593604393f77566562499a93464a0b

                    SHA1

                    0938ba8f625b94ad550566a952bc3414f36e4961

                    SHA256

                    ba47418778fb7e4ab6890b4c393400103f878dc5933850c7abf4e1961d0af2a3

                    SHA512

                    772baf421764e5a8f7c5f39c66083735f0ce2fec94cdce5f1489ae14c6086abd99f3712abf65ac79f34440af6a4fc0ec9bd058ee1d333c528b9352461e5880ef

                  • C:\Users\Admin\AppData\Local\Temp\RESDCE8.tmp

                    Filesize

                    1KB

                    MD5

                    a5fb6b26e4199de0898644df3759dd84

                    SHA1

                    e2b03c7074db56fe6999aeba336f21dc63fea873

                    SHA256

                    b3608b8da1cb4e949eb1efc9efaa4834e5df9d2fdcd44600f19d680517861722

                    SHA512

                    f01cab3346aebc588c428fcfee3929b1cd81f52f638f5bc98d9866b7618a25f04b70cc8cf8d67476748ea8be046806e3b3135f09be387b30643c38870437f361

                  • C:\Users\Admin\AppData\Local\Temp\RESDD74.tmp

                    Filesize

                    1KB

                    MD5

                    163de438b6a12d9c263682707bda64fb

                    SHA1

                    2781f00d6b5f9bb1e75c7e6bab3f12f6928d7696

                    SHA256

                    2272112012a9bd6839bd166dec06a8c29f8ec2e741e3ad91622dd01ef2d77cfd

                    SHA512

                    28954ebd3a530ad06727fbf2c1e37704bcbb6bc0236668d869b16bd28955648f2863086e62ff2f0a0e9b82b9220653ebce9032db6fc61bed12cc01d9f932f9e8

                  • C:\Users\Admin\AppData\Local\Temp\chkvo6ti.dll

                    Filesize

                    4KB

                    MD5

                    a08b834d641ac1821b93986620b3d0eb

                    SHA1

                    4afacd12f5a8afacee363313cb124735ac1e65ea

                    SHA256

                    88eaea21208335e0498d42add77251d55b8b4facc8d8388e496da987ecfad813

                    SHA512

                    f1f1491afda711ddc4a17956205656ad507a4e1ae048a8455b693be90ebf5d3fcd00ba44ad33303eba328cd7c52e0b42a40a36c0a7931c70a644ce223129c91f

                  • C:\Users\Admin\AppData\Local\Temp\chkvo6ti.pdb

                    Filesize

                    11KB

                    MD5

                    dd8c12054bd07d9ff753ec1f9ce93fc4

                    SHA1

                    613794291257ebbba5a94b1fd0cea4748e75f4d4

                    SHA256

                    e77f1178da6684ba5b9a4d91ca124cd7475f1dd76b6e8d6d7380ffb5013dcc79

                    SHA512

                    968efb703e31d5923d4b9d4b82d2d3777d455c964d0b4224a7080d3d4fc953c45d793af753b92805abaa3c779286fd1296c6341acf7a8c424daa6878cf6c9359

                  • C:\Users\Admin\AppData\Local\Temp\cqsmzdr8.dll

                    Filesize

                    3KB

                    MD5

                    2b7b63ca58bdff90a45a0bbd967e3d78

                    SHA1

                    2821ce83f1683d1eed5f2ac4c1a54868a094d8e1

                    SHA256

                    1694f2d1c13b9e0283e73461115f0757ae43e2e9d974ed8f0a60023ebaae3b85

                    SHA512

                    4acb9d1d28a89dc7ad33f17893b75cf5e8504832a22d4cbe1eefaed939af25110f323a64a2735ff79f422c4b274ab321e1905e4af66ce0abcc0b56fd82351ed5

                  • C:\Users\Admin\AppData\Local\Temp\cqsmzdr8.pdb

                    Filesize

                    11KB

                    MD5

                    0998871c33e2e78aa10153931c665055

                    SHA1

                    58c9a6934e4c51736b038bea22438416f343824d

                    SHA256

                    1e334e132d986c1a5500ba8364cb33ae540acae3ec001ca43b388183c0c7db20

                    SHA512

                    1a07c75e6082a23071014b563f74f540fdc730d852ca300f588004f95f19594ebd9652771928b7ef48a35f2eda096698bbe50afc611b189513ae7fe15579cf38

                  • C:\Users\Admin\AppData\Local\Temp\rt5ykpg6.dll

                    Filesize

                    4KB

                    MD5

                    475d59c718b1a227e1a9c65b40ff77c6

                    SHA1

                    2d566866c3bb3f150933bfaf9d277a3f32a0cadf

                    SHA256

                    ec78ed0985b8dfa20707c5df1bc6b1bf2b9f2a7c4695e7c4ed2b6b2b8f898a78

                    SHA512

                    cbe419402aa00699f2651f6712938cdbe942cd45e259093f85923fc5e9f8e48848107676ba93851409bdbae491c4a4e891907ec57b23100845895f4cd595cd31

                  • C:\Users\Admin\AppData\Local\Temp\rt5ykpg6.pdb

                    Filesize

                    11KB

                    MD5

                    898c7f7a928061349f3d1ccb7db02dec

                    SHA1

                    012776af1512343b17140d05538f8b9c27a61857

                    SHA256

                    28beac6787dcae78c3be520d37b45d6ce53543c961e0d1cc712ca71eab5f363a

                    SHA512

                    28939993d908e95efb99f2b77210609f012dcf07cb061c73c391873574583ea470c06e793480701bef0f9935d979aae51871bddd7926ecbe51de1cc94cd8c06e

                  • C:\Users\Admin\AppData\Local\Temp\tod_dosk.dll

                    Filesize

                    3KB

                    MD5

                    97ab9a73131bd5148e2e9113a3cd58d4

                    SHA1

                    10aaaa10161a972bf360e0be8993f5a52bb280ae

                    SHA256

                    b693830af17b6ae460ab84961031db4d81cffde0cf9411f17645037d39b3fd89

                    SHA512

                    1bb74f71d683d8ee4a05af3cfced8ff0995c24330b97b3299b489db579e9a6dbeedbb7d33522d52e1d461af5c7d6576a299efff84587b77f35394c6029d1e9b4

                  • C:\Users\Admin\AppData\Local\Temp\tod_dosk.pdb

                    Filesize

                    11KB

                    MD5

                    274c6e25755f1682688c817bdc2e2fe6

                    SHA1

                    57aeb83557923215e72c0ec1853079c8a9da1b12

                    SHA256

                    4c72fe4911bec07dd600d0eadb5b4ed58ebfeb7644378fa5173a34becd9a03c0

                    SHA512

                    bd2e2b25d3e7efa61c20b4f4f37cdce61edc172134faa101b896103a93c2271638b94e6bcbb2442e069584572d8fd074169a569759775dcedd6210cb53934cde

                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                    Filesize

                    7KB

                    MD5

                    d35a468a5082757a3cdcf08389c99ba2

                    SHA1

                    19f35120f931d7db5f4c21791c34a63bb3a5de12

                    SHA256

                    d0073792699f99baf5bad4c293fd0f4bd2a6c59ea2501785896f1d5e73f6b087

                    SHA512

                    886b3d118c1429beb814871b63606a4a1032aac0974c9d2c3bed01d0bb772051fbf248a8dc06810a3211434c48e277ffca1c5ba717dfe1447d7ba7605113f36d

                  • \??\c:\Users\Admin\AppData\Local\Temp\CSCD49D.tmp

                    Filesize

                    652B

                    MD5

                    cae200241ccd540df5318a758926f585

                    SHA1

                    b0bd5d51d9a41de12021de064972f2576f96cfd0

                    SHA256

                    186bb805661d2b12c1ae7d512350963084d87f2dcbf0a0672f7971c29dcbccb4

                    SHA512

                    eb180d9614c44e200e544e25c5eab85356910570fa3fda66c02cb75e2805faa7ec1ec787ca7529426cee53815cffe4c85dc3c3589429ab7a646cbd88a6182f99

                  • \??\c:\Users\Admin\AppData\Local\Temp\CSCDC89.tmp

                    Filesize

                    652B

                    MD5

                    fabda8c00981bd898fb68b7fd0a34136

                    SHA1

                    ca38fd99ab45c30448f501db8dd17e41003d427d

                    SHA256

                    85ebe522cc6b05cc3120726257576f5ef29ea61d02e8e0fb3a72f25b590d2fdb

                    SHA512

                    27139a86c210e7b18c297fe924e422aa6deb11c1f389130b7d56a157da1eaab4b97abc4e184fa5cbecd6ac84b0741eb298bcb62bd8571fae1264caa3fd2fcf19

                  • \??\c:\Users\Admin\AppData\Local\Temp\CSCDCE7.tmp

                    Filesize

                    652B

                    MD5

                    b29379f3d2c0f7a154714cb175f00286

                    SHA1

                    a7e41059e47b170964acb1625dc25c82038dd4c1

                    SHA256

                    d9f83e0ee071cfe68393fdca50e0e32d98401d8cf07b67919c5436ae55e7e2a4

                    SHA512

                    46c43ccabdd87300294d3764af878fbd4790e87ea347f1cbb2dfaef62400db79e0848aa745fface66d6444dada5b4e8c2ec83f3115ca198259297c9225a609de

                  • \??\c:\Users\Admin\AppData\Local\Temp\CSCDD73.tmp

                    Filesize

                    652B

                    MD5

                    89335757bb42bc824b5d8966aae3d26e

                    SHA1

                    bb0ca7e42e1d525ef5ed90e73ca1a5cd28d7bdeb

                    SHA256

                    a230a21ec22edf11d02c37c380d45dbbb470b5b8a4f961b17db89abeb5928530

                    SHA512

                    cca3bc8de735019b2399aa5b76c55a77400235692e03d43476171c76534da3692d203984dcaeb332684f5f60070e995637fc70c13e52027fcd5790bb6add0995

                  • \??\c:\Users\Admin\AppData\Local\Temp\chkvo6ti.0.cs

                    Filesize

                    980B

                    MD5

                    da1557dea3f8c05a13fee015a9c6f611

                    SHA1

                    5caf92dd6dbc4e3620b82e25c4b56eda989804cf

                    SHA256

                    a2ff189e6aa832dd0cad758b2c626826463894c385ef5e05dc850020bc828d49

                    SHA512

                    7c18c5b8194f2e90b71a538e1ecc9ea8832126bba72f0ae3e261bc5cd8c708d76a3330834b72f75ee7d4cab1d7f73c929d89019226d40ee1db0b9cbe41d90be7

                  • \??\c:\Users\Admin\AppData\Local\Temp\chkvo6ti.cmdline

                    Filesize

                    309B

                    MD5

                    2d2286c220b4dff02c9f5a72157f1921

                    SHA1

                    bc4ea8a9271abb929adfa3c93def1511a88c12a6

                    SHA256

                    cc7efd6d54581b9401e4fa3adf984810ae0325f97f2eca3676b9708f5cbdcde2

                    SHA512

                    ea9d1f57678d5b8bc4d80a929b25f4236d9da733898189f82adc3dc6c8f22a1c6f56f4946d7d097bad25cec43e1f1e2537784f5364631cf5119641939571ccd3

                  • \??\c:\Users\Admin\AppData\Local\Temp\cqsmzdr8.0.cs

                    Filesize

                    267B

                    MD5

                    9a5354e267b72f1a15a5d2e66a2e0788

                    SHA1

                    2db1d1a809659312bf45f91d41777360526c0a67

                    SHA256

                    154e4bdda09648d3e855b1e47488b00c323787125351556787f83c95c441f724

                    SHA512

                    4a47a58d75da136da493821b3212c15e53ea13204f35f9fcbaf6177356aba5b2ea0c60071daae93dd3d00c395c7dae5f559117dc851ea4a5d8612b0088ec1f01

                  • \??\c:\Users\Admin\AppData\Local\Temp\cqsmzdr8.cmdline

                    Filesize

                    309B

                    MD5

                    3d421a9db1a13f0cc2e83280c98c1ecc

                    SHA1

                    0984e0388e5e7e8d37de3b9e8ef8b4d656bb0529

                    SHA256

                    c64cd3563037031e0278d4db22fe79bcc18094dd6d4c4910bd0eb53b92cdc9f9

                    SHA512

                    35e1789abd57fe7dcfe83d03d4eedf6bde82e1dbdd07c57062383086d6804a85cb10f30cdd073c0834214c122f3933f0d39bd964adbf199e776e27a8d34f818d

                  • \??\c:\Users\Admin\AppData\Local\Temp\rt5ykpg6.0.cs

                    Filesize

                    977B

                    MD5

                    4d4e062dbabff2ac65812c279e6dc303

                    SHA1

                    9cbca666d69e5203fd56802995d3cb00ed083ff7

                    SHA256

                    070c1afb7f94b40e618b2b989b126a8f2f775a439b283ccdf1aff7879895869d

                    SHA512

                    b6442831b01e1257ee38f079b0530b71d0aa9a9e8110864e1af2b1a5485f92cb99d137328418e9b97a16c88345c43ab7bb3c5548c5bb805f02c31957fa54483d

                  • \??\c:\Users\Admin\AppData\Local\Temp\rt5ykpg6.cmdline

                    Filesize

                    309B

                    MD5

                    56730d5446b7f67549f8ee14e27f020a

                    SHA1

                    99d371e2cdbf953ac73a41ec279bb49d9ad528e5

                    SHA256

                    dc870fd85d732a76f957041790ac57bce5cf0ded518919083a25a12b90bcd855

                    SHA512

                    88b08a8dd05450dccf5a681f550da620181cf89217818822deaae55a534dcbe7ed927068c0aa1ead356a11c917ec27e931367131f905939fff3b57b6b9d337e9

                  • \??\c:\Users\Admin\AppData\Local\Temp\tod_dosk.cmdline

                    Filesize

                    309B

                    MD5

                    cbaabfdc2c5f11c33e51c5cb2ea7337a

                    SHA1

                    2f33714b871f2726bbcdfe3ccf89957d0fefc370

                    SHA256

                    31ad90b88d0cbaec5ee256b17d936f985d8f4ad0fa86f47573a8ad9eb3d04995

                    SHA512

                    f172dea859ed5e85150cda234b652ed698644e417e1e3346a29ca9aa11110453ef3ac1f40cef0192d98011e70eb2553d1853229e65b8ef3eca5c4e57b2e735f6

                  • memory/1172-83-0x00000000021C0000-0x00000000021C1000-memory.dmp

                    Filesize

                    4KB

                  • memory/1172-91-0x0000000002610000-0x0000000002611000-memory.dmp

                    Filesize

                    4KB

                  • memory/1172-86-0x0000000002610000-0x0000000002611000-memory.dmp

                    Filesize

                    4KB

                  • memory/2384-10-0x000007FEF60A0000-0x000007FEF6A3D000-memory.dmp

                    Filesize

                    9.6MB

                  • memory/2384-27-0x000000001BC00000-0x000000001BC08000-memory.dmp

                    Filesize

                    32KB

                  • memory/2384-8-0x000007FEF60A0000-0x000007FEF6A3D000-memory.dmp

                    Filesize

                    9.6MB

                  • memory/2384-7-0x000007FEF60A0000-0x000007FEF6A3D000-memory.dmp

                    Filesize

                    9.6MB

                  • memory/2384-4-0x000007FEF635E000-0x000007FEF635F000-memory.dmp

                    Filesize

                    4KB

                  • memory/2384-769-0x000007FEF60A0000-0x000007FEF6A3D000-memory.dmp

                    Filesize

                    9.6MB

                  • memory/2384-809-0x000007FEF60A0000-0x000007FEF6A3D000-memory.dmp

                    Filesize

                    9.6MB

                  • memory/2384-6-0x0000000002390000-0x0000000002398000-memory.dmp

                    Filesize

                    32KB

                  • memory/2384-5-0x000000001B5E0000-0x000000001B8C2000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/2384-9-0x000007FEF60A0000-0x000007FEF6A3D000-memory.dmp

                    Filesize

                    9.6MB

                  • memory/2384-11-0x000007FEF60A0000-0x000007FEF6A3D000-memory.dmp

                    Filesize

                    9.6MB

                  • memory/2788-64-0x000000001B470000-0x000000001B478000-memory.dmp

                    Filesize

                    32KB

                  • memory/2788-80-0x000000001B410000-0x000000001B418000-memory.dmp

                    Filesize

                    32KB

                  • memory/2788-48-0x000000001B460000-0x000000001B468000-memory.dmp

                    Filesize

                    32KB

                  • memory/2844-17-0x000007FEF60A0000-0x000007FEF6A3D000-memory.dmp

                    Filesize

                    9.6MB

                  • memory/2844-25-0x000007FEF60A0000-0x000007FEF6A3D000-memory.dmp

                    Filesize

                    9.6MB