Analysis

  • max time kernel
    189s
  • max time network
    294s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2023, 06:54

General

  • Target

    93ec2f65e8dcbd9bf755573667f9bc5d085e3533f1c0a67391fd2feed16899ed.exe

  • Size

    11.4MB

  • MD5

    de48c29c5a332eefd3f957b1e2023dd3

  • SHA1

    d66ef2bf888db92e9d2114fca7b535a7c4d22dbf

  • SHA256

    93ec2f65e8dcbd9bf755573667f9bc5d085e3533f1c0a67391fd2feed16899ed

  • SHA512

    803f3dce7d7e62f6a00bed77098cec8eb5cfdd1f748015bcd97d0e5113ce37ab08028d25e11421decda02c5ff1773496cca4ad79d7002fc14f11a62e52236a11

  • SSDEEP

    196608:W+Vl3y6ZHYgg8K6RrpICQ9UG8k7StZW4S80UehjyKmFyaculAMhxPuZOof:vVZHYaKorptQ9X7SS4fn8aPAQ2Y

Malware Config

Extracted

Family

smokeloader

Botnet

up3

Signatures

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 14 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 11 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 3 IoCs
  • Drops file in Drivers directory 2 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Stops running service(s) 3 TTPs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 15 IoCs
  • Loads dropped DLL 3 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Drops file in System32 directory 10 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Program Files directory 9 IoCs
  • Drops file in Windows directory 4 IoCs
  • Launches sc.exe 11 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\93ec2f65e8dcbd9bf755573667f9bc5d085e3533f1c0a67391fd2feed16899ed.exe
    "C:\Users\Admin\AppData\Local\Temp\93ec2f65e8dcbd9bf755573667f9bc5d085e3533f1c0a67391fd2feed16899ed.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2528
    • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe
      "C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"
      2⤵
      • Executes dropped EXE
      PID:2436
    • C:\Users\Admin\AppData\Local\Temp\e0cbefcb1af40c7d4aff4aca26621a98.exe
      "C:\Users\Admin\AppData\Local\Temp\e0cbefcb1af40c7d4aff4aca26621a98.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:968
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1872
      • C:\Users\Admin\AppData\Local\Temp\e0cbefcb1af40c7d4aff4aca26621a98.exe
        "C:\Users\Admin\AppData\Local\Temp\e0cbefcb1af40c7d4aff4aca26621a98.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Checks for VirtualBox DLLs, possible anti-VM trick
        • Drops file in Windows directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1136
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -nologo -noprofile
          4⤵
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          PID:2004
        • C:\Windows\system32\cmd.exe
          C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4440
          • C:\Windows\system32\netsh.exe
            netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
            5⤵
            • Modifies Windows Firewall
            PID:5032
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -nologo -noprofile
          4⤵
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          PID:4536
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -nologo -noprofile
          4⤵
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          PID:4600
        • C:\Windows\rss\csrss.exe
          C:\Windows\rss\csrss.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Manipulates WinMonFS driver.
          • Drops file in Windows directory
          PID:1696
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            5⤵
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            PID:4976
          • C:\Windows\SYSTEM32\schtasks.exe
            schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
            5⤵
            • Creates scheduled task(s)
            PID:5092
          • C:\Windows\SYSTEM32\schtasks.exe
            schtasks /delete /tn ScheduledUpdate /f
            5⤵
              PID:1536
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -nologo -noprofile
              5⤵
              • Drops file in System32 directory
              • Modifies data under HKEY_USERS
              • Suspicious behavior: EnumeratesProcesses
              PID:4908
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -nologo -noprofile
              5⤵
              • Drops file in System32 directory
              • Modifies data under HKEY_USERS
              PID:1316
            • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
              C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
              5⤵
              • Executes dropped EXE
              PID:2716
            • C:\Windows\SYSTEM32\schtasks.exe
              schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
              5⤵
              • Creates scheduled task(s)
              PID:4828
            • C:\Windows\windefender.exe
              "C:\Windows\windefender.exe"
              5⤵
              • Executes dropped EXE
              PID:1324
              • C:\Windows\SysWOW64\cmd.exe
                cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                6⤵
                  PID:3372
                  • C:\Windows\SysWOW64\sc.exe
                    sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                    7⤵
                    • Launches sc.exe
                    PID:2132
        • C:\Users\Admin\AppData\Local\Temp\kos1.exe
          "C:\Users\Admin\AppData\Local\Temp\kos1.exe"
          2⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4164
          • C:\Users\Admin\AppData\Local\Temp\set16.exe
            "C:\Users\Admin\AppData\Local\Temp\set16.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:4840
            • C:\Users\Admin\AppData\Local\Temp\is-5ST8S.tmp\is-3B28P.tmp
              "C:\Users\Admin\AppData\Local\Temp\is-5ST8S.tmp\is-3B28P.tmp" /SL4 $8011A "C:\Users\Admin\AppData\Local\Temp\set16.exe" 1232936 52224
              4⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in Program Files directory
              • Suspicious use of WriteProcessMemory
              PID:2504
              • C:\Windows\SysWOW64\net.exe
                "C:\Windows\system32\net.exe" helpmsg 8
                5⤵
                • Suspicious use of WriteProcessMemory
                PID:4680
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 helpmsg 8
                  6⤵
                    PID:4588
                • C:\Program Files (x86)\PA Previewer\previewer.exe
                  "C:\Program Files (x86)\PA Previewer\previewer.exe" -i
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  PID:5020
                • C:\Program Files (x86)\PA Previewer\previewer.exe
                  "C:\Program Files (x86)\PA Previewer\previewer.exe" -s
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2380
            • C:\Users\Admin\AppData\Local\Temp\kos.exe
              "C:\Users\Admin\AppData\Local\Temp\kos.exe"
              3⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              PID:4912
          • C:\Users\Admin\AppData\Local\Temp\latestX.exe
            "C:\Users\Admin\AppData\Local\Temp\latestX.exe"
            2⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Drops file in Drivers directory
            • Executes dropped EXE
            • Drops file in Program Files directory
            • Suspicious behavior: EnumeratesProcesses
            PID:2600
        • C:\Windows\Explorer.EXE
          C:\Windows\Explorer.EXE
          1⤵
            PID:3136
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
              2⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4760
            • C:\Windows\System32\cmd.exe
              C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:4992
              • C:\Windows\System32\sc.exe
                sc stop UsoSvc
                3⤵
                • Launches sc.exe
                PID:3576
              • C:\Windows\System32\sc.exe
                sc stop WaaSMedicSvc
                3⤵
                • Launches sc.exe
                PID:2384
              • C:\Windows\System32\sc.exe
                sc stop wuauserv
                3⤵
                • Launches sc.exe
                PID:3024
              • C:\Windows\System32\sc.exe
                sc stop bits
                3⤵
                • Launches sc.exe
                PID:1616
              • C:\Windows\System32\sc.exe
                sc stop dosvc
                3⤵
                • Launches sc.exe
                PID:3484
            • C:\Windows\System32\cmd.exe
              C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:2880
              • C:\Windows\System32\powercfg.exe
                powercfg /x -hibernate-timeout-ac 0
                3⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:2288
              • C:\Windows\System32\powercfg.exe
                powercfg /x -hibernate-timeout-dc 0
                3⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:2596
              • C:\Windows\System32\powercfg.exe
                powercfg /x -standby-timeout-ac 0
                3⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:4268
              • C:\Windows\System32\powercfg.exe
                powercfg /x -standby-timeout-dc 0
                3⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:4240
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#nvjdnn#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }
              2⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4792
            • C:\Windows\System32\schtasks.exe
              C:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"
              2⤵
                PID:2196
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                2⤵
                • Drops file in System32 directory
                • Modifies data under HKEY_USERS
                • Suspicious behavior: EnumeratesProcesses
                PID:3348
              • C:\Windows\System32\cmd.exe
                C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
                2⤵
                  PID:4116
                  • C:\Windows\System32\sc.exe
                    sc stop UsoSvc
                    3⤵
                    • Launches sc.exe
                    PID:1868
                  • C:\Windows\System32\sc.exe
                    sc stop WaaSMedicSvc
                    3⤵
                    • Launches sc.exe
                    PID:5028
                  • C:\Windows\System32\sc.exe
                    sc stop wuauserv
                    3⤵
                    • Launches sc.exe
                    PID:1328
                  • C:\Windows\System32\sc.exe
                    sc stop dosvc
                    3⤵
                    • Launches sc.exe
                    PID:2252
                  • C:\Windows\System32\sc.exe
                    sc stop bits
                    3⤵
                    • Launches sc.exe
                    PID:4744
                • C:\Windows\System32\cmd.exe
                  C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                  2⤵
                    PID:3928
                    • C:\Windows\System32\powercfg.exe
                      powercfg /x -hibernate-timeout-ac 0
                      3⤵
                        PID:1820
                      • C:\Windows\System32\powercfg.exe
                        powercfg /x -hibernate-timeout-dc 0
                        3⤵
                          PID:4736
                        • C:\Windows\System32\powercfg.exe
                          powercfg /x -standby-timeout-ac 0
                          3⤵
                            PID:1408
                          • C:\Windows\System32\powercfg.exe
                            powercfg /x -standby-timeout-dc 0
                            3⤵
                              PID:1324
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#nvjdnn#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }
                            2⤵
                            • Drops file in System32 directory
                            • Modifies data under HKEY_USERS
                            • Suspicious behavior: EnumeratesProcesses
                            PID:3184
                          • C:\Windows\System32\conhost.exe
                            C:\Windows\System32\conhost.exe
                            2⤵
                              PID:2528
                            • C:\Windows\explorer.exe
                              C:\Windows\explorer.exe
                              2⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:5076
                          • C:\Program Files\Google\Chrome\updater.exe
                            "C:\Program Files\Google\Chrome\updater.exe"
                            1⤵
                            • Suspicious use of NtCreateUserProcessOtherParentProcess
                            • Drops file in Drivers directory
                            • Executes dropped EXE
                            • Suspicious use of SetThreadContext
                            • Drops file in Program Files directory
                            • Suspicious behavior: EnumeratesProcesses
                            PID:4904
                          • C:\Windows\windefender.exe
                            C:\Windows\windefender.exe
                            1⤵
                            • Executes dropped EXE
                            PID:3628

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Program Files (x86)\PA Previewer\previewer.exe

                            Filesize

                            1.9MB

                            MD5

                            27b85a95804a760da4dbee7ca800c9b4

                            SHA1

                            f03136226bf3dd38ba0aa3aad1127ccab380197c

                            SHA256

                            f98b98404ecf3871a10a290ade21ad77d0b2633f47247debc53d094b9bdff245

                            SHA512

                            e760a15370272aa9541f1afceaaf4f5a8068dad21c6a8d50ebd01514e16bbc8f867c8af349080f3d1fa7a19eafe7cde74921d01716dea69ef801da1b74eae4a7

                          • C:\Program Files (x86)\PA Previewer\previewer.exe

                            Filesize

                            1.9MB

                            MD5

                            27b85a95804a760da4dbee7ca800c9b4

                            SHA1

                            f03136226bf3dd38ba0aa3aad1127ccab380197c

                            SHA256

                            f98b98404ecf3871a10a290ade21ad77d0b2633f47247debc53d094b9bdff245

                            SHA512

                            e760a15370272aa9541f1afceaaf4f5a8068dad21c6a8d50ebd01514e16bbc8f867c8af349080f3d1fa7a19eafe7cde74921d01716dea69ef801da1b74eae4a7

                          • C:\Program Files (x86)\PA Previewer\previewer.exe

                            Filesize

                            1.9MB

                            MD5

                            27b85a95804a760da4dbee7ca800c9b4

                            SHA1

                            f03136226bf3dd38ba0aa3aad1127ccab380197c

                            SHA256

                            f98b98404ecf3871a10a290ade21ad77d0b2633f47247debc53d094b9bdff245

                            SHA512

                            e760a15370272aa9541f1afceaaf4f5a8068dad21c6a8d50ebd01514e16bbc8f867c8af349080f3d1fa7a19eafe7cde74921d01716dea69ef801da1b74eae4a7

                          • C:\Program Files\Google\Chrome\updater.exe

                            Filesize

                            5.6MB

                            MD5

                            bae29e49e8190bfbbf0d77ffab8de59d

                            SHA1

                            4a6352bb47c7e1666a60c76f9b17ca4707872bd9

                            SHA256

                            f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87

                            SHA512

                            9e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2

                          • C:\Program Files\Google\Chrome\updater.exe

                            Filesize

                            5.6MB

                            MD5

                            bae29e49e8190bfbbf0d77ffab8de59d

                            SHA1

                            4a6352bb47c7e1666a60c76f9b17ca4707872bd9

                            SHA256

                            f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87

                            SHA512

                            9e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2

                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                            Filesize

                            2KB

                            MD5

                            d85ba6ff808d9e5444a4b369f5bc2730

                            SHA1

                            31aa9d96590fff6981b315e0b391b575e4c0804a

                            SHA256

                            84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                            SHA512

                            8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                            Filesize

                            944B

                            MD5

                            d28a889fd956d5cb3accfbaf1143eb6f

                            SHA1

                            157ba54b365341f8ff06707d996b3635da8446f7

                            SHA256

                            21e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45

                            SHA512

                            0b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c

                          • C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe

                            Filesize

                            116B

                            MD5

                            ec6aae2bb7d8781226ea61adca8f0586

                            SHA1

                            d82b3bad240f263c1b887c7c0cc4c2ff0e86dfe3

                            SHA256

                            b02fffaba9e664ff7840c82b102d6851ec0bb148cec462cef40999545309e599

                            SHA512

                            aa62a8cd02a03e4f462f76ae6ff2e43849052ce77cca3a2ccf593f6669425830d0910afac3cf2c46dd385454a6fb3b4bd604ae13b9586087d6f22de644f9dfc7

                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_f5r0sxss.1pn.ps1

                            Filesize

                            60B

                            MD5

                            d17fe0a3f47be24a6453e9ef58c94641

                            SHA1

                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                            SHA256

                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                            SHA512

                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                          • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

                            Filesize

                            281KB

                            MD5

                            d98e33b66343e7c96158444127a117f6

                            SHA1

                            bb716c5509a2bf345c6c1152f6e3e1452d39d50d

                            SHA256

                            5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

                            SHA512

                            705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

                          • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

                            Filesize

                            281KB

                            MD5

                            d98e33b66343e7c96158444127a117f6

                            SHA1

                            bb716c5509a2bf345c6c1152f6e3e1452d39d50d

                            SHA256

                            5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

                            SHA512

                            705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

                          • C:\Users\Admin\AppData\Local\Temp\e0cbefcb1af40c7d4aff4aca26621a98.exe

                            Filesize

                            4.1MB

                            MD5

                            3f3622728f4370ea546221a2039b10de

                            SHA1

                            8cd041ac962b1ed90ea56d2f8b25153a1d796c5f

                            SHA256

                            1e822e26d6a2766805379738c8c1c9b85921440152ec5632e99076700e99a4ed

                            SHA512

                            4d5384bebe568a42b7249d0f9c882dd3342ea246309c020812d40c63b1d99456e7a9be64bc3f011e6c86c8f72c7d69dfda6642d2dd35d74ab02e5534d73e7ea4

                          • C:\Users\Admin\AppData\Local\Temp\e0cbefcb1af40c7d4aff4aca26621a98.exe

                            Filesize

                            4.1MB

                            MD5

                            3f3622728f4370ea546221a2039b10de

                            SHA1

                            8cd041ac962b1ed90ea56d2f8b25153a1d796c5f

                            SHA256

                            1e822e26d6a2766805379738c8c1c9b85921440152ec5632e99076700e99a4ed

                            SHA512

                            4d5384bebe568a42b7249d0f9c882dd3342ea246309c020812d40c63b1d99456e7a9be64bc3f011e6c86c8f72c7d69dfda6642d2dd35d74ab02e5534d73e7ea4

                          • C:\Users\Admin\AppData\Local\Temp\e0cbefcb1af40c7d4aff4aca26621a98.exe

                            Filesize

                            4.1MB

                            MD5

                            3f3622728f4370ea546221a2039b10de

                            SHA1

                            8cd041ac962b1ed90ea56d2f8b25153a1d796c5f

                            SHA256

                            1e822e26d6a2766805379738c8c1c9b85921440152ec5632e99076700e99a4ed

                            SHA512

                            4d5384bebe568a42b7249d0f9c882dd3342ea246309c020812d40c63b1d99456e7a9be64bc3f011e6c86c8f72c7d69dfda6642d2dd35d74ab02e5534d73e7ea4

                          • C:\Users\Admin\AppData\Local\Temp\e0cbefcb1af40c7d4aff4aca26621a98.exe

                            Filesize

                            4.1MB

                            MD5

                            3f3622728f4370ea546221a2039b10de

                            SHA1

                            8cd041ac962b1ed90ea56d2f8b25153a1d796c5f

                            SHA256

                            1e822e26d6a2766805379738c8c1c9b85921440152ec5632e99076700e99a4ed

                            SHA512

                            4d5384bebe568a42b7249d0f9c882dd3342ea246309c020812d40c63b1d99456e7a9be64bc3f011e6c86c8f72c7d69dfda6642d2dd35d74ab02e5534d73e7ea4

                          • C:\Users\Admin\AppData\Local\Temp\is-5ST8S.tmp\is-3B28P.tmp

                            Filesize

                            647KB

                            MD5

                            2fba5642cbcaa6857c3995ccb5d2ee2a

                            SHA1

                            91fe8cd860cba7551fbf78bc77cc34e34956e8cc

                            SHA256

                            ddec51f3741f3988b9cc792f6f8fc0dfa2098ef0eb84c6a2af7f8da5a72b40fa

                            SHA512

                            30613b43427d17115134798506f197c0f5f8b2b9f247668fa25b9dd4853bbd97ac1e27f4e3325dec4f6dfc0e448ebbddb2969ad1a1781aa59ebf522d436aed7c

                          • C:\Users\Admin\AppData\Local\Temp\is-5ST8S.tmp\is-3B28P.tmp

                            Filesize

                            647KB

                            MD5

                            2fba5642cbcaa6857c3995ccb5d2ee2a

                            SHA1

                            91fe8cd860cba7551fbf78bc77cc34e34956e8cc

                            SHA256

                            ddec51f3741f3988b9cc792f6f8fc0dfa2098ef0eb84c6a2af7f8da5a72b40fa

                            SHA512

                            30613b43427d17115134798506f197c0f5f8b2b9f247668fa25b9dd4853bbd97ac1e27f4e3325dec4f6dfc0e448ebbddb2969ad1a1781aa59ebf522d436aed7c

                          • C:\Users\Admin\AppData\Local\Temp\is-MF4U6.tmp\_isetup\_iscrypt.dll

                            Filesize

                            2KB

                            MD5

                            a69559718ab506675e907fe49deb71e9

                            SHA1

                            bc8f404ffdb1960b50c12ff9413c893b56f2e36f

                            SHA256

                            2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

                            SHA512

                            e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

                          • C:\Users\Admin\AppData\Local\Temp\is-MF4U6.tmp\_isetup\_isdecmp.dll

                            Filesize

                            32KB

                            MD5

                            b4786eb1e1a93633ad1b4c112514c893

                            SHA1

                            734750b771d0809c88508e4feb788d7701e6dada

                            SHA256

                            2ae4169f721beb389a661e6dbb18bc84ef38556af1f46807da9d87aec2a6f06f

                            SHA512

                            0882d2aa163ece22796f837111db0d55158098035005e57cd2e9b8d59dc2e582207840bf98bee534b81c368acf60ab5d8ecbe762209273bda067a215cdb2c0c6

                          • C:\Users\Admin\AppData\Local\Temp\is-MF4U6.tmp\_isetup\_isdecmp.dll

                            Filesize

                            32KB

                            MD5

                            b4786eb1e1a93633ad1b4c112514c893

                            SHA1

                            734750b771d0809c88508e4feb788d7701e6dada

                            SHA256

                            2ae4169f721beb389a661e6dbb18bc84ef38556af1f46807da9d87aec2a6f06f

                            SHA512

                            0882d2aa163ece22796f837111db0d55158098035005e57cd2e9b8d59dc2e582207840bf98bee534b81c368acf60ab5d8ecbe762209273bda067a215cdb2c0c6

                          • C:\Users\Admin\AppData\Local\Temp\kos.exe

                            Filesize

                            8KB

                            MD5

                            076ab7d1cc5150a5e9f8745cc5f5fb6c

                            SHA1

                            7b40783a27a38106e2cc91414f2bc4d8b484c578

                            SHA256

                            d1b71081d7ba414b589338329f278ba51c6ccf542d74f131f96c2337ee0a4c90

                            SHA512

                            75e274a654e88feb0d66156f387bc5e420811f4f62939396a7455d12e835d7e134b2579ab59976c591b416d1ec1acdf05e9eb290c8f01383c6a50bf43854420b

                          • C:\Users\Admin\AppData\Local\Temp\kos.exe

                            Filesize

                            8KB

                            MD5

                            076ab7d1cc5150a5e9f8745cc5f5fb6c

                            SHA1

                            7b40783a27a38106e2cc91414f2bc4d8b484c578

                            SHA256

                            d1b71081d7ba414b589338329f278ba51c6ccf542d74f131f96c2337ee0a4c90

                            SHA512

                            75e274a654e88feb0d66156f387bc5e420811f4f62939396a7455d12e835d7e134b2579ab59976c591b416d1ec1acdf05e9eb290c8f01383c6a50bf43854420b

                          • C:\Users\Admin\AppData\Local\Temp\kos.exe

                            Filesize

                            8KB

                            MD5

                            076ab7d1cc5150a5e9f8745cc5f5fb6c

                            SHA1

                            7b40783a27a38106e2cc91414f2bc4d8b484c578

                            SHA256

                            d1b71081d7ba414b589338329f278ba51c6ccf542d74f131f96c2337ee0a4c90

                            SHA512

                            75e274a654e88feb0d66156f387bc5e420811f4f62939396a7455d12e835d7e134b2579ab59976c591b416d1ec1acdf05e9eb290c8f01383c6a50bf43854420b

                          • C:\Users\Admin\AppData\Local\Temp\kos1.exe

                            Filesize

                            1.4MB

                            MD5

                            85b698363e74ba3c08fc16297ddc284e

                            SHA1

                            171cfea4a82a7365b241f16aebdb2aad29f4f7c0

                            SHA256

                            78efcbb0c6eb6a4c76c036adc65154b8ff028849f79d508e45babfb527cb7cfe

                            SHA512

                            7e4816c43e0addba088709948e8aedc9e39d6802c74a75cfbc2a0e739b44c5b5eef2bb2453b7032c758b0bdb38e4e7a598aa29be015796361b81d7f9e8027796

                          • C:\Users\Admin\AppData\Local\Temp\kos1.exe

                            Filesize

                            1.4MB

                            MD5

                            85b698363e74ba3c08fc16297ddc284e

                            SHA1

                            171cfea4a82a7365b241f16aebdb2aad29f4f7c0

                            SHA256

                            78efcbb0c6eb6a4c76c036adc65154b8ff028849f79d508e45babfb527cb7cfe

                            SHA512

                            7e4816c43e0addba088709948e8aedc9e39d6802c74a75cfbc2a0e739b44c5b5eef2bb2453b7032c758b0bdb38e4e7a598aa29be015796361b81d7f9e8027796

                          • C:\Users\Admin\AppData\Local\Temp\kos1.exe

                            Filesize

                            1.4MB

                            MD5

                            85b698363e74ba3c08fc16297ddc284e

                            SHA1

                            171cfea4a82a7365b241f16aebdb2aad29f4f7c0

                            SHA256

                            78efcbb0c6eb6a4c76c036adc65154b8ff028849f79d508e45babfb527cb7cfe

                            SHA512

                            7e4816c43e0addba088709948e8aedc9e39d6802c74a75cfbc2a0e739b44c5b5eef2bb2453b7032c758b0bdb38e4e7a598aa29be015796361b81d7f9e8027796

                          • C:\Users\Admin\AppData\Local\Temp\latestX.exe

                            Filesize

                            5.6MB

                            MD5

                            bae29e49e8190bfbbf0d77ffab8de59d

                            SHA1

                            4a6352bb47c7e1666a60c76f9b17ca4707872bd9

                            SHA256

                            f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87

                            SHA512

                            9e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2

                          • C:\Users\Admin\AppData\Local\Temp\latestX.exe

                            Filesize

                            5.6MB

                            MD5

                            bae29e49e8190bfbbf0d77ffab8de59d

                            SHA1

                            4a6352bb47c7e1666a60c76f9b17ca4707872bd9

                            SHA256

                            f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87

                            SHA512

                            9e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2

                          • C:\Users\Admin\AppData\Local\Temp\latestX.exe

                            Filesize

                            5.6MB

                            MD5

                            bae29e49e8190bfbbf0d77ffab8de59d

                            SHA1

                            4a6352bb47c7e1666a60c76f9b17ca4707872bd9

                            SHA256

                            f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87

                            SHA512

                            9e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2

                          • C:\Users\Admin\AppData\Local\Temp\set16.exe

                            Filesize

                            1.4MB

                            MD5

                            22d5269955f256a444bd902847b04a3b

                            SHA1

                            41a83de3273270c3bd5b2bd6528bdc95766aa268

                            SHA256

                            ab16986253bd187e3134f27495ef0db4b648f769721bc8c84b708c7ba69156fd

                            SHA512

                            d85ada5d8c2c02932a79241a484b088ba70bda0497fd8ad638300935a16841d7cbc8258be93055907cb533bc534fdd48c7c91109fa22f87e65a6b374cd51055c

                          • C:\Users\Admin\AppData\Local\Temp\set16.exe

                            Filesize

                            1.4MB

                            MD5

                            22d5269955f256a444bd902847b04a3b

                            SHA1

                            41a83de3273270c3bd5b2bd6528bdc95766aa268

                            SHA256

                            ab16986253bd187e3134f27495ef0db4b648f769721bc8c84b708c7ba69156fd

                            SHA512

                            d85ada5d8c2c02932a79241a484b088ba70bda0497fd8ad638300935a16841d7cbc8258be93055907cb533bc534fdd48c7c91109fa22f87e65a6b374cd51055c

                          • C:\Users\Admin\AppData\Local\Temp\set16.exe

                            Filesize

                            1.4MB

                            MD5

                            22d5269955f256a444bd902847b04a3b

                            SHA1

                            41a83de3273270c3bd5b2bd6528bdc95766aa268

                            SHA256

                            ab16986253bd187e3134f27495ef0db4b648f769721bc8c84b708c7ba69156fd

                            SHA512

                            d85ada5d8c2c02932a79241a484b088ba70bda0497fd8ad638300935a16841d7cbc8258be93055907cb533bc534fdd48c7c91109fa22f87e65a6b374cd51055c

                          • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

                            Filesize

                            213KB

                            MD5

                            92505d71d65f3fd132de5d032d371d63

                            SHA1

                            a381f472b41aab5f1241f58e522cfe73b36c7a67

                            SHA256

                            3adc2d21a85e8f73b72c75cf9450a7eb2fe843df24b827a9afe1201316d07944

                            SHA512

                            4dca261185cdaf561b42e7210e1b3dd7d2eb4832354cbadb6ebbb5da2f07fa3917ddbb1433d19c358587f63483d6e59a1891aa26fb5e33e3c04cd6a353de9cdc

                          • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

                            Filesize

                            213KB

                            MD5

                            92505d71d65f3fd132de5d032d371d63

                            SHA1

                            a381f472b41aab5f1241f58e522cfe73b36c7a67

                            SHA256

                            3adc2d21a85e8f73b72c75cf9450a7eb2fe843df24b827a9afe1201316d07944

                            SHA512

                            4dca261185cdaf561b42e7210e1b3dd7d2eb4832354cbadb6ebbb5da2f07fa3917ddbb1433d19c358587f63483d6e59a1891aa26fb5e33e3c04cd6a353de9cdc

                          • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

                            Filesize

                            213KB

                            MD5

                            92505d71d65f3fd132de5d032d371d63

                            SHA1

                            a381f472b41aab5f1241f58e522cfe73b36c7a67

                            SHA256

                            3adc2d21a85e8f73b72c75cf9450a7eb2fe843df24b827a9afe1201316d07944

                            SHA512

                            4dca261185cdaf561b42e7210e1b3dd7d2eb4832354cbadb6ebbb5da2f07fa3917ddbb1433d19c358587f63483d6e59a1891aa26fb5e33e3c04cd6a353de9cdc

                          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                            Filesize

                            2KB

                            MD5

                            968cb9309758126772781b83adb8a28f

                            SHA1

                            8da30e71accf186b2ba11da1797cf67f8f78b47c

                            SHA256

                            92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

                            SHA512

                            4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

                          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                            Filesize

                            19KB

                            MD5

                            6c47176daefddee8da4330d11bc9aeb0

                            SHA1

                            12b13c36bcb44e6e904f4b3b106d9b3fbcfd6f18

                            SHA256

                            0804c5d94e6a360768a344a3283827605d2b499f9ec5165e98719deddd0ba7c6

                            SHA512

                            33cd531db516df5951382b3a53e7a41ddf5c8d5536a64e43ea40b018301bf94161a5ab694c27bc0d46a339f3c986e98f56f7132e1896b599c1b1cbce54fa6a72

                          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                            Filesize

                            19KB

                            MD5

                            92312eab981a7073dd117a9dcf54ad3e

                            SHA1

                            e4151f41d809530c6a72c9937856d14a4207e271

                            SHA256

                            c95b881d6ef0c43b1823759ab18aab5ba2021e01a28de0427d88847dd2fab318

                            SHA512

                            db486bb4a7da60dc2bd534d9542f0e076112b90ffb2b0f500d68db2fffd520ecc7e9ced424baf0e099acdfe6bb0800ef6ed0fa6b535e57774a3949b709ce2d41

                          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                            Filesize

                            19KB

                            MD5

                            5f9891960ae5a2eefddf99bbbf867a55

                            SHA1

                            c2a4061adb62b52d39a53b061a96563ef4db8414

                            SHA256

                            a2bfbb775b51e2ee159fa2037c46aa3d508addd8fb9dff4184d72c6596a289e7

                            SHA512

                            00a0f3512cd5b331d8fc0dd6abf5430d5ee928be09d50663dcb7b13dde56a1f14bcec5f08b74cee3619918d16e3560bd704edd356a5cd0606c8215e7b420e1d9

                          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                            Filesize

                            19KB

                            MD5

                            0cf6bf06130f69d633ffdfcda2319eb4

                            SHA1

                            31b4bfbff4b4c8cb857ac4acff6cc1661d3f3f3c

                            SHA256

                            78606175016d4124670fa30166316bd7abae7b7225d4ff4f378fdc21a90f4cac

                            SHA512

                            18d39b1d430d9e16aefc3b53a730984d9e2bbfd45f172e2425eb738038d76f56c52dba8bc878653e480b27fb30f567528d55e0059aab96cf1333872ac19f1eaa

                          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                            Filesize

                            19KB

                            MD5

                            0148f25f623ef787a29d0717afe69f5b

                            SHA1

                            fd9bc889c75c4aecacdbe3e285c5f59673944ab4

                            SHA256

                            3ba9a9609c31c5d8fb868914784ac143eb70846e85aa43d9cfc40ff34a75b7bc

                            SHA512

                            4e5aa0d8055bd23598732132ca6fc7449487a8e2d331e96a04bf9f9ae4c992bbd9239b58cd28632f22c6a5773c28307a250092e969b04d51e3496aa220f28723

                          • C:\Windows\System32\drivers\etc\hosts

                            Filesize

                            3KB

                            MD5

                            00930b40cba79465b7a38ed0449d1449

                            SHA1

                            4b25a89ee28b20ba162f23772ddaf017669092a5

                            SHA256

                            eda1aae2c8fce700e3bdbe0186cf3db88400cf0ac13ec736e84dacba61628a01

                            SHA512

                            cbe4760ec041e7da7ab86474d5c82969cfccb8ccc5dbdac9436862d5b1b86210ab90754d3c8da5724176570d8842e57a716a281acba8719e90098a6f61a17c62

                          • C:\Windows\rss\csrss.exe

                            Filesize

                            4.1MB

                            MD5

                            3f3622728f4370ea546221a2039b10de

                            SHA1

                            8cd041ac962b1ed90ea56d2f8b25153a1d796c5f

                            SHA256

                            1e822e26d6a2766805379738c8c1c9b85921440152ec5632e99076700e99a4ed

                            SHA512

                            4d5384bebe568a42b7249d0f9c882dd3342ea246309c020812d40c63b1d99456e7a9be64bc3f011e6c86c8f72c7d69dfda6642d2dd35d74ab02e5534d73e7ea4

                          • C:\Windows\rss\csrss.exe

                            Filesize

                            4.1MB

                            MD5

                            3f3622728f4370ea546221a2039b10de

                            SHA1

                            8cd041ac962b1ed90ea56d2f8b25153a1d796c5f

                            SHA256

                            1e822e26d6a2766805379738c8c1c9b85921440152ec5632e99076700e99a4ed

                            SHA512

                            4d5384bebe568a42b7249d0f9c882dd3342ea246309c020812d40c63b1d99456e7a9be64bc3f011e6c86c8f72c7d69dfda6642d2dd35d74ab02e5534d73e7ea4

                          • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                            Filesize

                            4KB

                            MD5

                            bdb25c22d14ec917e30faf353826c5de

                            SHA1

                            6c2feb9cea9237bc28842ebf2fea68b3bd7ad190

                            SHA256

                            e3274ce8296f2cd20e3189576fbadbfa0f1817cdf313487945c80e968589a495

                            SHA512

                            b5eddbfd4748298a302e2963cfd12d849130b6dcb8f0f85a2a623caed0ff9bd88f4ec726f646dbebfca4964adc35f882ec205113920cb546cc08193739d6728c

                          • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                            Filesize

                            1KB

                            MD5

                            b42c70c1dbf0d1d477ec86902db9e986

                            SHA1

                            1d1c0a670748b3d10bee8272e5d67a4fabefd31f

                            SHA256

                            8ed3b348989cdc967d1fc0e887b2a2f5a656680d8d14ebd3cb71a10c2f55867a

                            SHA512

                            57fb278a8b2e83d01fac2a031c90e0e2bd5e4c1a360cfa4308490eb07e1b9d265b1f28399d0f10b141a6438ba92dd5f9ce4f18530ec277fece0eb7678041cbc5

                          • C:\Windows\windefender.exe

                            Filesize

                            2.0MB

                            MD5

                            8e67f58837092385dcf01e8a2b4f5783

                            SHA1

                            012c49cfd8c5d06795a6f67ea2baf2a082cf8625

                            SHA256

                            166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

                            SHA512

                            40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

                          • C:\Windows\windefender.exe

                            Filesize

                            2.0MB

                            MD5

                            8e67f58837092385dcf01e8a2b4f5783

                            SHA1

                            012c49cfd8c5d06795a6f67ea2baf2a082cf8625

                            SHA256

                            166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

                            SHA512

                            40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

                          • C:\Windows\windefender.exe

                            Filesize

                            2.0MB

                            MD5

                            8e67f58837092385dcf01e8a2b4f5783

                            SHA1

                            012c49cfd8c5d06795a6f67ea2baf2a082cf8625

                            SHA256

                            166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

                            SHA512

                            40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

                          • memory/968-201-0x0000000000400000-0x0000000002663000-memory.dmp

                            Filesize

                            34.4MB

                          • memory/968-117-0x0000000000400000-0x0000000002663000-memory.dmp

                            Filesize

                            34.4MB

                          • memory/968-39-0x0000000004780000-0x000000000506B000-memory.dmp

                            Filesize

                            8.9MB

                          • memory/968-239-0x0000000000400000-0x0000000002663000-memory.dmp

                            Filesize

                            34.4MB

                          • memory/968-46-0x0000000000400000-0x0000000002663000-memory.dmp

                            Filesize

                            34.4MB

                          • memory/968-73-0x0000000000400000-0x0000000002663000-memory.dmp

                            Filesize

                            34.4MB

                          • memory/968-37-0x0000000004380000-0x000000000477D000-memory.dmp

                            Filesize

                            4.0MB

                          • memory/968-138-0x0000000004380000-0x000000000477D000-memory.dmp

                            Filesize

                            4.0MB

                          • memory/968-140-0x0000000004780000-0x000000000506B000-memory.dmp

                            Filesize

                            8.9MB

                          • memory/1136-467-0x0000000000400000-0x0000000002663000-memory.dmp

                            Filesize

                            34.4MB

                          • memory/1136-276-0x0000000000400000-0x0000000002663000-memory.dmp

                            Filesize

                            34.4MB

                          • memory/1136-350-0x0000000000400000-0x0000000002663000-memory.dmp

                            Filesize

                            34.4MB

                          • memory/1136-287-0x0000000000400000-0x0000000002663000-memory.dmp

                            Filesize

                            34.4MB

                          • memory/1324-560-0x0000000000400000-0x00000000008DF000-memory.dmp

                            Filesize

                            4.9MB

                          • memory/1696-499-0x0000000000400000-0x0000000002663000-memory.dmp

                            Filesize

                            34.4MB

                          • memory/1696-545-0x0000000000400000-0x0000000002663000-memory.dmp

                            Filesize

                            34.4MB

                          • memory/1696-561-0x0000000000400000-0x0000000002663000-memory.dmp

                            Filesize

                            34.4MB

                          • memory/1872-159-0x0000000073480000-0x0000000073C30000-memory.dmp

                            Filesize

                            7.7MB

                          • memory/1872-232-0x0000000007F10000-0x0000000007F2A000-memory.dmp

                            Filesize

                            104KB

                          • memory/1872-163-0x0000000003160000-0x0000000003170000-memory.dmp

                            Filesize

                            64KB

                          • memory/1872-164-0x0000000003160000-0x0000000003170000-memory.dmp

                            Filesize

                            64KB

                          • memory/1872-165-0x0000000006BF0000-0x0000000006C34000-memory.dmp

                            Filesize

                            272KB

                          • memory/1872-226-0x0000000007D40000-0x0000000007D51000-memory.dmp

                            Filesize

                            68KB

                          • memory/1872-157-0x00000000067A0000-0x00000000067EC000-memory.dmp

                            Filesize

                            304KB

                          • memory/1872-156-0x0000000006700000-0x000000000671E000-memory.dmp

                            Filesize

                            120KB

                          • memory/1872-153-0x0000000006330000-0x0000000006684000-memory.dmp

                            Filesize

                            3.3MB

                          • memory/1872-179-0x0000000003160000-0x0000000003170000-memory.dmp

                            Filesize

                            64KB

                          • memory/1872-148-0x00000000060A0000-0x0000000006106000-memory.dmp

                            Filesize

                            408KB

                          • memory/1872-183-0x00000000079A0000-0x0000000007A16000-memory.dmp

                            Filesize

                            472KB

                          • memory/1872-142-0x0000000005FC0000-0x0000000006026000-memory.dmp

                            Filesize

                            408KB

                          • memory/1872-141-0x00000000056C0000-0x00000000056E2000-memory.dmp

                            Filesize

                            136KB

                          • memory/1872-134-0x0000000005890000-0x0000000005EB8000-memory.dmp

                            Filesize

                            6.2MB

                          • memory/1872-115-0x0000000002D50000-0x0000000002D86000-memory.dmp

                            Filesize

                            216KB

                          • memory/1872-231-0x0000000007ED0000-0x0000000007EE4000-memory.dmp

                            Filesize

                            80KB

                          • memory/1872-199-0x00000000080A0000-0x000000000871A000-memory.dmp

                            Filesize

                            6.5MB

                          • memory/1872-200-0x0000000007A40000-0x0000000007A5A000-memory.dmp

                            Filesize

                            104KB

                          • memory/1872-132-0x0000000003160000-0x0000000003170000-memory.dmp

                            Filesize

                            64KB

                          • memory/1872-202-0x000000007F370000-0x000000007F380000-memory.dmp

                            Filesize

                            64KB

                          • memory/1872-203-0x0000000007BE0000-0x0000000007C12000-memory.dmp

                            Filesize

                            200KB

                          • memory/1872-204-0x0000000070A60000-0x0000000070AAC000-memory.dmp

                            Filesize

                            304KB

                          • memory/1872-205-0x0000000070AB0000-0x0000000070E04000-memory.dmp

                            Filesize

                            3.3MB

                          • memory/1872-215-0x0000000007BC0000-0x0000000007BDE000-memory.dmp

                            Filesize

                            120KB

                          • memory/1872-216-0x0000000007C20000-0x0000000007CC3000-memory.dmp

                            Filesize

                            652KB

                          • memory/1872-230-0x0000000007EC0000-0x0000000007ECE000-memory.dmp

                            Filesize

                            56KB

                          • memory/1872-218-0x0000000007D10000-0x0000000007D1A000-memory.dmp

                            Filesize

                            40KB

                          • memory/1872-229-0x0000000003160000-0x0000000003170000-memory.dmp

                            Filesize

                            64KB

                          • memory/1872-129-0x0000000073480000-0x0000000073C30000-memory.dmp

                            Filesize

                            7.7MB

                          • memory/1872-130-0x0000000003160000-0x0000000003170000-memory.dmp

                            Filesize

                            64KB

                          • memory/1872-224-0x0000000007DE0000-0x0000000007E76000-memory.dmp

                            Filesize

                            600KB

                          • memory/2380-246-0x0000000000400000-0x00000000005F1000-memory.dmp

                            Filesize

                            1.9MB

                          • memory/2380-517-0x0000000000400000-0x00000000005F1000-memory.dmp

                            Filesize

                            1.9MB

                          • memory/2380-228-0x0000000000400000-0x00000000005F1000-memory.dmp

                            Filesize

                            1.9MB

                          • memory/2380-563-0x0000000000400000-0x00000000005F1000-memory.dmp

                            Filesize

                            1.9MB

                          • memory/2380-547-0x0000000000400000-0x00000000005F1000-memory.dmp

                            Filesize

                            1.9MB

                          • memory/2380-438-0x0000000000400000-0x00000000005F1000-memory.dmp

                            Filesize

                            1.9MB

                          • memory/2380-136-0x0000000000400000-0x00000000005F1000-memory.dmp

                            Filesize

                            1.9MB

                          • memory/2380-320-0x0000000000400000-0x00000000005F1000-memory.dmp

                            Filesize

                            1.9MB

                          • memory/2380-285-0x0000000000400000-0x00000000005F1000-memory.dmp

                            Filesize

                            1.9MB

                          • memory/2436-126-0x0000000002D30000-0x0000000002D39000-memory.dmp

                            Filesize

                            36KB

                          • memory/2436-125-0x0000000002EB0000-0x0000000002FB0000-memory.dmp

                            Filesize

                            1024KB

                          • memory/2436-162-0x0000000002EB0000-0x0000000002FB0000-memory.dmp

                            Filesize

                            1024KB

                          • memory/2504-123-0x0000000000400000-0x00000000004B0000-memory.dmp

                            Filesize

                            704KB

                          • memory/2504-135-0x00000000020F0000-0x00000000020F1000-memory.dmp

                            Filesize

                            4KB

                          • memory/2528-519-0x00007FF693EE0000-0x00007FF693F0A000-memory.dmp

                            Filesize

                            168KB

                          • memory/2528-0-0x00000000744C0000-0x0000000074C70000-memory.dmp

                            Filesize

                            7.7MB

                          • memory/2528-36-0x00000000744C0000-0x0000000074C70000-memory.dmp

                            Filesize

                            7.7MB

                          • memory/2528-1-0x00000000001E0000-0x0000000000D4A000-memory.dmp

                            Filesize

                            11.4MB

                          • memory/2528-57-0x00000000744C0000-0x0000000074C70000-memory.dmp

                            Filesize

                            7.7MB

                          • memory/2600-118-0x00007FF7C5690000-0x00007FF7C5C31000-memory.dmp

                            Filesize

                            5.6MB

                          • memory/2600-223-0x00007FF7C5690000-0x00007FF7C5C31000-memory.dmp

                            Filesize

                            5.6MB

                          • memory/4164-75-0x00000000744C0000-0x0000000074C70000-memory.dmp

                            Filesize

                            7.7MB

                          • memory/4164-30-0x0000000000840000-0x00000000009B4000-memory.dmp

                            Filesize

                            1.5MB

                          • memory/4164-32-0x00000000744C0000-0x0000000074C70000-memory.dmp

                            Filesize

                            7.7MB

                          • memory/4760-171-0x0000028DFED30000-0x0000028DFED52000-memory.dmp

                            Filesize

                            136KB

                          • memory/4760-176-0x00007FF86F8C0000-0x00007FF870381000-memory.dmp

                            Filesize

                            10.8MB

                          • memory/4760-177-0x0000028DFECB0000-0x0000028DFECC0000-memory.dmp

                            Filesize

                            64KB

                          • memory/4760-182-0x00007FF86F8C0000-0x00007FF870381000-memory.dmp

                            Filesize

                            10.8MB

                          • memory/4760-178-0x0000028DFECB0000-0x0000028DFECC0000-memory.dmp

                            Filesize

                            64KB

                          • memory/4792-196-0x00007FF86F8C0000-0x00007FF870381000-memory.dmp

                            Filesize

                            10.8MB

                          • memory/4792-198-0x00000149C3760000-0x00000149C3770000-memory.dmp

                            Filesize

                            64KB

                          • memory/4792-220-0x00007FF86F8C0000-0x00007FF870381000-memory.dmp

                            Filesize

                            10.8MB

                          • memory/4792-197-0x00000149C3760000-0x00000149C3770000-memory.dmp

                            Filesize

                            64KB

                          • memory/4792-217-0x00000149C3760000-0x00000149C3770000-memory.dmp

                            Filesize

                            64KB

                          • memory/4840-120-0x0000000000400000-0x0000000000413000-memory.dmp

                            Filesize

                            76KB

                          • memory/4840-58-0x0000000000400000-0x0000000000413000-memory.dmp

                            Filesize

                            76KB

                          • memory/4904-462-0x00007FF7AA960000-0x00007FF7AAF01000-memory.dmp

                            Filesize

                            5.6MB

                          • memory/4904-424-0x00007FF7AA960000-0x00007FF7AAF01000-memory.dmp

                            Filesize

                            5.6MB

                          • memory/4904-244-0x00007FF7AA960000-0x00007FF7AAF01000-memory.dmp

                            Filesize

                            5.6MB

                          • memory/4912-154-0x00007FF86F8C0000-0x00007FF870381000-memory.dmp

                            Filesize

                            10.8MB

                          • memory/4912-74-0x00000000001E0000-0x00000000001E8000-memory.dmp

                            Filesize

                            32KB

                          • memory/4912-116-0x00007FF86F8C0000-0x00007FF870381000-memory.dmp

                            Filesize

                            10.8MB

                          • memory/4912-133-0x000000001ADA0000-0x000000001ADB0000-memory.dmp

                            Filesize

                            64KB

                          • memory/5020-124-0x0000000000400000-0x00000000005F1000-memory.dmp

                            Filesize

                            1.9MB

                          • memory/5020-119-0x0000000000400000-0x00000000005F1000-memory.dmp

                            Filesize

                            1.9MB

                          • memory/5076-550-0x00007FF7098F0000-0x00007FF70A0DF000-memory.dmp

                            Filesize

                            7.9MB

                          • memory/5076-532-0x00007FF7098F0000-0x00007FF70A0DF000-memory.dmp

                            Filesize

                            7.9MB

                          • memory/5076-463-0x0000000001A80000-0x0000000001AA0000-memory.dmp

                            Filesize

                            128KB