Analysis
-
max time kernel
70s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2023 13:03
Behavioral task
behavioral1
Sample
aurora.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
aurora.exe
Resource
win10v2004-20230221-en
General
-
Target
aurora.exe
-
Size
5.6MB
-
MD5
2072ab80f4f0b576590d6e2f66bc12a3
-
SHA1
92b9c99e858cd242983fad131e25028c9197a10f
-
SHA256
7e284862240837599b6916df7747947d45d8fa44979ff4bcf57703971e75c14b
-
SHA512
1f2fcf07f41af804aa94cdb3bd97cb7af35d12ba10f9e795052d1d68720f96933bb3a64c9397f1142c26ba392b6f988ac569ebfcddb5b5da85d82339a80bdeec
-
SSDEEP
49152:8ugM5SSiHPRpy67X9g31TGsev6imuMmS5cNDw7wBVAAp5ESxRlMmCaCfAm5K6Q0+:DMTlK1+gcEiMeCom5Kaw
Malware Config
Extracted
aurora
94.142.138.71:456
Signatures
-
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
aurora.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\runtime_2 = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\config\\runtime.exe" aurora.exe Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\runtime_3 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\config\\runtime.exe" aurora.exe Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\runtime_1 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\config\\runtime.exe" aurora.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 2720 schtasks.exe 1276 schtasks.exe 3972 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
powershell.exepowershell.exepowershell.exepid process 4520 powershell.exe 4520 powershell.exe 1872 powershell.exe 1872 powershell.exe 2020 powershell.exe 2020 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
powershell.exepowershell.exepowershell.exeWMIC.exeWMIC.exedescription pid process Token: SeDebugPrivilege 4520 powershell.exe Token: SeDebugPrivilege 1872 powershell.exe Token: SeDebugPrivilege 2020 powershell.exe Token: SeIncreaseQuotaPrivilege 1400 WMIC.exe Token: SeSecurityPrivilege 1400 WMIC.exe Token: SeTakeOwnershipPrivilege 1400 WMIC.exe Token: SeLoadDriverPrivilege 1400 WMIC.exe Token: SeSystemProfilePrivilege 1400 WMIC.exe Token: SeSystemtimePrivilege 1400 WMIC.exe Token: SeProfSingleProcessPrivilege 1400 WMIC.exe Token: SeIncBasePriorityPrivilege 1400 WMIC.exe Token: SeCreatePagefilePrivilege 1400 WMIC.exe Token: SeBackupPrivilege 1400 WMIC.exe Token: SeRestorePrivilege 1400 WMIC.exe Token: SeShutdownPrivilege 1400 WMIC.exe Token: SeDebugPrivilege 1400 WMIC.exe Token: SeSystemEnvironmentPrivilege 1400 WMIC.exe Token: SeRemoteShutdownPrivilege 1400 WMIC.exe Token: SeUndockPrivilege 1400 WMIC.exe Token: SeManageVolumePrivilege 1400 WMIC.exe Token: 33 1400 WMIC.exe Token: 34 1400 WMIC.exe Token: 35 1400 WMIC.exe Token: 36 1400 WMIC.exe Token: SeIncreaseQuotaPrivilege 1400 WMIC.exe Token: SeSecurityPrivilege 1400 WMIC.exe Token: SeTakeOwnershipPrivilege 1400 WMIC.exe Token: SeLoadDriverPrivilege 1400 WMIC.exe Token: SeSystemProfilePrivilege 1400 WMIC.exe Token: SeSystemtimePrivilege 1400 WMIC.exe Token: SeProfSingleProcessPrivilege 1400 WMIC.exe Token: SeIncBasePriorityPrivilege 1400 WMIC.exe Token: SeCreatePagefilePrivilege 1400 WMIC.exe Token: SeBackupPrivilege 1400 WMIC.exe Token: SeRestorePrivilege 1400 WMIC.exe Token: SeShutdownPrivilege 1400 WMIC.exe Token: SeDebugPrivilege 1400 WMIC.exe Token: SeSystemEnvironmentPrivilege 1400 WMIC.exe Token: SeRemoteShutdownPrivilege 1400 WMIC.exe Token: SeUndockPrivilege 1400 WMIC.exe Token: SeManageVolumePrivilege 1400 WMIC.exe Token: 33 1400 WMIC.exe Token: 34 1400 WMIC.exe Token: 35 1400 WMIC.exe Token: 36 1400 WMIC.exe Token: SeIncreaseQuotaPrivilege 4524 WMIC.exe Token: SeSecurityPrivilege 4524 WMIC.exe Token: SeTakeOwnershipPrivilege 4524 WMIC.exe Token: SeLoadDriverPrivilege 4524 WMIC.exe Token: SeSystemProfilePrivilege 4524 WMIC.exe Token: SeSystemtimePrivilege 4524 WMIC.exe Token: SeProfSingleProcessPrivilege 4524 WMIC.exe Token: SeIncBasePriorityPrivilege 4524 WMIC.exe Token: SeCreatePagefilePrivilege 4524 WMIC.exe Token: SeBackupPrivilege 4524 WMIC.exe Token: SeRestorePrivilege 4524 WMIC.exe Token: SeShutdownPrivilege 4524 WMIC.exe Token: SeDebugPrivilege 4524 WMIC.exe Token: SeSystemEnvironmentPrivilege 4524 WMIC.exe Token: SeRemoteShutdownPrivilege 4524 WMIC.exe Token: SeUndockPrivilege 4524 WMIC.exe Token: SeManageVolumePrivilege 4524 WMIC.exe Token: 33 4524 WMIC.exe Token: 34 4524 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
aurora.exepowershell.exepowershell.exepowershell.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 4924 wrote to memory of 4520 4924 aurora.exe powershell.exe PID 4924 wrote to memory of 4520 4924 aurora.exe powershell.exe PID 4520 wrote to memory of 1276 4520 powershell.exe schtasks.exe PID 4520 wrote to memory of 1276 4520 powershell.exe schtasks.exe PID 4924 wrote to memory of 1872 4924 aurora.exe powershell.exe PID 4924 wrote to memory of 1872 4924 aurora.exe powershell.exe PID 1872 wrote to memory of 3972 1872 powershell.exe schtasks.exe PID 1872 wrote to memory of 3972 1872 powershell.exe schtasks.exe PID 4924 wrote to memory of 2020 4924 aurora.exe powershell.exe PID 4924 wrote to memory of 2020 4924 aurora.exe powershell.exe PID 2020 wrote to memory of 2720 2020 powershell.exe schtasks.exe PID 2020 wrote to memory of 2720 2020 powershell.exe schtasks.exe PID 4924 wrote to memory of 1396 4924 aurora.exe cmd.exe PID 4924 wrote to memory of 1396 4924 aurora.exe cmd.exe PID 1396 wrote to memory of 1400 1396 cmd.exe WMIC.exe PID 1396 wrote to memory of 1400 1396 cmd.exe WMIC.exe PID 4924 wrote to memory of 4108 4924 aurora.exe cmd.exe PID 4924 wrote to memory of 4108 4924 aurora.exe cmd.exe PID 4108 wrote to memory of 4524 4108 cmd.exe WMIC.exe PID 4108 wrote to memory of 4524 4108 cmd.exe WMIC.exe PID 4924 wrote to memory of 2240 4924 aurora.exe cmd.exe PID 4924 wrote to memory of 2240 4924 aurora.exe cmd.exe PID 2240 wrote to memory of 1568 2240 cmd.exe WMIC.exe PID 2240 wrote to memory of 1568 2240 cmd.exe WMIC.exe PID 4924 wrote to memory of 3528 4924 aurora.exe cmd.exe PID 4924 wrote to memory of 3528 4924 aurora.exe cmd.exe PID 3528 wrote to memory of 808 3528 cmd.exe WMIC.exe PID 3528 wrote to memory of 808 3528 cmd.exe WMIC.exe PID 4924 wrote to memory of 4556 4924 aurora.exe cmd.exe PID 4924 wrote to memory of 4556 4924 aurora.exe cmd.exe PID 4556 wrote to memory of 5064 4556 cmd.exe WMIC.exe PID 4556 wrote to memory of 5064 4556 cmd.exe WMIC.exe PID 4924 wrote to memory of 4992 4924 aurora.exe cmd.exe PID 4924 wrote to memory of 4992 4924 aurora.exe cmd.exe PID 4992 wrote to memory of 4216 4992 cmd.exe WMIC.exe PID 4992 wrote to memory of 4216 4992 cmd.exe WMIC.exe PID 4924 wrote to memory of 2356 4924 aurora.exe cmd.exe PID 4924 wrote to memory of 2356 4924 aurora.exe cmd.exe PID 2356 wrote to memory of 444 2356 cmd.exe WMIC.exe PID 2356 wrote to memory of 444 2356 cmd.exe WMIC.exe PID 4924 wrote to memory of 1452 4924 aurora.exe cmd.exe PID 4924 wrote to memory of 1452 4924 aurora.exe cmd.exe PID 1452 wrote to memory of 1168 1452 cmd.exe WMIC.exe PID 1452 wrote to memory of 1168 1452 cmd.exe WMIC.exe PID 4924 wrote to memory of 3144 4924 aurora.exe cmd.exe PID 4924 wrote to memory of 3144 4924 aurora.exe cmd.exe PID 3144 wrote to memory of 2224 3144 cmd.exe WMIC.exe PID 3144 wrote to memory of 2224 3144 cmd.exe WMIC.exe PID 4924 wrote to memory of 316 4924 aurora.exe cmd.exe PID 4924 wrote to memory of 316 4924 aurora.exe cmd.exe PID 316 wrote to memory of 4264 316 cmd.exe WMIC.exe PID 316 wrote to memory of 4264 316 cmd.exe WMIC.exe PID 4924 wrote to memory of 4320 4924 aurora.exe cmd.exe PID 4924 wrote to memory of 4320 4924 aurora.exe cmd.exe PID 4320 wrote to memory of 3560 4320 cmd.exe WMIC.exe PID 4320 wrote to memory of 3560 4320 cmd.exe WMIC.exe PID 4924 wrote to memory of 4860 4924 aurora.exe cmd.exe PID 4924 wrote to memory of 4860 4924 aurora.exe cmd.exe PID 4860 wrote to memory of 3008 4860 cmd.exe WMIC.exe PID 4860 wrote to memory of 3008 4860 cmd.exe WMIC.exe PID 4924 wrote to memory of 2720 4924 aurora.exe cmd.exe PID 4924 wrote to memory of 2720 4924 aurora.exe cmd.exe PID 2720 wrote to memory of 704 2720 cmd.exe WMIC.exe PID 2720 wrote to memory of 704 2720 cmd.exe WMIC.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\aurora.exe"C:\Users\Admin\AppData\Local\Temp\aurora.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "" "SCHTASKS.exe /Create /SC MINUTE /ED 12/12/2030 /TN runtime_1 /TR C:\Users\Admin\AppData\Roaming\Microsoft\config\runtime.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /SC MINUTE /ED 12/12/2030 /TN runtime_1 /TR C:\Users\Admin\AppData\Roaming\Microsoft\config\runtime.exe3⤵
- Creates scheduled task(s)
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "" "SCHTASKS.exe /Create /SC MINUTE /ED 12/12/2030 /TN runtime_2 /TR C:\Users\Admin\AppData\Local\Microsoft\config\runtime.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /SC MINUTE /ED 12/12/2030 /TN runtime_2 /TR C:\Users\Admin\AppData\Local\Microsoft\config\runtime.exe3⤵
- Creates scheduled task(s)
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "" "SCHTASKS.exe /Create /SC MINUTE /ED 12/12/2030 /TN runtime_3 /TR C:\Users\Admin\AppData\Local\Temp\Microsoft\config\runtime.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /SC MINUTE /ED 12/12/2030 /TN runtime_3 /TR C:\Users\Admin\AppData\Local\Temp\Microsoft\config\runtime.exe3⤵
- Creates scheduled task(s)
-
C:\Windows\system32\cmd.execmd.exe /c "wmic csproduct get uuid"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.execmd.exe /c "wmic csproduct get uuid"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.execmd.exe /c "wmic csproduct get uuid"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid3⤵
-
C:\Windows\system32\cmd.execmd.exe /c "wmic csproduct get uuid"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid3⤵
-
C:\Windows\system32\cmd.execmd.exe /c "wmic csproduct get uuid"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid3⤵
-
C:\Windows\system32\cmd.execmd.exe /c "wmic csproduct get uuid"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid3⤵
-
C:\Windows\system32\cmd.execmd.exe /c "wmic csproduct get uuid"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid3⤵
-
C:\Windows\system32\cmd.execmd.exe /c "wmic csproduct get uuid"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid3⤵
-
C:\Windows\system32\cmd.execmd.exe /c "wmic csproduct get uuid"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid3⤵
-
C:\Windows\system32\cmd.execmd.exe /c "wmic csproduct get uuid"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid3⤵
-
C:\Windows\system32\cmd.execmd.exe /c "wmic csproduct get uuid"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid3⤵
-
C:\Windows\system32\cmd.execmd.exe /c "wmic csproduct get uuid"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid3⤵
-
C:\Windows\system32\cmd.execmd.exe /c "wmic csproduct get uuid"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid3⤵
-
C:\Windows\system32\cmd.execmd.exe /c "wmic csproduct get uuid"2⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid3⤵
-
C:\Windows\system32\cmd.execmd.exe /c "wmic csproduct get uuid"2⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid3⤵
-
C:\Windows\system32\cmd.execmd.exe /c "wmic csproduct get uuid"2⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid3⤵
-
C:\Windows\system32\cmd.execmd.exe /c "wmic csproduct get uuid"2⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid3⤵
-
C:\Windows\system32\cmd.execmd.exe /c "wmic csproduct get uuid"2⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid3⤵
-
C:\Windows\system32\cmd.execmd.exe /c "wmic csproduct get uuid"2⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid3⤵
-
C:\Windows\system32\cmd.execmd.exe /c "wmic csproduct get uuid"2⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid3⤵
-
C:\Windows\system32\cmd.execmd.exe /c "wmic csproduct get uuid"2⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid3⤵
-
C:\Windows\system32\cmd.execmd.exe /c "wmic csproduct get uuid"2⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid3⤵
-
C:\Windows\system32\cmd.execmd.exe /c "wmic csproduct get uuid"2⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid3⤵
-
C:\Windows\system32\cmd.execmd.exe /c "wmic csproduct get uuid"2⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid3⤵
-
C:\Windows\system32\cmd.execmd.exe /c "wmic csproduct get uuid"2⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid3⤵
-
C:\Windows\system32\cmd.execmd.exe /c "wmic csproduct get uuid"2⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid3⤵
-
C:\Windows\system32\cmd.execmd.exe /c "wmic csproduct get uuid"2⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid3⤵
-
C:\Users\Admin\AppData\Local\Microsoft\config\runtime.exeC:\Users\Admin\AppData\Local\Microsoft\config\runtime.exe1⤵
-
C:\Windows\system32\cmd.execmd.exe /c "wmic csproduct get uuid"2⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid3⤵
-
C:\Windows\system32\cmd.execmd.exe /c "wmic csproduct get uuid"2⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid3⤵
-
C:\Users\Admin\AppData\Local\Temp\Microsoft\config\runtime.exeC:\Users\Admin\AppData\Local\Temp\Microsoft\config\runtime.exe1⤵
-
C:\Windows\system32\cmd.execmd.exe /c "wmic csproduct get uuid"2⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid3⤵
-
C:\Users\Admin\AppData\Roaming\Microsoft\config\runtime.exeC:\Users\Admin\AppData\Roaming\Microsoft\config\runtime.exe1⤵
-
C:\Windows\system32\cmd.execmd.exe /c "wmic csproduct get uuid"2⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid3⤵
-
C:\Windows\system32\cmd.execmd.exe /c "wmic csproduct get uuid"2⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
64B
MD55caad758326454b5788ec35315c4c304
SHA13aef8dba8042662a7fcf97e51047dc636b4d4724
SHA25683e613b6dc8d70e3bb67c58535e014f58f3e8b2921e93b55137d799fc8c56391
SHA5124e0d443cf81e2f49829b0a458a08294bf1bdc0e38d3a938fb8274eeb637d9a688b14c7999dd6b86a31fcec839a9e8c1a9611ed0bbae8bd59caa9dba1e8253693
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
64B
MD5446dd1cf97eaba21cf14d03aebc79f27
SHA136e4cc7367e0c7b40f4a8ace272941ea46373799
SHA256a7de5177c68a64bd48b36d49e2853799f4ebcfa8e4761f7cc472f333dc5f65cf
SHA512a6d754709f30b122112ae30e5ab22486393c5021d33da4d1304c061863d2e1e79e8aeb029cae61261bb77d0e7becd53a7b0106d6ea4368b4c302464e3d941cf7
-
C:\Users\Admin\AppData\Local\Microsoft\config\runtime.exeFilesize
137.0MB
MD5152bebd4a31c13ad84833423471eb098
SHA15da8b93a7add5b3b042dd9e46f91b077ed00db23
SHA256dd1a1774475cd59e2d6a73efd72b09b584f960828e40952e540b810be22c4ddb
SHA5120a22d0ed71979b2c6f66120e475896cabee925b69810d40dcaff367622eb6f1291d01e15a1aef70b5fe18fc133a70ad6a8a118f28ad719ebe8fa534b02596c8b
-
C:\Users\Admin\AppData\Local\Microsoft\config\runtime.exeFilesize
143.8MB
MD56f1594c9d54f650dd1b2a60ee69d527f
SHA12204f7194c1110e8bc2a2d03bb145293fee545f0
SHA256c5fa0c7bd27c4b7a5253637d2052c5108ee437a605542c05c0ef64272459f283
SHA512711328ec072af38e39efcd933535f2244cddd883f2093358c907aac10df139ac69354d731556c69e533d3ec947fd1e45c67f2caa58c73fd5bdeb56d47101053c
-
C:\Users\Admin\AppData\Local\Temp\Microsoft\config\runtime.exeFilesize
881.0MB
MD58c65ae7c8777acd4b9444aa7ffa28862
SHA1f1ef3c2e8680441a966a5b9a545281fdc0d9aa2e
SHA25660ece56b95330629fce13ab720165fb6e04158112c1c642210288d80325fa277
SHA512952f28ecd88b72b19c95b7e1336c31331accbcd22fa0b9b35aa8feead39136819ecfc5c919b86fd56aec14a03d6cc92485057459dd9d95420c060f84e104e013
-
C:\Users\Admin\AppData\Local\Temp\Microsoft\config\runtime.exeFilesize
159.8MB
MD597e573fd2230f88e2c4c11d41143036c
SHA14ae360fa58bdcacaf6692296cae01c47fbe925a7
SHA25603f74c7f37252181ef5c0d854cb99c2db7577ea01ec444a07f6fe86a716c5660
SHA512c86024a7c52b8b3af571b59fe35ee185de25d3013e75e7ed3fe1428ed3f1233fce1d99b85ec494690728d1cbf0b2b71f257d5279c0d486a38d75a77d3802d9b7
-
C:\Users\Admin\AppData\Local\Temp\Microsoft\config\runtime.exeFilesize
151.8MB
MD566458982558c7ec2df22f992183907d1
SHA1978833f0fe91ac3bc0a43adb15fd71e7241036f3
SHA2561afcc297674d831e9837fd929007b7e7d75d3a84563f026cc98130e10548d076
SHA5120d13f7732e08800b948429d8e818bfe34294b0389d2afff832e5515cdec2a05d9be61986e62be2ade414860baa05e1ec811564409adbbb37f24df5d303c62fc2
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_jki5gfy0.y4f.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Roaming\Microsoft\config\runtime.exeFilesize
94.2MB
MD5f5c3a82cef2801be593b4ed99b6a2c4c
SHA17cde3980f183f092035a7144b572d67845d047cb
SHA256ad4d8822414097b41d58548106fc490b3a1852a6efc3491c1eac04e3f2068645
SHA5129287af218069bb9a5d8ce5a1754e6ac34d2e81b83ef8ebda9e2be146d78f6c428bccb8f6dc92ea19a7a8dab9c38a61379a76a479b1f0fd6e6776fad1f4739fce
-
C:\Users\Admin\AppData\Roaming\Microsoft\config\runtime.exeFilesize
136.6MB
MD5f3a1e391d08fa23739245add1f225b55
SHA15cfe8559416d7ed7145fa466c204a9fed1efeeef
SHA25693a4a883904f6a3ced5b9b5f340ade65def8490314c1f6682c6fadeeed523b43
SHA512533fd21c83d4b3082b43d043d501d03d1132af098381335d7e3bc9d3e2be8c8524a862bc353fd531fe761d89eb6d99d0a7c148a7e8ec5905303803a6f8b2c5c9
-
\??\PIPE\wkssvcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/1872-164-0x00000214CABF0000-0x00000214CAC00000-memory.dmpFilesize
64KB
-
memory/1872-152-0x00000214CABF0000-0x00000214CAC00000-memory.dmpFilesize
64KB
-
memory/1872-163-0x00000214CABF0000-0x00000214CAC00000-memory.dmpFilesize
64KB
-
memory/2020-179-0x000002A9B8F70000-0x000002A9B8F80000-memory.dmpFilesize
64KB
-
memory/2020-178-0x000002A9B8F70000-0x000002A9B8F80000-memory.dmpFilesize
64KB
-
memory/4520-136-0x000001EC21630000-0x000001EC21640000-memory.dmpFilesize
64KB
-
memory/4520-135-0x000001EC23720000-0x000001EC23742000-memory.dmpFilesize
136KB
-
memory/4520-137-0x000001EC21630000-0x000001EC21640000-memory.dmpFilesize
64KB