Analysis
-
max time kernel
192s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
14-10-2022 19:07
Static task
static1
Behavioral task
behavioral1
Sample
13f0462af330f984e6bf4f78ca0fd568.exe
Resource
win7-20220812-en
General
-
Target
13f0462af330f984e6bf4f78ca0fd568.exe
-
Size
4.9MB
-
MD5
13f0462af330f984e6bf4f78ca0fd568
-
SHA1
d4cade4a691d79c8edb40a02036dda11190e4795
-
SHA256
98a6de25f542afaee3621feaf905566e3a5f60c99c5e1c051de2046cd803fb06
-
SHA512
f04865953da22dd552373cb1a6e027ed2adbe87ad8f3fdbf59145d70fbc6de1310451824f45cc613400b14a4fe333ffe8cb8bdf65407badbcc4a9b76769a8ea8
-
SSDEEP
49152:jl5MTGChZpxtlBBgxchXb/zqP6DUtRgs5q289dAnSz44hnW1XgnYu6fYmPkMSx8E:
Malware Config
Extracted
colibri
1.2.0
Build1
http://zpltcmgodhvvedxtfcygvbgjkvgvcguygytfigj.cc/gate.php
http://yugyuvyugguitgyuigtfyutdtoghghbbgyv.cx/gate.php
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process 45 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1324 5020 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4648 5020 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1744 5020 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1504 5020 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1068 5020 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1064 5020 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1368 5020 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2164 5020 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1356 5020 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4468 5020 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5088 5020 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 208 5020 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3000 5020 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1848 5020 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3748 5020 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4184 5020 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4192 5020 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3644 5020 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5044 5020 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1596 5020 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2080 5020 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 384 5020 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 820 5020 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2476 5020 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3008 5020 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4504 5020 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4252 5020 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3396 5020 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3608 5020 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2076 5020 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4416 5020 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3572 5020 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1660 5020 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2840 5020 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2304 5020 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1220 5020 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5076 5020 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2432 5020 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1080 5020 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2852 5020 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4540 5020 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4572 5020 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 372 5020 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2440 5020 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3856 5020 schtasks.exe -
Processes:
dllhost.exe13f0462af330f984e6bf4f78ca0fd568.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 13f0462af330f984e6bf4f78ca0fd568.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 13f0462af330f984e6bf4f78ca0fd568.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 13f0462af330f984e6bf4f78ca0fd568.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe -
Executes dropped EXE 5 IoCs
Processes:
tmp44F8.tmp.exetmp44F8.tmp.exedllhost.exetmp11F.tmp.exetmp11F.tmp.exepid process 4860 tmp44F8.tmp.exe 4144 tmp44F8.tmp.exe 4856 dllhost.exe 1336 tmp11F.tmp.exe 2540 tmp11F.tmp.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
13f0462af330f984e6bf4f78ca0fd568.exedllhost.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 13f0462af330f984e6bf4f78ca0fd568.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation dllhost.exe -
Processes:
13f0462af330f984e6bf4f78ca0fd568.exedllhost.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 13f0462af330f984e6bf4f78ca0fd568.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 13f0462af330f984e6bf4f78ca0fd568.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe -
Drops file in System32 directory 4 IoCs
Processes:
13f0462af330f984e6bf4f78ca0fd568.exedescription ioc process File created C:\Windows\SysWOW64\fr\smss.exe 13f0462af330f984e6bf4f78ca0fd568.exe File created C:\Windows\SysWOW64\fr\69ddcba757bf72 13f0462af330f984e6bf4f78ca0fd568.exe File opened for modification C:\Windows\SysWOW64\fr\RCX3348.tmp 13f0462af330f984e6bf4f78ca0fd568.exe File opened for modification C:\Windows\SysWOW64\fr\smss.exe 13f0462af330f984e6bf4f78ca0fd568.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
tmp44F8.tmp.exetmp11F.tmp.exedescription pid process target process PID 4860 set thread context of 4144 4860 tmp44F8.tmp.exe tmp44F8.tmp.exe PID 1336 set thread context of 2540 1336 tmp11F.tmp.exe tmp11F.tmp.exe -
Drops file in Program Files directory 12 IoCs
Processes:
13f0462af330f984e6bf4f78ca0fd568.exedescription ioc process File created C:\Program Files\Windows Defender\ja-JP\e6c9b481da804f 13f0462af330f984e6bf4f78ca0fd568.exe File created C:\Program Files\Windows Defender\ja-JP\fontdrvhost.exe 13f0462af330f984e6bf4f78ca0fd568.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\RCXB1A3.tmp 13f0462af330f984e6bf4f78ca0fd568.exe File opened for modification C:\Program Files\Internet Explorer\it-IT\RCXBD1D.tmp 13f0462af330f984e6bf4f78ca0fd568.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\RCXC32A.tmp 13f0462af330f984e6bf4f78ca0fd568.exe File created C:\Program Files\Windows Defender\ja-JP\OfficeClickToRun.exe 13f0462af330f984e6bf4f78ca0fd568.exe File created C:\Program Files\Internet Explorer\it-IT\5eb588ee827b5a 13f0462af330f984e6bf4f78ca0fd568.exe File created C:\Program Files\Windows Defender\ja-JP\5b884080fd4f94 13f0462af330f984e6bf4f78ca0fd568.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\OfficeClickToRun.exe 13f0462af330f984e6bf4f78ca0fd568.exe File opened for modification C:\Program Files\Internet Explorer\it-IT\13f0462af330f984e6bf4f78ca0fd568.exe 13f0462af330f984e6bf4f78ca0fd568.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\fontdrvhost.exe 13f0462af330f984e6bf4f78ca0fd568.exe File created C:\Program Files\Internet Explorer\it-IT\13f0462af330f984e6bf4f78ca0fd568.exe 13f0462af330f984e6bf4f78ca0fd568.exe -
Drops file in Windows directory 12 IoCs
Processes:
13f0462af330f984e6bf4f78ca0fd568.exedescription ioc process File created C:\Windows\de-DE\spoolsv.exe 13f0462af330f984e6bf4f78ca0fd568.exe File created C:\Windows\Speech_OneCore\lsass.exe 13f0462af330f984e6bf4f78ca0fd568.exe File opened for modification C:\Windows\Resources\RCX2D1C.tmp 13f0462af330f984e6bf4f78ca0fd568.exe File opened for modification C:\Windows\de-DE\RCX3098.tmp 13f0462af330f984e6bf4f78ca0fd568.exe File opened for modification C:\Windows\de-DE\spoolsv.exe 13f0462af330f984e6bf4f78ca0fd568.exe File opened for modification C:\Windows\Speech_OneCore\RCXC5CB.tmp 13f0462af330f984e6bf4f78ca0fd568.exe File opened for modification C:\Windows\Speech_OneCore\lsass.exe 13f0462af330f984e6bf4f78ca0fd568.exe File created C:\Windows\Resources\sppsvc.exe 13f0462af330f984e6bf4f78ca0fd568.exe File created C:\Windows\Resources\0a1fd5f707cd16 13f0462af330f984e6bf4f78ca0fd568.exe File created C:\Windows\de-DE\f3b6ecef712a24 13f0462af330f984e6bf4f78ca0fd568.exe File created C:\Windows\Speech_OneCore\6203df4a6bafc7 13f0462af330f984e6bf4f78ca0fd568.exe File opened for modification C:\Windows\Resources\sppsvc.exe 13f0462af330f984e6bf4f78ca0fd568.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 45 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 1504 schtasks.exe 1356 schtasks.exe 1596 schtasks.exe 3008 schtasks.exe 2840 schtasks.exe 1080 schtasks.exe 372 schtasks.exe 1744 schtasks.exe 2440 schtasks.exe 1068 schtasks.exe 4468 schtasks.exe 5088 schtasks.exe 4192 schtasks.exe 4504 schtasks.exe 2076 schtasks.exe 1324 schtasks.exe 208 schtasks.exe 1848 schtasks.exe 3748 schtasks.exe 3396 schtasks.exe 3608 schtasks.exe 5076 schtasks.exe 2432 schtasks.exe 1064 schtasks.exe 2852 schtasks.exe 820 schtasks.exe 2476 schtasks.exe 1220 schtasks.exe 4572 schtasks.exe 384 schtasks.exe 5044 schtasks.exe 2080 schtasks.exe 2304 schtasks.exe 4648 schtasks.exe 2164 schtasks.exe 4184 schtasks.exe 3572 schtasks.exe 1368 schtasks.exe 3644 schtasks.exe 1660 schtasks.exe 3856 schtasks.exe 3000 schtasks.exe 4416 schtasks.exe 4540 schtasks.exe 4252 schtasks.exe -
Modifies registry class 2 IoCs
Processes:
13f0462af330f984e6bf4f78ca0fd568.exedllhost.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings 13f0462af330f984e6bf4f78ca0fd568.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings dllhost.exe -
Suspicious behavior: EnumeratesProcesses 60 IoCs
Processes:
13f0462af330f984e6bf4f78ca0fd568.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedllhost.exepid process 456 13f0462af330f984e6bf4f78ca0fd568.exe 456 13f0462af330f984e6bf4f78ca0fd568.exe 456 13f0462af330f984e6bf4f78ca0fd568.exe 456 13f0462af330f984e6bf4f78ca0fd568.exe 456 13f0462af330f984e6bf4f78ca0fd568.exe 456 13f0462af330f984e6bf4f78ca0fd568.exe 456 13f0462af330f984e6bf4f78ca0fd568.exe 456 13f0462af330f984e6bf4f78ca0fd568.exe 456 13f0462af330f984e6bf4f78ca0fd568.exe 456 13f0462af330f984e6bf4f78ca0fd568.exe 456 13f0462af330f984e6bf4f78ca0fd568.exe 456 13f0462af330f984e6bf4f78ca0fd568.exe 456 13f0462af330f984e6bf4f78ca0fd568.exe 456 13f0462af330f984e6bf4f78ca0fd568.exe 456 13f0462af330f984e6bf4f78ca0fd568.exe 456 13f0462af330f984e6bf4f78ca0fd568.exe 456 13f0462af330f984e6bf4f78ca0fd568.exe 456 13f0462af330f984e6bf4f78ca0fd568.exe 456 13f0462af330f984e6bf4f78ca0fd568.exe 456 13f0462af330f984e6bf4f78ca0fd568.exe 456 13f0462af330f984e6bf4f78ca0fd568.exe 456 13f0462af330f984e6bf4f78ca0fd568.exe 2676 powershell.exe 2676 powershell.exe 4468 powershell.exe 4468 powershell.exe 2948 powershell.exe 2948 powershell.exe 1356 powershell.exe 1356 powershell.exe 4500 powershell.exe 4500 powershell.exe 3984 powershell.exe 3984 powershell.exe 4208 powershell.exe 4208 powershell.exe 2196 powershell.exe 2196 powershell.exe 3876 powershell.exe 3876 powershell.exe 1944 powershell.exe 1944 powershell.exe 4440 powershell.exe 4440 powershell.exe 1288 powershell.exe 1288 powershell.exe 2676 powershell.exe 2676 powershell.exe 3876 powershell.exe 4500 powershell.exe 2948 powershell.exe 1944 powershell.exe 4208 powershell.exe 1356 powershell.exe 2196 powershell.exe 4468 powershell.exe 3984 powershell.exe 4440 powershell.exe 1288 powershell.exe 4856 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
Processes:
13f0462af330f984e6bf4f78ca0fd568.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedllhost.exedescription pid process Token: SeDebugPrivilege 456 13f0462af330f984e6bf4f78ca0fd568.exe Token: SeDebugPrivilege 2676 powershell.exe Token: SeDebugPrivilege 4468 powershell.exe Token: SeDebugPrivilege 2948 powershell.exe Token: SeDebugPrivilege 1356 powershell.exe Token: SeDebugPrivilege 4500 powershell.exe Token: SeDebugPrivilege 3984 powershell.exe Token: SeDebugPrivilege 4208 powershell.exe Token: SeDebugPrivilege 2196 powershell.exe Token: SeDebugPrivilege 3876 powershell.exe Token: SeDebugPrivilege 1944 powershell.exe Token: SeDebugPrivilege 4440 powershell.exe Token: SeDebugPrivilege 1288 powershell.exe Token: SeDebugPrivilege 4856 dllhost.exe -
Suspicious use of WriteProcessMemory 54 IoCs
Processes:
13f0462af330f984e6bf4f78ca0fd568.exetmp44F8.tmp.execmd.exedllhost.exetmp11F.tmp.exedescription pid process target process PID 456 wrote to memory of 4860 456 13f0462af330f984e6bf4f78ca0fd568.exe tmp44F8.tmp.exe PID 456 wrote to memory of 4860 456 13f0462af330f984e6bf4f78ca0fd568.exe tmp44F8.tmp.exe PID 456 wrote to memory of 4860 456 13f0462af330f984e6bf4f78ca0fd568.exe tmp44F8.tmp.exe PID 4860 wrote to memory of 4144 4860 tmp44F8.tmp.exe tmp44F8.tmp.exe PID 4860 wrote to memory of 4144 4860 tmp44F8.tmp.exe tmp44F8.tmp.exe PID 4860 wrote to memory of 4144 4860 tmp44F8.tmp.exe tmp44F8.tmp.exe PID 4860 wrote to memory of 4144 4860 tmp44F8.tmp.exe tmp44F8.tmp.exe PID 4860 wrote to memory of 4144 4860 tmp44F8.tmp.exe tmp44F8.tmp.exe PID 4860 wrote to memory of 4144 4860 tmp44F8.tmp.exe tmp44F8.tmp.exe PID 4860 wrote to memory of 4144 4860 tmp44F8.tmp.exe tmp44F8.tmp.exe PID 456 wrote to memory of 2196 456 13f0462af330f984e6bf4f78ca0fd568.exe powershell.exe PID 456 wrote to memory of 2196 456 13f0462af330f984e6bf4f78ca0fd568.exe powershell.exe PID 456 wrote to memory of 2676 456 13f0462af330f984e6bf4f78ca0fd568.exe powershell.exe PID 456 wrote to memory of 2676 456 13f0462af330f984e6bf4f78ca0fd568.exe powershell.exe PID 456 wrote to memory of 4468 456 13f0462af330f984e6bf4f78ca0fd568.exe powershell.exe PID 456 wrote to memory of 4468 456 13f0462af330f984e6bf4f78ca0fd568.exe powershell.exe PID 456 wrote to memory of 4500 456 13f0462af330f984e6bf4f78ca0fd568.exe powershell.exe PID 456 wrote to memory of 4500 456 13f0462af330f984e6bf4f78ca0fd568.exe powershell.exe PID 456 wrote to memory of 1356 456 13f0462af330f984e6bf4f78ca0fd568.exe powershell.exe PID 456 wrote to memory of 1356 456 13f0462af330f984e6bf4f78ca0fd568.exe powershell.exe PID 456 wrote to memory of 3984 456 13f0462af330f984e6bf4f78ca0fd568.exe powershell.exe PID 456 wrote to memory of 3984 456 13f0462af330f984e6bf4f78ca0fd568.exe powershell.exe PID 456 wrote to memory of 2948 456 13f0462af330f984e6bf4f78ca0fd568.exe powershell.exe PID 456 wrote to memory of 2948 456 13f0462af330f984e6bf4f78ca0fd568.exe powershell.exe PID 456 wrote to memory of 4440 456 13f0462af330f984e6bf4f78ca0fd568.exe powershell.exe PID 456 wrote to memory of 4440 456 13f0462af330f984e6bf4f78ca0fd568.exe powershell.exe PID 456 wrote to memory of 4208 456 13f0462af330f984e6bf4f78ca0fd568.exe powershell.exe PID 456 wrote to memory of 4208 456 13f0462af330f984e6bf4f78ca0fd568.exe powershell.exe PID 456 wrote to memory of 3876 456 13f0462af330f984e6bf4f78ca0fd568.exe powershell.exe PID 456 wrote to memory of 3876 456 13f0462af330f984e6bf4f78ca0fd568.exe powershell.exe PID 456 wrote to memory of 1288 456 13f0462af330f984e6bf4f78ca0fd568.exe powershell.exe PID 456 wrote to memory of 1288 456 13f0462af330f984e6bf4f78ca0fd568.exe powershell.exe PID 456 wrote to memory of 1944 456 13f0462af330f984e6bf4f78ca0fd568.exe powershell.exe PID 456 wrote to memory of 1944 456 13f0462af330f984e6bf4f78ca0fd568.exe powershell.exe PID 456 wrote to memory of 4716 456 13f0462af330f984e6bf4f78ca0fd568.exe cmd.exe PID 456 wrote to memory of 4716 456 13f0462af330f984e6bf4f78ca0fd568.exe cmd.exe PID 4716 wrote to memory of 4392 4716 cmd.exe w32tm.exe PID 4716 wrote to memory of 4392 4716 cmd.exe w32tm.exe PID 4716 wrote to memory of 4856 4716 cmd.exe dllhost.exe PID 4716 wrote to memory of 4856 4716 cmd.exe dllhost.exe PID 4856 wrote to memory of 1336 4856 dllhost.exe tmp11F.tmp.exe PID 4856 wrote to memory of 1336 4856 dllhost.exe tmp11F.tmp.exe PID 4856 wrote to memory of 1336 4856 dllhost.exe tmp11F.tmp.exe PID 1336 wrote to memory of 2540 1336 tmp11F.tmp.exe tmp11F.tmp.exe PID 1336 wrote to memory of 2540 1336 tmp11F.tmp.exe tmp11F.tmp.exe PID 1336 wrote to memory of 2540 1336 tmp11F.tmp.exe tmp11F.tmp.exe PID 1336 wrote to memory of 2540 1336 tmp11F.tmp.exe tmp11F.tmp.exe PID 1336 wrote to memory of 2540 1336 tmp11F.tmp.exe tmp11F.tmp.exe PID 1336 wrote to memory of 2540 1336 tmp11F.tmp.exe tmp11F.tmp.exe PID 1336 wrote to memory of 2540 1336 tmp11F.tmp.exe tmp11F.tmp.exe PID 4856 wrote to memory of 1516 4856 dllhost.exe WScript.exe PID 4856 wrote to memory of 1516 4856 dllhost.exe WScript.exe PID 4856 wrote to memory of 2288 4856 dllhost.exe WScript.exe PID 4856 wrote to memory of 2288 4856 dllhost.exe WScript.exe -
System policy modification 1 TTPs 6 IoCs
Processes:
dllhost.exe13f0462af330f984e6bf4f78ca0fd568.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 13f0462af330f984e6bf4f78ca0fd568.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 13f0462af330f984e6bf4f78ca0fd568.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 13f0462af330f984e6bf4f78ca0fd568.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\13f0462af330f984e6bf4f78ca0fd568.exe"C:\Users\Admin\AppData\Local\Temp\13f0462af330f984e6bf4f78ca0fd568.exe"1⤵
- UAC bypass
- Checks computer location settings
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Users\Admin\AppData\Local\Temp\tmp44F8.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp44F8.tmp.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\tmp44F8.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp44F8.tmp.exe"3⤵
- Executes dropped EXE
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/odt/'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\AUfvfl5N9m.bat"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵
-
C:\Users\Default User\dllhost.exe"C:\Users\Default User\dllhost.exe"3⤵
- UAC bypass
- Executes dropped EXE
- Checks computer location settings
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Users\Admin\AppData\Local\Temp\tmp11F.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp11F.tmp.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\tmp11F.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp11F.tmp.exe"5⤵
- Executes dropped EXE
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\7a2d9963-52b9-4c96-ad5f-bd52fe969362.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\9e24447e-975b-428e-8145-27905a5f59e0.vbs"4⤵
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 5 /tr "'C:\Users\All Users\Microsoft\Settings\Accounts\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Users\All Users\Microsoft\Settings\Accounts\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 8 /tr "'C:\Users\All Users\Microsoft\Settings\Accounts\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 12 /tr "'C:\odt\SppExtComObj.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\odt\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 14 /tr "'C:\odt\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 13 /tr "'C:\Users\Default User\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Users\Default User\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 5 /tr "'C:\Users\Default User\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Windows\Resources\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 11 /tr "'C:\Windows\Resources\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 14 /tr "'C:\Windows\Resources\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 12 /tr "'C:\Windows\de-DE\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Windows\de-DE\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 14 /tr "'C:\Windows\de-DE\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 13 /tr "'C:\Windows\SysWOW64\fr\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Windows\SysWOW64\fr\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 5 /tr "'C:\Windows\SysWOW64\fr\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 13 /tr "'C:\odt\SearchApp.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\odt\SearchApp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 6 /tr "'C:\odt\SearchApp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 9 /tr "'C:\Users\All Users\Microsoft\Settings\Accounts\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Users\All Users\Microsoft\Settings\Accounts\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 8 /tr "'C:\Users\All Users\Microsoft\Settings\Accounts\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 11 /tr "'C:\Program Files\Windows Defender\ja-JP\OfficeClickToRun.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Program Files\Windows Defender\ja-JP\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 6 /tr "'C:\Program Files\Windows Defender\ja-JP\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "13f0462af330f984e6bf4f78ca0fd5681" /sc MINUTE /mo 10 /tr "'C:\Program Files\Internet Explorer\it-IT\13f0462af330f984e6bf4f78ca0fd568.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "13f0462af330f984e6bf4f78ca0fd568" /sc ONLOGON /tr "'C:\Program Files\Internet Explorer\it-IT\13f0462af330f984e6bf4f78ca0fd568.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "13f0462af330f984e6bf4f78ca0fd5681" /sc MINUTE /mo 8 /tr "'C:\Program Files\Internet Explorer\it-IT\13f0462af330f984e6bf4f78ca0fd568.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\upfc.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows Defender\ja-JP\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Program Files\Windows Defender\ja-JP\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 5 /tr "'C:\Program Files\Windows Defender\ja-JP\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 14 /tr "'C:\Windows\Speech_OneCore\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Windows\Speech_OneCore\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 5 /tr "'C:\Windows\Speech_OneCore\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "13f0462af330f984e6bf4f78ca0fd5681" /sc MINUTE /mo 11 /tr "'C:\Users\All Users\Mozilla\updates\13f0462af330f984e6bf4f78ca0fd568.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "13f0462af330f984e6bf4f78ca0fd568" /sc ONLOGON /tr "'C:\Users\All Users\Mozilla\updates\13f0462af330f984e6bf4f78ca0fd568.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "13f0462af330f984e6bf4f78ca0fd5681" /sc MINUTE /mo 6 /tr "'C:\Users\All Users\Mozilla\updates\13f0462af330f984e6bf4f78ca0fd568.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5cadef9abd087803c630df65264a6c81c
SHA1babbf3636c347c8727c35f3eef2ee643dbcc4bd2
SHA256cce65b73cdfe9304bcd5207913e8b60fb69faa20cd3b684f2b0343b755b99438
SHA5127278aa87124abb382d9024a645e881e7b7cf1b84e8894943b36e018dbf0399e6858392f77980b599fa5488e2e21bf757a0702fe6419417edac93b68e0c2ec085
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5ecceac16628651c18879d836acfcb062
SHA1420502b3e5220a01586c59504e94aa1ee11982c9
SHA25658238de09a8817ed9f894ed8e5bf06a897fd08e0b0bd77e508d37b2598edd2a9
SHA512be3c7cb529cafb00f58790a6f8b35c4ff6db9f7f43a507d2218fd80cebc88413e46f71b1bc35b8afcc36b68f9409c946470d1e74a4fe225400eeb6f3f898f5b3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5ecceac16628651c18879d836acfcb062
SHA1420502b3e5220a01586c59504e94aa1ee11982c9
SHA25658238de09a8817ed9f894ed8e5bf06a897fd08e0b0bd77e508d37b2598edd2a9
SHA512be3c7cb529cafb00f58790a6f8b35c4ff6db9f7f43a507d2218fd80cebc88413e46f71b1bc35b8afcc36b68f9409c946470d1e74a4fe225400eeb6f3f898f5b3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5ecceac16628651c18879d836acfcb062
SHA1420502b3e5220a01586c59504e94aa1ee11982c9
SHA25658238de09a8817ed9f894ed8e5bf06a897fd08e0b0bd77e508d37b2598edd2a9
SHA512be3c7cb529cafb00f58790a6f8b35c4ff6db9f7f43a507d2218fd80cebc88413e46f71b1bc35b8afcc36b68f9409c946470d1e74a4fe225400eeb6f3f898f5b3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5cadef9abd087803c630df65264a6c81c
SHA1babbf3636c347c8727c35f3eef2ee643dbcc4bd2
SHA256cce65b73cdfe9304bcd5207913e8b60fb69faa20cd3b684f2b0343b755b99438
SHA5127278aa87124abb382d9024a645e881e7b7cf1b84e8894943b36e018dbf0399e6858392f77980b599fa5488e2e21bf757a0702fe6419417edac93b68e0c2ec085
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5cadef9abd087803c630df65264a6c81c
SHA1babbf3636c347c8727c35f3eef2ee643dbcc4bd2
SHA256cce65b73cdfe9304bcd5207913e8b60fb69faa20cd3b684f2b0343b755b99438
SHA5127278aa87124abb382d9024a645e881e7b7cf1b84e8894943b36e018dbf0399e6858392f77980b599fa5488e2e21bf757a0702fe6419417edac93b68e0c2ec085
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5cadef9abd087803c630df65264a6c81c
SHA1babbf3636c347c8727c35f3eef2ee643dbcc4bd2
SHA256cce65b73cdfe9304bcd5207913e8b60fb69faa20cd3b684f2b0343b755b99438
SHA5127278aa87124abb382d9024a645e881e7b7cf1b84e8894943b36e018dbf0399e6858392f77980b599fa5488e2e21bf757a0702fe6419417edac93b68e0c2ec085
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5ecceac16628651c18879d836acfcb062
SHA1420502b3e5220a01586c59504e94aa1ee11982c9
SHA25658238de09a8817ed9f894ed8e5bf06a897fd08e0b0bd77e508d37b2598edd2a9
SHA512be3c7cb529cafb00f58790a6f8b35c4ff6db9f7f43a507d2218fd80cebc88413e46f71b1bc35b8afcc36b68f9409c946470d1e74a4fe225400eeb6f3f898f5b3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5ecceac16628651c18879d836acfcb062
SHA1420502b3e5220a01586c59504e94aa1ee11982c9
SHA25658238de09a8817ed9f894ed8e5bf06a897fd08e0b0bd77e508d37b2598edd2a9
SHA512be3c7cb529cafb00f58790a6f8b35c4ff6db9f7f43a507d2218fd80cebc88413e46f71b1bc35b8afcc36b68f9409c946470d1e74a4fe225400eeb6f3f898f5b3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD55f0ddc7f3691c81ee14d17b419ba220d
SHA1f0ef5fde8bab9d17c0b47137e014c91be888ee53
SHA256a31805264b8b13ce4145f272cb2830728c186c46e314b48514d636866217add5
SHA5122ce7c2a0833f581297c13dd88ccfcd36bf129d2b5d7718c52b1d67c97cbd8fc93abc085a040229a0fd712e880c690de7f6b996b0b47c46a091fabb7931be58d3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5bd5940f08d0be56e65e5f2aaf47c538e
SHA1d7e31b87866e5e383ab5499da64aba50f03e8443
SHA2562d2f364c75bd2897504249f42cdf1d19374f5230aad68fa9154ea3d03e3031a6
SHA512c34d10c7e07da44a180fae9889b61f08903aa84e8ddfa80c31c272b1ef9d491b8cec6b8a4c836c3cb1583fe8f4955c6a8db872515de3a9e10eae09610c959406
-
C:\Users\Admin\AppData\Local\Temp\7a2d9963-52b9-4c96-ad5f-bd52fe969362.vbsFilesize
709B
MD5be45a9745a346af1fde2517add03c5d9
SHA18c89a427ff82de35a6936ecc65cd2aac54a601cf
SHA256fed5441368c8d37dc17e71394d8b9d3f905886fa597861e01454fb594de1c104
SHA5128607eeba417eb07acc163bc0d446182ec0f074e348f489944ed88980bdc6e16a040c6e98da18c3abde0a5db099a240c03c6cb34b3a711237c2f108e175c64e9b
-
C:\Users\Admin\AppData\Local\Temp\9e24447e-975b-428e-8145-27905a5f59e0.vbsFilesize
485B
MD552a7b23172d9aac417c506fa0797653c
SHA1148bdc44ceb0cde3e527fc16d3fa81116affb452
SHA256c9915dd67ec33b1ee4490c442b5744805771ef2010c3e9c1742dd761ad374dac
SHA512708f969c496556a4d0d6da35c7725f39a6887fd3ad77900b8f122ffffd94b4fa4b753a87226897c039c2f2cc17483ab691c1d522a6284616d5feaa7ef7f3f5b3
-
C:\Users\Admin\AppData\Local\Temp\AUfvfl5N9m.batFilesize
198B
MD553b1672207eb426e574b6e56a87b03bc
SHA13b6c853e63bf564611a7e99ad2de88fb5b11feb5
SHA2565a83debb00380e088bc0e39f020384cfa24b6178556999c311f59262754248e6
SHA5120c335cec4a66fdbe53ca811bbc222a226652551b7bca91fbdc21775ebb85d4537e571340f14b2ca5dc4c654566d9a5aed6fc7a9c8b1aed7b5b2b320a38cbb591
-
C:\Users\Admin\AppData\Local\Temp\tmp11F.tmp.exeFilesize
75KB
MD5e0a68b98992c1699876f818a22b5b907
SHA1d41e8ad8ba51217eb0340f8f69629ccb474484d0
SHA2562b00d8c2bcc6b48e90524cdd41a07735dc94548ed41925baff86e43a61a4c37f
SHA512856854f5fd89ae1669e4b2db10b73b4a78496bf80117003244c83e781f75e533e2e2bea9aa6c1b3aba3db1ed92ea0ed9755fbfd78cd6c86ba95867d07fc0ece2
-
C:\Users\Admin\AppData\Local\Temp\tmp11F.tmp.exeFilesize
75KB
MD5e0a68b98992c1699876f818a22b5b907
SHA1d41e8ad8ba51217eb0340f8f69629ccb474484d0
SHA2562b00d8c2bcc6b48e90524cdd41a07735dc94548ed41925baff86e43a61a4c37f
SHA512856854f5fd89ae1669e4b2db10b73b4a78496bf80117003244c83e781f75e533e2e2bea9aa6c1b3aba3db1ed92ea0ed9755fbfd78cd6c86ba95867d07fc0ece2
-
C:\Users\Admin\AppData\Local\Temp\tmp11F.tmp.exeFilesize
75KB
MD5e0a68b98992c1699876f818a22b5b907
SHA1d41e8ad8ba51217eb0340f8f69629ccb474484d0
SHA2562b00d8c2bcc6b48e90524cdd41a07735dc94548ed41925baff86e43a61a4c37f
SHA512856854f5fd89ae1669e4b2db10b73b4a78496bf80117003244c83e781f75e533e2e2bea9aa6c1b3aba3db1ed92ea0ed9755fbfd78cd6c86ba95867d07fc0ece2
-
C:\Users\Admin\AppData\Local\Temp\tmp44F8.tmp.exeFilesize
75KB
MD5e0a68b98992c1699876f818a22b5b907
SHA1d41e8ad8ba51217eb0340f8f69629ccb474484d0
SHA2562b00d8c2bcc6b48e90524cdd41a07735dc94548ed41925baff86e43a61a4c37f
SHA512856854f5fd89ae1669e4b2db10b73b4a78496bf80117003244c83e781f75e533e2e2bea9aa6c1b3aba3db1ed92ea0ed9755fbfd78cd6c86ba95867d07fc0ece2
-
C:\Users\Admin\AppData\Local\Temp\tmp44F8.tmp.exeFilesize
75KB
MD5e0a68b98992c1699876f818a22b5b907
SHA1d41e8ad8ba51217eb0340f8f69629ccb474484d0
SHA2562b00d8c2bcc6b48e90524cdd41a07735dc94548ed41925baff86e43a61a4c37f
SHA512856854f5fd89ae1669e4b2db10b73b4a78496bf80117003244c83e781f75e533e2e2bea9aa6c1b3aba3db1ed92ea0ed9755fbfd78cd6c86ba95867d07fc0ece2
-
C:\Users\Admin\AppData\Local\Temp\tmp44F8.tmp.exeFilesize
75KB
MD5e0a68b98992c1699876f818a22b5b907
SHA1d41e8ad8ba51217eb0340f8f69629ccb474484d0
SHA2562b00d8c2bcc6b48e90524cdd41a07735dc94548ed41925baff86e43a61a4c37f
SHA512856854f5fd89ae1669e4b2db10b73b4a78496bf80117003244c83e781f75e533e2e2bea9aa6c1b3aba3db1ed92ea0ed9755fbfd78cd6c86ba95867d07fc0ece2
-
C:\Users\Default User\dllhost.exeFilesize
4.9MB
MD5651a327c78666e8ae5573c2f94dd9791
SHA10c351b3cbfd1298a8ea3329722b65c552e90ebba
SHA25667ae6edff3979c1e05ed362c1fd572b8d7021d6e0867e1934ea5e2eea30b3b31
SHA512035f9e7f202af91a3f9b1f36b4629844c39c17a05cf91b1732234d99eafcde9ae7091eb627be3afd56626cfd77d769e0f8f4122618ce87282d0a8fa364fade66
-
C:\Users\Default\dllhost.exeFilesize
4.9MB
MD5651a327c78666e8ae5573c2f94dd9791
SHA10c351b3cbfd1298a8ea3329722b65c552e90ebba
SHA25667ae6edff3979c1e05ed362c1fd572b8d7021d6e0867e1934ea5e2eea30b3b31
SHA512035f9e7f202af91a3f9b1f36b4629844c39c17a05cf91b1732234d99eafcde9ae7091eb627be3afd56626cfd77d769e0f8f4122618ce87282d0a8fa364fade66
-
memory/456-135-0x000000001E030000-0x000000001E558000-memory.dmpFilesize
5.2MB
-
memory/456-161-0x00007FFE80D30000-0x00007FFE817F1000-memory.dmpFilesize
10.8MB
-
memory/456-132-0x0000000000FF0000-0x00000000014E4000-memory.dmpFilesize
5.0MB
-
memory/456-134-0x000000001C380000-0x000000001C3D0000-memory.dmpFilesize
320KB
-
memory/456-144-0x00007FFE80D30000-0x00007FFE817F1000-memory.dmpFilesize
10.8MB
-
memory/456-133-0x00007FFE80D30000-0x00007FFE817F1000-memory.dmpFilesize
10.8MB
-
memory/1288-196-0x00007FFE80D30000-0x00007FFE817F1000-memory.dmpFilesize
10.8MB
-
memory/1288-156-0x0000000000000000-mapping.dmp
-
memory/1288-174-0x00007FFE80D30000-0x00007FFE817F1000-memory.dmpFilesize
10.8MB
-
memory/1336-205-0x0000000000000000-mapping.dmp
-
memory/1356-163-0x00007FFE80D30000-0x00007FFE817F1000-memory.dmpFilesize
10.8MB
-
memory/1356-150-0x0000000000000000-mapping.dmp
-
memory/1356-191-0x00007FFE80D30000-0x00007FFE817F1000-memory.dmpFilesize
10.8MB
-
memory/1516-214-0x0000000000000000-mapping.dmp
-
memory/1944-173-0x00007FFE80D30000-0x00007FFE817F1000-memory.dmpFilesize
10.8MB
-
memory/1944-179-0x00007FFE80D30000-0x00007FFE817F1000-memory.dmpFilesize
10.8MB
-
memory/1944-157-0x0000000000000000-mapping.dmp
-
memory/2196-171-0x00007FFE80D30000-0x00007FFE817F1000-memory.dmpFilesize
10.8MB
-
memory/2196-185-0x00007FFE80D30000-0x00007FFE817F1000-memory.dmpFilesize
10.8MB
-
memory/2196-146-0x0000000000000000-mapping.dmp
-
memory/2288-215-0x0000000000000000-mapping.dmp
-
memory/2540-213-0x0000000000400000-0x0000000000407000-memory.dmpFilesize
28KB
-
memory/2540-210-0x0000000000000000-mapping.dmp
-
memory/2676-175-0x00007FFE80D30000-0x00007FFE817F1000-memory.dmpFilesize
10.8MB
-
memory/2676-160-0x00007FFE80D30000-0x00007FFE817F1000-memory.dmpFilesize
10.8MB
-
memory/2676-147-0x0000000000000000-mapping.dmp
-
memory/2676-159-0x000002297D1D0000-0x000002297D1F2000-memory.dmpFilesize
136KB
-
memory/2948-168-0x00007FFE80D30000-0x00007FFE817F1000-memory.dmpFilesize
10.8MB
-
memory/2948-189-0x00007FFE80D30000-0x00007FFE817F1000-memory.dmpFilesize
10.8MB
-
memory/2948-152-0x0000000000000000-mapping.dmp
-
memory/3876-172-0x00007FFE80D30000-0x00007FFE817F1000-memory.dmpFilesize
10.8MB
-
memory/3876-193-0x00007FFE80D30000-0x00007FFE817F1000-memory.dmpFilesize
10.8MB
-
memory/3876-155-0x0000000000000000-mapping.dmp
-
memory/3984-167-0x00007FFE80D30000-0x00007FFE817F1000-memory.dmpFilesize
10.8MB
-
memory/3984-194-0x00007FFE80D30000-0x00007FFE817F1000-memory.dmpFilesize
10.8MB
-
memory/3984-151-0x0000000000000000-mapping.dmp
-
memory/4144-140-0x0000000000000000-mapping.dmp
-
memory/4144-141-0x0000000000400000-0x0000000000407000-memory.dmpFilesize
28KB
-
memory/4144-143-0x0000000000400000-0x0000000000407000-memory.dmpFilesize
28KB
-
memory/4144-145-0x0000000000400000-0x0000000000407000-memory.dmpFilesize
28KB
-
memory/4208-154-0x0000000000000000-mapping.dmp
-
memory/4208-188-0x00007FFE80D30000-0x00007FFE817F1000-memory.dmpFilesize
10.8MB
-
memory/4208-170-0x00007FFE80D30000-0x00007FFE817F1000-memory.dmpFilesize
10.8MB
-
memory/4392-166-0x0000000000000000-mapping.dmp
-
memory/4440-198-0x00007FFE80D30000-0x00007FFE817F1000-memory.dmpFilesize
10.8MB
-
memory/4440-153-0x0000000000000000-mapping.dmp
-
memory/4440-169-0x00007FFE80D30000-0x00007FFE817F1000-memory.dmpFilesize
10.8MB
-
memory/4468-148-0x0000000000000000-mapping.dmp
-
memory/4468-164-0x00007FFE80D30000-0x00007FFE817F1000-memory.dmpFilesize
10.8MB
-
memory/4468-190-0x00007FFE80D30000-0x00007FFE817F1000-memory.dmpFilesize
10.8MB
-
memory/4500-192-0x00007FFE80D30000-0x00007FFE817F1000-memory.dmpFilesize
10.8MB
-
memory/4500-149-0x0000000000000000-mapping.dmp
-
memory/4500-162-0x00007FFE80D30000-0x00007FFE817F1000-memory.dmpFilesize
10.8MB
-
memory/4716-158-0x0000000000000000-mapping.dmp
-
memory/4856-204-0x00007FFE80D60000-0x00007FFE81821000-memory.dmpFilesize
10.8MB
-
memory/4856-199-0x0000000000000000-mapping.dmp
-
memory/4856-203-0x00007FFE80D60000-0x00007FFE81821000-memory.dmpFilesize
10.8MB
-
memory/4856-202-0x0000000000350000-0x0000000000844000-memory.dmpFilesize
5.0MB
-
memory/4860-139-0x0000000000F1B000-0x0000000000F21000-memory.dmpFilesize
24KB
-
memory/4860-136-0x0000000000000000-mapping.dmp