Analysis
-
max time kernel
80s -
max time network
87s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
18-02-2023 19:12
Static task
static1
Behavioral task
behavioral1
Sample
Dc Rat Cracked+Activated_install.exe
Resource
win7-20220812-en
General
-
Target
Dc Rat Cracked+Activated_install.exe
-
Size
12.1MB
-
MD5
f00412c3ee8f146d7558348e910deed9
-
SHA1
d5d51ac94ea123cfdd57def46b81562ea98c4cff
-
SHA256
70825ba5a90d571a78e8acae635d5dd2b8c6cd2703598adb94f99db55f3c696a
-
SHA512
ac6f52e43bdb26a2a43b266d9aa8f0340ba3eca37a74b484208dc1c6f582c0ee1bab68df570b3d57b046111335dc02ac7c91f26ac963c2dd3dbd71cbb8d64608
-
SSDEEP
196608:VgTatkAKz1y4UgLLPcaJlscK/Vze5E5Dv6+QP8IlJh+xnem2BTeFjab5lhdI1z:VGb1yzCLEaJp2IEZv6+Ah+xnq4Gb5lI
Malware Config
Extracted
asyncrat
1.0.7
Default
verynice.ddns.net:8848
DcRatMutex_qwqdanchun
-
delay
1
-
install
true
-
install_file
WindowsDefender.exe
-
install_folder
%Temp%
Signatures
-
Async RAT payload 5 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\Stub.exe asyncrat C:\Users\Admin\AppData\Local\Temp\Stub.exe asyncrat behavioral2/memory/2040-141-0x0000000000760000-0x0000000000776000-memory.dmp asyncrat C:\Users\Admin\AppData\Local\Temp\WindowsDefender.exe asyncrat C:\Users\Admin\AppData\Local\Temp\WindowsDefender.exe asyncrat -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Dc Rat Cracked+Activated_install.exeStub32bit.exeStub64bit.exeStub.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation Dc Rat Cracked+Activated_install.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation Stub32bit.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation Stub64bit.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation Stub.exe -
Executes dropped EXE 4 IoCs
Processes:
Stub64bit.exeStub32bit.exeStub.exeWindowsDefender.exepid process 564 Stub64bit.exe 3892 Stub32bit.exe 2040 Stub.exe 928 WindowsDefender.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 5 IoCs
Processes:
timeout.exetimeout.exetimeout.exetimeout.exetimeout.exepid process 1876 timeout.exe 852 timeout.exe 1808 timeout.exe 3744 timeout.exe 1832 timeout.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Stub.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid process 2040 Stub.exe 2040 Stub.exe 2040 Stub.exe 2040 Stub.exe 2040 Stub.exe 2040 Stub.exe 2040 Stub.exe 2040 Stub.exe 2040 Stub.exe 2040 Stub.exe 2040 Stub.exe 2040 Stub.exe 2040 Stub.exe 2040 Stub.exe 2040 Stub.exe 2040 Stub.exe 2040 Stub.exe 2040 Stub.exe 2040 Stub.exe 2040 Stub.exe 2040 Stub.exe 2040 Stub.exe 2040 Stub.exe 2040 Stub.exe 4876 powershell.exe 4876 powershell.exe 2940 powershell.exe 2940 powershell.exe 2940 powershell.exe 4876 powershell.exe 2968 powershell.exe 2968 powershell.exe 2968 powershell.exe 3620 powershell.exe 3620 powershell.exe 3620 powershell.exe 3704 powershell.exe 3704 powershell.exe 2928 powershell.exe 2928 powershell.exe 3704 powershell.exe 2928 powershell.exe 3420 powershell.exe 3420 powershell.exe 4276 powershell.exe 4276 powershell.exe 4276 powershell.exe 448 powershell.exe 448 powershell.exe 4784 powershell.exe 4784 powershell.exe 2440 powershell.exe 3440 powershell.exe 2440 powershell.exe 3440 powershell.exe 1296 powershell.exe 1296 powershell.exe 1716 powershell.exe 5108 powershell.exe 1716 powershell.exe 5108 powershell.exe 2108 powershell.exe 2108 powershell.exe 4192 powershell.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
Processes:
Stub.exeWindowsDefender.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 2040 Stub.exe Token: SeDebugPrivilege 928 WindowsDefender.exe Token: SeDebugPrivilege 4876 powershell.exe Token: SeDebugPrivilege 2940 powershell.exe Token: SeDebugPrivilege 2968 powershell.exe Token: SeDebugPrivilege 3620 powershell.exe Token: SeDebugPrivilege 3704 powershell.exe Token: SeDebugPrivilege 2928 powershell.exe Token: SeDebugPrivilege 3420 powershell.exe Token: SeDebugPrivilege 4276 powershell.exe Token: SeDebugPrivilege 448 powershell.exe Token: SeDebugPrivilege 4784 powershell.exe Token: SeDebugPrivilege 2440 powershell.exe Token: SeDebugPrivilege 3440 powershell.exe Token: SeDebugPrivilege 1296 powershell.exe Token: SeDebugPrivilege 1716 powershell.exe Token: SeDebugPrivilege 5108 powershell.exe Token: SeDebugPrivilege 2108 powershell.exe Token: SeDebugPrivilege 4192 powershell.exe Token: SeDebugPrivilege 3460 powershell.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
Dc Rat Cracked+Activated_install.exeStub32bit.exeStub64bit.exepid process 1508 Dc Rat Cracked+Activated_install.exe 1508 Dc Rat Cracked+Activated_install.exe 3892 Stub32bit.exe 564 Stub64bit.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Dc Rat Cracked+Activated_install.exeStub32bit.exeStub64bit.execmd.execmd.exeStub.execmd.execmd.exedescription pid process target process PID 1508 wrote to memory of 564 1508 Dc Rat Cracked+Activated_install.exe Stub64bit.exe PID 1508 wrote to memory of 564 1508 Dc Rat Cracked+Activated_install.exe Stub64bit.exe PID 1508 wrote to memory of 3892 1508 Dc Rat Cracked+Activated_install.exe Stub32bit.exe PID 1508 wrote to memory of 3892 1508 Dc Rat Cracked+Activated_install.exe Stub32bit.exe PID 1508 wrote to memory of 3892 1508 Dc Rat Cracked+Activated_install.exe Stub32bit.exe PID 1508 wrote to memory of 2040 1508 Dc Rat Cracked+Activated_install.exe Stub.exe PID 1508 wrote to memory of 2040 1508 Dc Rat Cracked+Activated_install.exe Stub.exe PID 3892 wrote to memory of 4248 3892 Stub32bit.exe cmd.exe PID 3892 wrote to memory of 4248 3892 Stub32bit.exe cmd.exe PID 564 wrote to memory of 2152 564 Stub64bit.exe cmd.exe PID 564 wrote to memory of 2152 564 Stub64bit.exe cmd.exe PID 4248 wrote to memory of 1876 4248 cmd.exe timeout.exe PID 4248 wrote to memory of 1876 4248 cmd.exe timeout.exe PID 2152 wrote to memory of 852 2152 cmd.exe timeout.exe PID 2152 wrote to memory of 852 2152 cmd.exe timeout.exe PID 2040 wrote to memory of 4480 2040 Stub.exe cmd.exe PID 2040 wrote to memory of 4480 2040 Stub.exe cmd.exe PID 2040 wrote to memory of 956 2040 Stub.exe cmd.exe PID 2040 wrote to memory of 956 2040 Stub.exe cmd.exe PID 956 wrote to memory of 1808 956 cmd.exe timeout.exe PID 956 wrote to memory of 1808 956 cmd.exe timeout.exe PID 4480 wrote to memory of 3436 4480 cmd.exe schtasks.exe PID 4480 wrote to memory of 3436 4480 cmd.exe schtasks.exe PID 956 wrote to memory of 928 956 cmd.exe WindowsDefender.exe PID 956 wrote to memory of 928 956 cmd.exe WindowsDefender.exe PID 4248 wrote to memory of 4876 4248 cmd.exe powershell.exe PID 4248 wrote to memory of 4876 4248 cmd.exe powershell.exe PID 2152 wrote to memory of 2940 2152 cmd.exe powershell.exe PID 2152 wrote to memory of 2940 2152 cmd.exe powershell.exe PID 2152 wrote to memory of 2968 2152 cmd.exe powershell.exe PID 2152 wrote to memory of 2968 2152 cmd.exe powershell.exe PID 4248 wrote to memory of 3620 4248 cmd.exe powershell.exe PID 4248 wrote to memory of 3620 4248 cmd.exe powershell.exe PID 2152 wrote to memory of 2928 2152 cmd.exe powershell.exe PID 2152 wrote to memory of 2928 2152 cmd.exe powershell.exe PID 4248 wrote to memory of 3704 4248 cmd.exe powershell.exe PID 4248 wrote to memory of 3704 4248 cmd.exe powershell.exe PID 4248 wrote to memory of 3420 4248 cmd.exe powershell.exe PID 4248 wrote to memory of 3420 4248 cmd.exe powershell.exe PID 2152 wrote to memory of 4276 2152 cmd.exe powershell.exe PID 2152 wrote to memory of 4276 2152 cmd.exe powershell.exe PID 4248 wrote to memory of 448 4248 cmd.exe powershell.exe PID 4248 wrote to memory of 448 4248 cmd.exe powershell.exe PID 2152 wrote to memory of 4784 2152 cmd.exe powershell.exe PID 2152 wrote to memory of 4784 2152 cmd.exe powershell.exe PID 4248 wrote to memory of 3744 4248 cmd.exe timeout.exe PID 4248 wrote to memory of 3744 4248 cmd.exe timeout.exe PID 2152 wrote to memory of 1832 2152 cmd.exe timeout.exe PID 2152 wrote to memory of 1832 2152 cmd.exe timeout.exe PID 2152 wrote to memory of 2440 2152 cmd.exe powershell.exe PID 2152 wrote to memory of 2440 2152 cmd.exe powershell.exe PID 4248 wrote to memory of 3440 4248 cmd.exe powershell.exe PID 4248 wrote to memory of 3440 4248 cmd.exe powershell.exe PID 2152 wrote to memory of 1296 2152 cmd.exe powershell.exe PID 2152 wrote to memory of 1296 2152 cmd.exe powershell.exe PID 4248 wrote to memory of 1716 4248 cmd.exe powershell.exe PID 4248 wrote to memory of 1716 4248 cmd.exe powershell.exe PID 2152 wrote to memory of 5108 2152 cmd.exe powershell.exe PID 2152 wrote to memory of 5108 2152 cmd.exe powershell.exe PID 4248 wrote to memory of 2108 4248 cmd.exe powershell.exe PID 4248 wrote to memory of 2108 4248 cmd.exe powershell.exe PID 2152 wrote to memory of 4192 2152 cmd.exe powershell.exe PID 2152 wrote to memory of 4192 2152 cmd.exe powershell.exe PID 4248 wrote to memory of 3460 4248 cmd.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Dc Rat Cracked+Activated_install.exe"C:\Users\Admin\AppData\Local\Temp\Dc Rat Cracked+Activated_install.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Stub64bit.exe"C:\Users\Admin\AppData\Local\Temp\Stub64bit.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\9F71.tmp\9FD0.tmp\9FD1.bat C:\Users\Admin\AppData\Local\Temp\Stub64bit.exe"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\timeout.exeTIMEOUT /T 144⤵
- Delays execution with timeout.exe
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command Add-MpPreference -ExclusionProcess "Stub32bit.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command Add-MpPreference -ExclusionProcess "Stub64bit.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command Add-MpPreference -ExclusionProcess "cmd.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command Add-MpPreference -ExclusionProcess "conhost.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command Add-MpPreference -ExclusionProcess "timeout.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\timeout.exeTIMEOUT /T 304⤵
- Delays execution with timeout.exe
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command Add-MpPreference -ExclusionProcess "powershell.exe4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command Add-MpPreference -ExclusionPath C:\4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command Add-MpPreference -ExclusionPath "C:\StartUp"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command Add-MpPreference -ExclusionProcess "WindowsDefender.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\Stub32bit.exe"C:\Users\Admin\AppData\Local\Temp\Stub32bit.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\9FCF.tmp\9FD0.tmp\9FD1.bat C:\Users\Admin\AppData\Local\Temp\Stub32bit.exe"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\timeout.exeTIMEOUT /T 144⤵
- Delays execution with timeout.exe
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command Add-MpPreference -ExclusionProcess "Stub32bit.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command Add-MpPreference -ExclusionProcess "Stub64bit.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command Add-MpPreference -ExclusionProcess "cmd.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command Add-MpPreference -ExclusionProcess "conhost.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command Add-MpPreference -ExclusionProcess "timeout.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\timeout.exeTIMEOUT /T 304⤵
- Delays execution with timeout.exe
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command Add-MpPreference -ExclusionProcess "powershell.exe4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command Add-MpPreference -ExclusionPath C:\4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command Add-MpPreference -ExclusionPath "C:\StartUp"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command Add-MpPreference -ExclusionProcess "WindowsDefender.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\Stub.exe"C:\Users\Admin\AppData\Local\Temp\Stub.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "WindowsDefender" /tr '"C:\Users\Admin\AppData\Local\Temp\WindowsDefender.exe"' & exit3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "WindowsDefender" /tr '"C:\Users\Admin\AppData\Local\Temp\WindowsDefender.exe"'4⤵
- Creates scheduled task(s)
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpAB0A.tmp.bat""3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\WindowsDefender.exe"C:\Users\Admin\AppData\Local\Temp\WindowsDefender.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD56d42b6da621e8df5674e26b799c8e2aa
SHA1ab3ce1327ea1eeedb987ec823d5e0cb146bafa48
SHA2565ab6a1726f425c6d0158f55eb8d81754ddedd51e651aa0a899a29b7a58619c4c
SHA51253faffbda8a835bc1143e894c118c15901a5fd09cfc2224dd2f754c06dc794897315049a579b9a8382d4564f071576045aaaf824019b7139d939152dca38ce29
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD56d42b6da621e8df5674e26b799c8e2aa
SHA1ab3ce1327ea1eeedb987ec823d5e0cb146bafa48
SHA2565ab6a1726f425c6d0158f55eb8d81754ddedd51e651aa0a899a29b7a58619c4c
SHA51253faffbda8a835bc1143e894c118c15901a5fd09cfc2224dd2f754c06dc794897315049a579b9a8382d4564f071576045aaaf824019b7139d939152dca38ce29
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5ef72c47dbfaae0b9b0d09f22ad4afe20
SHA15357f66ba69b89440b99d4273b74221670129338
SHA256692ec20c7039170fb199510f0436181fd155e6b4516d4d1c9e1675adf99aaa7f
SHA5127514b6bc8dc39fa618223300be27cd535dc35b18c66b4a089e2302e72b3e0cac06d88a989fa1296feb386b3cbe2084019df6430c7f895071b76e04ce559a30b4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5ef72c47dbfaae0b9b0d09f22ad4afe20
SHA15357f66ba69b89440b99d4273b74221670129338
SHA256692ec20c7039170fb199510f0436181fd155e6b4516d4d1c9e1675adf99aaa7f
SHA5127514b6bc8dc39fa618223300be27cd535dc35b18c66b4a089e2302e72b3e0cac06d88a989fa1296feb386b3cbe2084019df6430c7f895071b76e04ce559a30b4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5a1008cfb29cdc25b4180c736ec404335
SHA139760fbcc8c1a64e856e98d61ce194d39b727438
SHA2560eb4209b0f8c0dce02580b4d3ec5692d33be08b1a61858aad0413116afc95558
SHA51200c2cde1601217c28fd71c2daefb21c7fcfeeee7e6badcd1b7f353f4e6df7817f5c4665148a1468b10ea31547642b999e3db5914d6e5f0cb1123243fd9ef213f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5a1008cfb29cdc25b4180c736ec404335
SHA139760fbcc8c1a64e856e98d61ce194d39b727438
SHA2560eb4209b0f8c0dce02580b4d3ec5692d33be08b1a61858aad0413116afc95558
SHA51200c2cde1601217c28fd71c2daefb21c7fcfeeee7e6badcd1b7f353f4e6df7817f5c4665148a1468b10ea31547642b999e3db5914d6e5f0cb1123243fd9ef213f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD531fddc7cde1ce8268ce05b11ce49a233
SHA1459e413dfa080a413420e7bda8563e018f2190be
SHA25696c9c7049bbeda8fcddb9a3b13e1a8dbc0efef0be1893a46d6f6ab977c617614
SHA512abefdb3d324848a90063afc8c2e8c2d11dcfd477c17ee7833d56f45053edf04fe898e8125eb63162369608683bc76db3b010694e0a284608540a30459a52e935
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD531fddc7cde1ce8268ce05b11ce49a233
SHA1459e413dfa080a413420e7bda8563e018f2190be
SHA25696c9c7049bbeda8fcddb9a3b13e1a8dbc0efef0be1893a46d6f6ab977c617614
SHA512abefdb3d324848a90063afc8c2e8c2d11dcfd477c17ee7833d56f45053edf04fe898e8125eb63162369608683bc76db3b010694e0a284608540a30459a52e935
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD55cfe303e798d1cc6c1dab341e7265c15
SHA1cd2834e05191a24e28a100f3f8114d5a7708dc7c
SHA256c4d16552769ca1762f6867bce85589c645ac3dc490b650083d74f853f898cfab
SHA512ef151bbe0033a2caf2d40aff74855a3f42c8171e05a11c8ce93c7039d9430482c43fe93d9164ee94839aff253cad774dbf619dde9a8af38773ca66d59ac3400e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD50093819c829dd30c13746f256efba97f
SHA1f095cbb1d10a54a91d7d341c4098d44973d3ec50
SHA2565f936c252c9ed7d08d4a73b86230d9877173b44c36544f0b24eae3eb38617401
SHA51272aac852de41473494d2263aa44dbabfb1f318f8a21ebdfe080c4a98b9288db07e9641a935d9a640b5e879f28a0560cae53bd4191ac94d315b87746e57e69af2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD59512d7fc6bd7fd6f9a322fa248957468
SHA1850ce09fca7a17159c8b8ad5b2002a61ed392c3d
SHA25640c6527c0a447fb33683b5577fa1c0cd6e8be07e78ff57083f6f3339519dddd7
SHA5125c402ac4544931469549a353d22b96ef5157d6b4dd5e71c1e93bb7f5a2ac6197eb13dc29162cfb70cbcfd814527c604b08fd02b42c5d64ad00391dd73f10c4de
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5dd1d0b083fedf44b482a028fb70b96e8
SHA1dc9c027937c9f6d52268a1504cbae42a39c8d36a
SHA256cab7944d29e0501dc0db904ac460ca7a87700e0ec7eb62298b7b97cbf40c424c
SHA51296bec38bfda176292ae65dcf735103e7888baa212038737c1d1e215fcb76e4c0355e4a827a1934303e7aecae91012fa412f13e38f382b732758bae985cc67973
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5dd1d0b083fedf44b482a028fb70b96e8
SHA1dc9c027937c9f6d52268a1504cbae42a39c8d36a
SHA256cab7944d29e0501dc0db904ac460ca7a87700e0ec7eb62298b7b97cbf40c424c
SHA51296bec38bfda176292ae65dcf735103e7888baa212038737c1d1e215fcb76e4c0355e4a827a1934303e7aecae91012fa412f13e38f382b732758bae985cc67973
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD526403455115fbc3da2573a37cc28744a
SHA16a9bf407036a8b9d36313462c0257f53b4ee9170
SHA256222a7adb94c5e82df6466a4afce283e905c69f7feb18b3e34583b5cbbd88b352
SHA512be96d478e5d804b8daf805ad28d5eba644fb63a59a799273e029c8047a036f8aac74098efcadee0e4f405dcd1c0a689a1e8eb23f51a93634ed44f5a7c821beb6
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD59c740b7699e2363ac4ecdf496520ca35
SHA1aa8691a8c56500d82c5fc8c35209bc6fe50ab1d9
SHA256be96c91b62ba9ba7072ab89e66543328c9e4395150f9dbe8067332d94a3ecc61
SHA5128885683f96353582eb871209e766e7eba1a72a2837ce27ea298b7b5b169621d1fa3fce25346b6bfd258b52642644234da9559d4e765a2023a5a5fc1f544cc7af
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD59c740b7699e2363ac4ecdf496520ca35
SHA1aa8691a8c56500d82c5fc8c35209bc6fe50ab1d9
SHA256be96c91b62ba9ba7072ab89e66543328c9e4395150f9dbe8067332d94a3ecc61
SHA5128885683f96353582eb871209e766e7eba1a72a2837ce27ea298b7b5b169621d1fa3fce25346b6bfd258b52642644234da9559d4e765a2023a5a5fc1f544cc7af
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD59d20bed748fbb656980b0328d7b74728
SHA15fc8910c493356c0968a86452cb7952917b954b4
SHA256172fe07653a93456e66d5b90333de53e23a561cf982a1a9d96c3459339009069
SHA512eb1f0ca1042371a0d324ba520a9c4159fe91d34cf1851d829b1bf874b92f69fd08c540558d03f9a8c3286926c3c12d89ef9a70ac649c053a02f26922918054f1
-
C:\Users\Admin\AppData\Local\Temp\9F71.tmp\9FD0.tmp\9FD1.batFilesize
700B
MD5e3ee00ffb5228abb3856494c762b13ed
SHA13f90af1c02acc217632a6590ee140f2466c333f0
SHA256b113024aa839f033f3f04e34d3265261de4194099ebd0a5a373532f529a20381
SHA51219c62a4ad616da0903e2afe054911a0b28700f686297fc7ab61a2d08143d85da927b6887767c6ea3aeb02202e57676d50b5f1eae92db50c03f757f5ccce5cc20
-
C:\Users\Admin\AppData\Local\Temp\9FCF.tmp\9FD0.tmp\9FD1.batFilesize
700B
MD5e3ee00ffb5228abb3856494c762b13ed
SHA13f90af1c02acc217632a6590ee140f2466c333f0
SHA256b113024aa839f033f3f04e34d3265261de4194099ebd0a5a373532f529a20381
SHA51219c62a4ad616da0903e2afe054911a0b28700f686297fc7ab61a2d08143d85da927b6887767c6ea3aeb02202e57676d50b5f1eae92db50c03f757f5ccce5cc20
-
C:\Users\Admin\AppData\Local\Temp\Stub.exeFilesize
63KB
MD51a76515d1722564375589437a45eba34
SHA16046e4ecda7cbf012205878fa0ca39902e17cd52
SHA256e0556c4f5cd6277ea078e58833224683b08242f0fda81cff8055ac45e8517c8f
SHA512c34c4e7d9b73ed3a25606f454d8f327f53ba2fff4ddc3e26208d8072b16a6d46deaef99a3f511ea68d09a197b57e2166122421e1ea4f412d49d6fd03e2277081
-
C:\Users\Admin\AppData\Local\Temp\Stub.exeFilesize
63KB
MD51a76515d1722564375589437a45eba34
SHA16046e4ecda7cbf012205878fa0ca39902e17cd52
SHA256e0556c4f5cd6277ea078e58833224683b08242f0fda81cff8055ac45e8517c8f
SHA512c34c4e7d9b73ed3a25606f454d8f327f53ba2fff4ddc3e26208d8072b16a6d46deaef99a3f511ea68d09a197b57e2166122421e1ea4f412d49d6fd03e2277081
-
C:\Users\Admin\AppData\Local\Temp\Stub32bit.exeFilesize
87KB
MD5ba26aa730afb99c60ac88b00b8787708
SHA125249586e68bfff71a66325acd4586043057e424
SHA25651586a19cfb7fc77ed4ec20d1b63e28e484100aabf8cd49f5c59671c2713cc28
SHA512c83b144c2a013cf1464c700a7e66a0371f481937a4150b996b10724474191d31f5ee105d7b847be5d1d7592e17dd6a6be968a4f4a33ed440ab60e27da7197074
-
C:\Users\Admin\AppData\Local\Temp\Stub32bit.exeFilesize
87KB
MD5ba26aa730afb99c60ac88b00b8787708
SHA125249586e68bfff71a66325acd4586043057e424
SHA25651586a19cfb7fc77ed4ec20d1b63e28e484100aabf8cd49f5c59671c2713cc28
SHA512c83b144c2a013cf1464c700a7e66a0371f481937a4150b996b10724474191d31f5ee105d7b847be5d1d7592e17dd6a6be968a4f4a33ed440ab60e27da7197074
-
C:\Users\Admin\AppData\Local\Temp\Stub64bit.exeFilesize
120KB
MD521e40d4449b30dfccafc75c935dbf5e2
SHA10de44bda02aefd9bbbbf3353d381c8e17443dfcb
SHA25698e6a69ccb6fc25b3c757e493bdcbc4f6c5b40af92ea8bdee684e0661c0ba014
SHA51222bc8e268d0ed1936e792fd66338bcfbed9633bf80d89fcd31f4132a7605080a9a6123d90e796b1f4b53d376987a4eddb6c316259e2af05b72825f6cbe78cd59
-
C:\Users\Admin\AppData\Local\Temp\Stub64bit.exeFilesize
120KB
MD521e40d4449b30dfccafc75c935dbf5e2
SHA10de44bda02aefd9bbbbf3353d381c8e17443dfcb
SHA25698e6a69ccb6fc25b3c757e493bdcbc4f6c5b40af92ea8bdee684e0661c0ba014
SHA51222bc8e268d0ed1936e792fd66338bcfbed9633bf80d89fcd31f4132a7605080a9a6123d90e796b1f4b53d376987a4eddb6c316259e2af05b72825f6cbe78cd59
-
C:\Users\Admin\AppData\Local\Temp\WindowsDefender.exeFilesize
63KB
MD51a76515d1722564375589437a45eba34
SHA16046e4ecda7cbf012205878fa0ca39902e17cd52
SHA256e0556c4f5cd6277ea078e58833224683b08242f0fda81cff8055ac45e8517c8f
SHA512c34c4e7d9b73ed3a25606f454d8f327f53ba2fff4ddc3e26208d8072b16a6d46deaef99a3f511ea68d09a197b57e2166122421e1ea4f412d49d6fd03e2277081
-
C:\Users\Admin\AppData\Local\Temp\WindowsDefender.exeFilesize
63KB
MD51a76515d1722564375589437a45eba34
SHA16046e4ecda7cbf012205878fa0ca39902e17cd52
SHA256e0556c4f5cd6277ea078e58833224683b08242f0fda81cff8055ac45e8517c8f
SHA512c34c4e7d9b73ed3a25606f454d8f327f53ba2fff4ddc3e26208d8072b16a6d46deaef99a3f511ea68d09a197b57e2166122421e1ea4f412d49d6fd03e2277081
-
C:\Users\Admin\AppData\Local\Temp\tmpAB0A.tmp.batFilesize
162B
MD5a579754eb8a4bb421c5c139115838f81
SHA17a639dc21095ac03257bb3ae9b19d0ac0e18c60b
SHA2567d93e5e2624cf85770d8e3fd7594c14071067743c56fb0126f7a874a244ee09f
SHA5129ba8b0dff85baccc47a86d247920b311dc870e1f0a09ea79816c13fa77b069eca152f53454259a97cc53c06afa6d627a9ffd999b6682e26be11a1a1682faf30a
-
memory/448-186-0x0000000000000000-mapping.dmp
-
memory/448-190-0x00007FF81B5E0000-0x00007FF81C0A1000-memory.dmpFilesize
10.8MB
-
memory/448-193-0x00007FF81B5E0000-0x00007FF81C0A1000-memory.dmpFilesize
10.8MB
-
memory/564-132-0x0000000000000000-mapping.dmp
-
memory/852-147-0x0000000000000000-mapping.dmp
-
memory/928-179-0x00007FF81B5E0000-0x00007FF81C0A1000-memory.dmpFilesize
10.8MB
-
memory/928-155-0x0000000000000000-mapping.dmp
-
memory/928-158-0x00007FF81B5E0000-0x00007FF81C0A1000-memory.dmpFilesize
10.8MB
-
memory/956-150-0x0000000000000000-mapping.dmp
-
memory/1296-209-0x00007FF81B5E0000-0x00007FF81C0A1000-memory.dmpFilesize
10.8MB
-
memory/1296-203-0x0000000000000000-mapping.dmp
-
memory/1296-206-0x00007FF81B5E0000-0x00007FF81C0A1000-memory.dmpFilesize
10.8MB
-
memory/1716-208-0x0000000000000000-mapping.dmp
-
memory/1716-212-0x00007FF81B5E0000-0x00007FF81C0A1000-memory.dmpFilesize
10.8MB
-
memory/1716-214-0x00007FF81B5E0000-0x00007FF81C0A1000-memory.dmpFilesize
10.8MB
-
memory/1808-152-0x0000000000000000-mapping.dmp
-
memory/1832-197-0x0000000000000000-mapping.dmp
-
memory/1876-146-0x0000000000000000-mapping.dmp
-
memory/2040-141-0x0000000000760000-0x0000000000776000-memory.dmpFilesize
88KB
-
memory/2040-148-0x00007FF81B640000-0x00007FF81C101000-memory.dmpFilesize
10.8MB
-
memory/2040-138-0x0000000000000000-mapping.dmp
-
memory/2040-153-0x00007FF81B640000-0x00007FF81C101000-memory.dmpFilesize
10.8MB
-
memory/2108-215-0x0000000000000000-mapping.dmp
-
memory/2108-219-0x00007FF81B5E0000-0x00007FF81C0A1000-memory.dmpFilesize
10.8MB
-
memory/2152-143-0x0000000000000000-mapping.dmp
-
memory/2440-201-0x00007FF81B5E0000-0x00007FF81C0A1000-memory.dmpFilesize
10.8MB
-
memory/2440-198-0x0000000000000000-mapping.dmp
-
memory/2928-180-0x00007FF81B5E0000-0x00007FF81C0A1000-memory.dmpFilesize
10.8MB
-
memory/2928-173-0x0000000000000000-mapping.dmp
-
memory/2940-160-0x0000000000000000-mapping.dmp
-
memory/2940-162-0x00007FF81B5E0000-0x00007FF81C0A1000-memory.dmpFilesize
10.8MB
-
memory/2968-167-0x00007FF81B5E0000-0x00007FF81C0A1000-memory.dmpFilesize
10.8MB
-
memory/2968-171-0x00007FF81B5E0000-0x00007FF81C0A1000-memory.dmpFilesize
10.8MB
-
memory/2968-163-0x0000000000000000-mapping.dmp
-
memory/3420-185-0x00007FF81B5E0000-0x00007FF81C0A1000-memory.dmpFilesize
10.8MB
-
memory/3420-181-0x00007FF81B5E0000-0x00007FF81C0A1000-memory.dmpFilesize
10.8MB
-
memory/3420-177-0x0000000000000000-mapping.dmp
-
memory/3436-154-0x0000000000000000-mapping.dmp
-
memory/3440-199-0x0000000000000000-mapping.dmp
-
memory/3440-202-0x00007FF81B5E0000-0x00007FF81C0A1000-memory.dmpFilesize
10.8MB
-
memory/3440-205-0x00007FF81B5E0000-0x00007FF81C0A1000-memory.dmpFilesize
10.8MB
-
memory/3460-221-0x0000000000000000-mapping.dmp
-
memory/3460-224-0x00007FF81B5E0000-0x00007FF81C0A1000-memory.dmpFilesize
10.8MB
-
memory/3620-172-0x00007FF81B5E0000-0x00007FF81C0A1000-memory.dmpFilesize
10.8MB
-
memory/3620-168-0x0000000000000000-mapping.dmp
-
memory/3704-176-0x00007FF81B5E0000-0x00007FF81C0A1000-memory.dmpFilesize
10.8MB
-
memory/3704-174-0x0000000000000000-mapping.dmp
-
memory/3744-195-0x0000000000000000-mapping.dmp
-
memory/3892-135-0x0000000000000000-mapping.dmp
-
memory/4192-225-0x00007FF81B5E0000-0x00007FF81C0A1000-memory.dmpFilesize
10.8MB
-
memory/4192-220-0x0000000000000000-mapping.dmp
-
memory/4248-142-0x0000000000000000-mapping.dmp
-
memory/4276-188-0x00007FF81B5E0000-0x00007FF81C0A1000-memory.dmpFilesize
10.8MB
-
memory/4276-183-0x0000000000000000-mapping.dmp
-
memory/4276-184-0x00007FF81B5E0000-0x00007FF81C0A1000-memory.dmpFilesize
10.8MB
-
memory/4480-149-0x0000000000000000-mapping.dmp
-
memory/4784-191-0x0000000000000000-mapping.dmp
-
memory/4784-196-0x00007FF81B5E0000-0x00007FF81C0A1000-memory.dmpFilesize
10.8MB
-
memory/4784-194-0x00007FF81B5E0000-0x00007FF81C0A1000-memory.dmpFilesize
10.8MB
-
memory/4876-166-0x00007FF81B5E0000-0x00007FF81C0A1000-memory.dmpFilesize
10.8MB
-
memory/4876-161-0x000001A998110000-0x000001A998132000-memory.dmpFilesize
136KB
-
memory/4876-159-0x0000000000000000-mapping.dmp
-
memory/5108-218-0x00007FF81B5E0000-0x00007FF81C0A1000-memory.dmpFilesize
10.8MB
-
memory/5108-213-0x00007FF81B5E0000-0x00007FF81C0A1000-memory.dmpFilesize
10.8MB
-
memory/5108-210-0x0000000000000000-mapping.dmp