Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    103s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/10/2023, 21:24

General

  • Target

    NEAS.7b6bc051fb67fe4b3426215ac69b01f0.exe

  • Size

    1.1MB

  • MD5

    7b6bc051fb67fe4b3426215ac69b01f0

  • SHA1

    ab2b2afd7d31545ba6608db5a88a7340742255cf

  • SHA256

    b52eac71c2df2416b15d52213cd1a8481d75af55ef931337767e73f01a2f9175

  • SHA512

    f9a2536bbb520872620a1a8990646dd4eefcbc9cd647b78ce6496f2badcc47e32d25cc410d43f9056d5a0995cdb985b8975b38de6fc567572dafd81e44b96485

  • SSDEEP

    12288:sl+4Tcyct/JWT7yckBlepmbMsBXYHOWyAh5+djVyKDGpiRe7FaS+ug82qGeJ3btK:xyc5JWackYm7dZ1Oq2nn2qPJ3btV3+f

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Process spawned unexpected child process 39 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 6 IoCs
  • DCRat payload 7 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Drops file in Program Files directory 30 IoCs
  • Drops file in Windows directory 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 39 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 44 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs
  • System policy modification 1 TTPs 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.7b6bc051fb67fe4b3426215ac69b01f0.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.7b6bc051fb67fe4b3426215ac69b01f0.exe"
    1⤵
    • UAC bypass
    • Checks computer location settings
    • Checks whether UAC is enabled
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:3820
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4240
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1604
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4316
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3996
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2980
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/odt/'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1532
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3568
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4088
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3912
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1772
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4456
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3288
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\yJJaNbGQb7.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4620
      • C:\Windows\system32\w32tm.exe
        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
        3⤵
          PID:688
        • C:\Users\Default\Templates\winlogon.exe
          "C:\Users\Default\Templates\winlogon.exe"
          3⤵
          • UAC bypass
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • System policy modification
          PID:1700
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "sihosts" /sc MINUTE /mo 10 /tr "'C:\odt\sihost.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:4956
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\odt\sihost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2172
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "sihosts" /sc MINUTE /mo 5 /tr "'C:\odt\sihost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:4100
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 8 /tr "'C:\odt\fontdrvhost.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1800
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\odt\fontdrvhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:728
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 7 /tr "'C:\odt\fontdrvhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2896
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "MusNotificationM" /sc MINUTE /mo 7 /tr "'C:\Program Files\Internet Explorer\MusNotification.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:4944
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "MusNotification" /sc ONLOGON /tr "'C:\Program Files\Internet Explorer\MusNotification.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1604
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "MusNotificationM" /sc MINUTE /mo 11 /tr "'C:\Program Files\Internet Explorer\MusNotification.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2436
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "smsss" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\smss.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:4704
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\smss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:5100
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "smsss" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\smss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:3588
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 14 /tr "'C:\Program Files\Mozilla Firefox\browser\VisualElements\taskhostw.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1728
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Program Files\Mozilla Firefox\browser\VisualElements\taskhostw.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:4624
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 12 /tr "'C:\Program Files\Mozilla Firefox\browser\VisualElements\taskhostw.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:4976
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Google\Temp\Idle.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:5072
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files (x86)\Google\Temp\Idle.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:4320
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Google\Temp\Idle.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1956
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 6 /tr "'C:\Windows\bcastdvr\OfficeClickToRun.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:912
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Windows\bcastdvr\OfficeClickToRun.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:3288
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 8 /tr "'C:\Windows\bcastdvr\OfficeClickToRun.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:3996
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 12 /tr "'C:\Users\Default\Templates\winlogon.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:4316
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Users\Default\Templates\winlogon.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:3912
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 5 /tr "'C:\Users\Default\Templates\winlogon.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:3788
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 9 /tr "'C:\Users\Default User\SearchApp.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:836
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Users\Default User\SearchApp.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2548
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 14 /tr "'C:\Users\Default User\SearchApp.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:3380
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\Registry.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:4708
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Multimedia Platform\Registry.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1532
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\Registry.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:4252
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 6 /tr "'C:\Windows\Fonts\backgroundTaskHost.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:748
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Windows\Fonts\backgroundTaskHost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:4224
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 12 /tr "'C:\Windows\Fonts\backgroundTaskHost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:3236
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "smsss" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\BHO\smss.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:688
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\BHO\smss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1380
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "smsss" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\BHO\smss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:4884
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 11 /tr "'C:\Users\Public\AccountPictures\backgroundTaskHost.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:4752
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Users\Public\AccountPictures\backgroundTaskHost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1576
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 8 /tr "'C:\Users\Public\AccountPictures\backgroundTaskHost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:3164

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Windows Multimedia Platform\Registry.exe

      Filesize

      1.1MB

      MD5

      575b70cb1252c32a7a3285f0f25faf94

      SHA1

      f108f2b07ef295394ffef6fd7fce6d825354fd5e

      SHA256

      065af9c75c5bb1cdf477f7f2fa5bf8ac1f037816f7554604402d2c7f530348c9

      SHA512

      e0d82f70f67e9fadff4a98c336e2f0d979549d6f8d1435b748f0dcb81c380eb8be4e6ff512ccab54a2d723b60c9f9f315e7a4d53d715e4656ee5f6527660b25a

    • C:\Program Files\Mozilla Firefox\browser\VisualElements\taskhostw.exe

      Filesize

      1.1MB

      MD5

      7b6bc051fb67fe4b3426215ac69b01f0

      SHA1

      ab2b2afd7d31545ba6608db5a88a7340742255cf

      SHA256

      b52eac71c2df2416b15d52213cd1a8481d75af55ef931337767e73f01a2f9175

      SHA512

      f9a2536bbb520872620a1a8990646dd4eefcbc9cd647b78ce6496f2badcc47e32d25cc410d43f9056d5a0995cdb985b8975b38de6fc567572dafd81e44b96485

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

      Filesize

      2KB

      MD5

      d85ba6ff808d9e5444a4b369f5bc2730

      SHA1

      31aa9d96590fff6981b315e0b391b575e4c0804a

      SHA256

      84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

      SHA512

      8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      944B

      MD5

      59d97011e091004eaffb9816aa0b9abd

      SHA1

      1602a56b01dd4b7c577ca27d3117e4bcc1aa657b

      SHA256

      18f381e0db020a763b8c515c346ef58679ab9c403267eacfef5359e272f7e71d

      SHA512

      d9ca49c1a17580981e2c1a50d73c0eecaa7a62f8514741512172e395af2a3d80aeb0f71c58bc7f52c18246d57ba67af09b6bff4776877d6cc6f0245c30e092d6

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      944B

      MD5

      59d97011e091004eaffb9816aa0b9abd

      SHA1

      1602a56b01dd4b7c577ca27d3117e4bcc1aa657b

      SHA256

      18f381e0db020a763b8c515c346ef58679ab9c403267eacfef5359e272f7e71d

      SHA512

      d9ca49c1a17580981e2c1a50d73c0eecaa7a62f8514741512172e395af2a3d80aeb0f71c58bc7f52c18246d57ba67af09b6bff4776877d6cc6f0245c30e092d6

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      944B

      MD5

      3a6bad9528f8e23fb5c77fbd81fa28e8

      SHA1

      f127317c3bc6407f536c0f0600dcbcf1aabfba36

      SHA256

      986366767de5873f1b170a63f2a33ce05132d1afd90c8f5017afbca8ef1beb05

      SHA512

      846002154a0ece6f3e9feda6f115d3161dc21b3789525dd62ae1d9188495171293efdbe7be4710666dd8a15e66b557315b5a02918a741ed1d5f3ff0c515b98e2

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      944B

      MD5

      3a6bad9528f8e23fb5c77fbd81fa28e8

      SHA1

      f127317c3bc6407f536c0f0600dcbcf1aabfba36

      SHA256

      986366767de5873f1b170a63f2a33ce05132d1afd90c8f5017afbca8ef1beb05

      SHA512

      846002154a0ece6f3e9feda6f115d3161dc21b3789525dd62ae1d9188495171293efdbe7be4710666dd8a15e66b557315b5a02918a741ed1d5f3ff0c515b98e2

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      944B

      MD5

      3a6bad9528f8e23fb5c77fbd81fa28e8

      SHA1

      f127317c3bc6407f536c0f0600dcbcf1aabfba36

      SHA256

      986366767de5873f1b170a63f2a33ce05132d1afd90c8f5017afbca8ef1beb05

      SHA512

      846002154a0ece6f3e9feda6f115d3161dc21b3789525dd62ae1d9188495171293efdbe7be4710666dd8a15e66b557315b5a02918a741ed1d5f3ff0c515b98e2

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      944B

      MD5

      aaaac7c68d2b7997ed502c26fd9f65c2

      SHA1

      7c5a3731300d672bf53c43e2f9e951c745f7fbdf

      SHA256

      8724dc2c3c8e8f17aeefae44a23741b1ea3b43c490fbc52fd61575ffe1cd82bb

      SHA512

      c526febd9430413b48bed976edd9a795793ad1f06c8ff4f6b768b4ad63f4d2f06b9da72d4fcfa7cb9530a64e2dc3554f5ad97fd0ab60129701d175f2724ef1ac

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      944B

      MD5

      5f0ddc7f3691c81ee14d17b419ba220d

      SHA1

      f0ef5fde8bab9d17c0b47137e014c91be888ee53

      SHA256

      a31805264b8b13ce4145f272cb2830728c186c46e314b48514d636866217add5

      SHA512

      2ce7c2a0833f581297c13dd88ccfcd36bf129d2b5d7718c52b1d67c97cbd8fc93abc085a040229a0fd712e880c690de7f6b996b0b47c46a091fabb7931be58d3

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      944B

      MD5

      5f0ddc7f3691c81ee14d17b419ba220d

      SHA1

      f0ef5fde8bab9d17c0b47137e014c91be888ee53

      SHA256

      a31805264b8b13ce4145f272cb2830728c186c46e314b48514d636866217add5

      SHA512

      2ce7c2a0833f581297c13dd88ccfcd36bf129d2b5d7718c52b1d67c97cbd8fc93abc085a040229a0fd712e880c690de7f6b996b0b47c46a091fabb7931be58d3

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      944B

      MD5

      5f0ddc7f3691c81ee14d17b419ba220d

      SHA1

      f0ef5fde8bab9d17c0b47137e014c91be888ee53

      SHA256

      a31805264b8b13ce4145f272cb2830728c186c46e314b48514d636866217add5

      SHA512

      2ce7c2a0833f581297c13dd88ccfcd36bf129d2b5d7718c52b1d67c97cbd8fc93abc085a040229a0fd712e880c690de7f6b996b0b47c46a091fabb7931be58d3

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      944B

      MD5

      5f0ddc7f3691c81ee14d17b419ba220d

      SHA1

      f0ef5fde8bab9d17c0b47137e014c91be888ee53

      SHA256

      a31805264b8b13ce4145f272cb2830728c186c46e314b48514d636866217add5

      SHA512

      2ce7c2a0833f581297c13dd88ccfcd36bf129d2b5d7718c52b1d67c97cbd8fc93abc085a040229a0fd712e880c690de7f6b996b0b47c46a091fabb7931be58d3

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      944B

      MD5

      61e06aa7c42c7b2a752516bcbb242cc1

      SHA1

      02c54f8b171ef48cad21819c20b360448418a068

      SHA256

      5bb0254e8f0220caab64dcc785f432820350471bfcdcb98240c3e0e71a709f5d

      SHA512

      03731f49999ec895370100a4dfeee674bbe5baa50d82007256e6914c323412eef8936b320d2738774758fbbfd76d4c3d391d9e144e65587eba700d98d0362346

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_sw3jsob4.aj2.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\yJJaNbGQb7.bat

      Filesize

      204B

      MD5

      1962c841b5336da4e6ccad90c8969681

      SHA1

      b187b7abfeec20f1ebcd48c5d084d85fed4c1e47

      SHA256

      16a9cee1150495739324632d185bb49980436c755f1f1e05acd8b5b112a32021

      SHA512

      fe57c55143a1dcb0245f0e206d339dfb09c35d32d44a08af134e69c13d71293796d0dc837f2d0e01c9a5720d02b4c145537b6470936603399f80179a784ea4ef

    • C:\Users\Default\AppData\Roaming\Microsoft\Windows\Templates\winlogon.exe

      Filesize

      1.1MB

      MD5

      691e32a08c7aed13db804a3977ca0527

      SHA1

      3be276230dfd039c9601d94f21b0cc2288ed3d19

      SHA256

      9f74e0c6ebac9ef1b82de82febc107be725fc0a9406cf97c54b2170fdfa9b3ae

      SHA512

      cc5a611641e5b775ae434a73b1fe0b53a117a421ac5ec0932a99b576093e5c0eed79ada57dab3795e4edb0623e788c4ff1e4bdc2091974e063d5f0310120fe6f

    • C:\Users\Default\AppData\Roaming\Microsoft\Windows\Templates\winlogon.exe

      Filesize

      1.1MB

      MD5

      691e32a08c7aed13db804a3977ca0527

      SHA1

      3be276230dfd039c9601d94f21b0cc2288ed3d19

      SHA256

      9f74e0c6ebac9ef1b82de82febc107be725fc0a9406cf97c54b2170fdfa9b3ae

      SHA512

      cc5a611641e5b775ae434a73b1fe0b53a117a421ac5ec0932a99b576093e5c0eed79ada57dab3795e4edb0623e788c4ff1e4bdc2091974e063d5f0310120fe6f

    • C:\Users\Default\Templates\winlogon.exe

      Filesize

      1.1MB

      MD5

      691e32a08c7aed13db804a3977ca0527

      SHA1

      3be276230dfd039c9601d94f21b0cc2288ed3d19

      SHA256

      9f74e0c6ebac9ef1b82de82febc107be725fc0a9406cf97c54b2170fdfa9b3ae

      SHA512

      cc5a611641e5b775ae434a73b1fe0b53a117a421ac5ec0932a99b576093e5c0eed79ada57dab3795e4edb0623e788c4ff1e4bdc2091974e063d5f0310120fe6f

    • C:\Users\Public\AccountPictures\backgroundTaskHost.exe

      Filesize

      1.1MB

      MD5

      756f5130e9970b15967cdcc1f6d7a1ff

      SHA1

      9e5fc8aef801dd84a9ad41a8f35361062990f99e

      SHA256

      f1570581136f3a07e9c39c37963e9bc07e44f38f3c4f566f58e267371cc67f81

      SHA512

      92b4e1268682c0894dd4ed218701319187c87c8978333b9fcfe583acbc72782b823a516e2f2e2add880f88cf57e366ae90aaeca928bf845455c244e14957dffa

    • memory/1532-211-0x0000017A2B4E0000-0x0000017A2B4F0000-memory.dmp

      Filesize

      64KB

    • memory/1532-206-0x0000017A2B4E0000-0x0000017A2B4F0000-memory.dmp

      Filesize

      64KB

    • memory/1532-205-0x00007FFA7E220000-0x00007FFA7ECE1000-memory.dmp

      Filesize

      10.8MB

    • memory/1532-339-0x0000017A2B4E0000-0x0000017A2B4F0000-memory.dmp

      Filesize

      64KB

    • memory/1532-352-0x0000017A2B4E0000-0x0000017A2B4F0000-memory.dmp

      Filesize

      64KB

    • memory/1604-346-0x000001E16C0A0000-0x000001E16C0B0000-memory.dmp

      Filesize

      64KB

    • memory/1604-342-0x000001E16C0A0000-0x000001E16C0B0000-memory.dmp

      Filesize

      64KB

    • memory/1604-356-0x000001E16C0A0000-0x000001E16C0B0000-memory.dmp

      Filesize

      64KB

    • memory/1604-345-0x00007FFA7E220000-0x00007FFA7ECE1000-memory.dmp

      Filesize

      10.8MB

    • memory/1604-347-0x000001E16C0A0000-0x000001E16C0B0000-memory.dmp

      Filesize

      64KB

    • memory/1772-337-0x0000026647C00000-0x0000026647C10000-memory.dmp

      Filesize

      64KB

    • memory/1772-225-0x0000026647C00000-0x0000026647C10000-memory.dmp

      Filesize

      64KB

    • memory/1772-215-0x0000026647C00000-0x0000026647C10000-memory.dmp

      Filesize

      64KB

    • memory/1772-207-0x00007FFA7E220000-0x00007FFA7ECE1000-memory.dmp

      Filesize

      10.8MB

    • memory/1772-353-0x0000026647C00000-0x0000026647C10000-memory.dmp

      Filesize

      64KB

    • memory/2980-340-0x00000263562B0000-0x00000263562C0000-memory.dmp

      Filesize

      64KB

    • memory/2980-332-0x00000263562B0000-0x00000263562C0000-memory.dmp

      Filesize

      64KB

    • memory/2980-344-0x00007FFA7E220000-0x00007FFA7ECE1000-memory.dmp

      Filesize

      10.8MB

    • memory/3288-350-0x0000018674E70000-0x0000018674E80000-memory.dmp

      Filesize

      64KB

    • memory/3288-376-0x00007FFA7E220000-0x00007FFA7ECE1000-memory.dmp

      Filesize

      10.8MB

    • memory/3288-208-0x0000018674830000-0x0000018674852000-memory.dmp

      Filesize

      136KB

    • memory/3288-343-0x00007FFA7E220000-0x00007FFA7ECE1000-memory.dmp

      Filesize

      10.8MB

    • memory/3288-203-0x0000018674E70000-0x0000018674E80000-memory.dmp

      Filesize

      64KB

    • memory/3568-328-0x00007FFA7E220000-0x00007FFA7ECE1000-memory.dmp

      Filesize

      10.8MB

    • memory/3568-331-0x00000214B6180000-0x00000214B6190000-memory.dmp

      Filesize

      64KB

    • memory/3820-1-0x00007FFA7E220000-0x00007FFA7ECE1000-memory.dmp

      Filesize

      10.8MB

    • memory/3820-5-0x0000000002B60000-0x0000000002B70000-memory.dmp

      Filesize

      64KB

    • memory/3820-204-0x00007FFA7E220000-0x00007FFA7ECE1000-memory.dmp

      Filesize

      10.8MB

    • memory/3820-8-0x0000000002BE0000-0x0000000002BEC000-memory.dmp

      Filesize

      48KB

    • memory/3820-6-0x0000000002BC0000-0x0000000002BCA000-memory.dmp

      Filesize

      40KB

    • memory/3820-36-0x000000001B680000-0x000000001B690000-memory.dmp

      Filesize

      64KB

    • memory/3820-3-0x0000000001290000-0x000000000129E000-memory.dmp

      Filesize

      56KB

    • memory/3820-2-0x000000001B680000-0x000000001B690000-memory.dmp

      Filesize

      64KB

    • memory/3820-35-0x00007FFA7E220000-0x00007FFA7ECE1000-memory.dmp

      Filesize

      10.8MB

    • memory/3820-7-0x0000000002BD0000-0x0000000002BDC000-memory.dmp

      Filesize

      48KB

    • memory/3820-0-0x0000000000860000-0x0000000000980000-memory.dmp

      Filesize

      1.1MB

    • memory/3820-4-0x00000000012A0000-0x00000000012A8000-memory.dmp

      Filesize

      32KB

    • memory/3912-357-0x0000026D490A0000-0x0000026D490B0000-memory.dmp

      Filesize

      64KB

    • memory/3912-338-0x0000026D490A0000-0x0000026D490B0000-memory.dmp

      Filesize

      64KB

    • memory/3912-326-0x00007FFA7E220000-0x00007FFA7ECE1000-memory.dmp

      Filesize

      10.8MB

    • memory/3912-327-0x0000026D490A0000-0x0000026D490B0000-memory.dmp

      Filesize

      64KB

    • memory/3996-349-0x000001F1DDC20000-0x000001F1DDC30000-memory.dmp

      Filesize

      64KB

    • memory/3996-200-0x00007FFA7E220000-0x00007FFA7ECE1000-memory.dmp

      Filesize

      10.8MB

    • memory/3996-202-0x000001F1DDC20000-0x000001F1DDC30000-memory.dmp

      Filesize

      64KB

    • memory/3996-201-0x000001F1DDC20000-0x000001F1DDC30000-memory.dmp

      Filesize

      64KB

    • memory/3996-367-0x00007FFA7E220000-0x00007FFA7ECE1000-memory.dmp

      Filesize

      10.8MB

    • memory/4088-336-0x0000021DBC2F0000-0x0000021DBC300000-memory.dmp

      Filesize

      64KB

    • memory/4088-303-0x0000021DBC2F0000-0x0000021DBC300000-memory.dmp

      Filesize

      64KB

    • memory/4088-290-0x00007FFA7E220000-0x00007FFA7ECE1000-memory.dmp

      Filesize

      10.8MB

    • memory/4088-358-0x0000021DBC2F0000-0x0000021DBC300000-memory.dmp

      Filesize

      64KB

    • memory/4240-341-0x0000016CA55B0000-0x0000016CA55C0000-memory.dmp

      Filesize

      64KB

    • memory/4240-354-0x0000016CA55B0000-0x0000016CA55C0000-memory.dmp

      Filesize

      64KB

    • memory/4240-329-0x00007FFA7E220000-0x00007FFA7ECE1000-memory.dmp

      Filesize

      10.8MB

    • memory/4240-330-0x0000016CA55B0000-0x0000016CA55C0000-memory.dmp

      Filesize

      64KB

    • memory/4316-325-0x00000149D9EC0000-0x00000149D9ED0000-memory.dmp

      Filesize

      64KB

    • memory/4316-324-0x00000149D9EC0000-0x00000149D9ED0000-memory.dmp

      Filesize

      64KB

    • memory/4316-323-0x00007FFA7E220000-0x00007FFA7ECE1000-memory.dmp

      Filesize

      10.8MB

    • memory/4316-355-0x00000149D9EC0000-0x00000149D9ED0000-memory.dmp

      Filesize

      64KB

    • memory/4456-334-0x000001CD47A50000-0x000001CD47A60000-memory.dmp

      Filesize

      64KB

    • memory/4456-351-0x000001CD47A50000-0x000001CD47A60000-memory.dmp

      Filesize

      64KB

    • memory/4456-361-0x00007FFA7E220000-0x00007FFA7ECE1000-memory.dmp

      Filesize

      10.8MB

    • memory/4456-335-0x000001CD47A50000-0x000001CD47A60000-memory.dmp

      Filesize

      64KB

    • memory/4456-348-0x000001CD47A50000-0x000001CD47A60000-memory.dmp

      Filesize

      64KB

    • memory/4456-333-0x00007FFA7E220000-0x00007FFA7ECE1000-memory.dmp

      Filesize

      10.8MB