Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

25/01/2024, 16:55 UTC

240125-vfcyksbhgr 10

24/01/2024, 17:15 UTC

240124-vstf4aecaj 10

23/01/2024, 19:27 UTC

240123-x6cfvagbd9 10

23/01/2024, 19:27 UTC

240123-x6bvbafgem 10

23/01/2024, 19:27 UTC

240123-x6bjjsgbd8 10

23/01/2024, 19:27 UTC

240123-x6ax1sfgek 10

23/01/2024, 19:27 UTC

240123-x6abgsfgej 10

23/01/2024, 19:27 UTC

240123-x591qagbd7 10

23/01/2024, 19:27 UTC

240123-x59d7agbd6 10

23/01/2024, 19:27 UTC

240123-x584esgbd5 10

Analysis

  • max time kernel
    1799s
  • max time network
    1800s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/01/2024, 19:27 UTC

General

  • Target

    grhsghsGHswgh/Be5sCbvuma2nkHDa.exe

  • Size

    2.0MB

  • MD5

    a16a669a09bf158058b83e04e69fe38e

  • SHA1

    f6c94763850d9e590d86057139e8895a7aacdeea

  • SHA256

    cacc0261ccf7578ef5c1f9fdbe35705ad91070d020a4225e05cbf71a6103ac8e

  • SHA512

    658b52ad1d27becee5b5bbd443d43da38b88d49880e72c8cb843f176a2d84d571b39c34dbc7cfb7ea56acc548acc5b68cce47a8bcf9d173feec031f7e33a09c6

  • SSDEEP

    49152:rWVipAxqo5p88CbXuxWQiSJU320ZW21Q0YWAij64ane6szjmL/45:rxAEcp9ueXit9WAQ0YWuO

Score
10/10

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 10 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 30 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 31 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 3 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Detects videocard installed 1 TTPs 1 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3424
      • C:\Users\Admin\AppData\Local\Temp\grhsghsGHswgh\Be5sCbvuma2nkHDa.exe
        "C:\Users\Admin\AppData\Local\Temp\grhsghsGHswgh\Be5sCbvuma2nkHDa.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        PID:3080
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2324
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#wokgfo#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GoogleUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Google\Chrome\updater.exe' }
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2432
      • C:\Windows\System32\cmd.exe
        C:\Windows\System32\cmd.exe /c choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\grhsghsGHswgh\Be5sCbvuma2nkHDa.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4688
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#glbtb#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { schtasks /run /tn "GoogleUpdateTaskMachineQC" } Else { "C:\Program Files\Google\Chrome\updater.exe" }
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4388
        • C:\Windows\system32\schtasks.exe
          "C:\Windows\system32\schtasks.exe" /run /tn GoogleUpdateTaskMachineQC
          3⤵
            PID:3044
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
          2⤵
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          PID:944
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#wokgfo#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GoogleUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Google\Chrome\updater.exe' }
          2⤵
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          PID:2360
        • C:\Windows\System32\conhost.exe
          C:\Windows\System32\conhost.exe coygkprqxpklmnvz 6E3sjfZq2rJQaxvLPmXgsF7vH8nKLC0ur3jCwye3fPooFst8AJlNjZc1TvSyIQTKz3bkbADxizSwgp6IHJKg4enmph7iNmIeAYcJJRGkawcinVbrMdr45fHmW9ZqCrw3dSLKVMKzrI2u4sgGlTj0G1RmIYUpqYq+tIjGyNap0si+Bl1xh/1o3aGmtmdST7PlUgkYz6ci8qWCk/Icfx3DrSi2oQaBV3Dr68Ysn/4ifK09AI9K4Wz/J2kKABX44SMSz/klz2Q+FtxUOLuLpB0ApMJVvTxUIOnUHLATPgLq86uJLXtnMRoz90CklrR3X6ggj+Qodet1aWyPnFIog0clkH9Lt1wIn/XNs6NZ/3bJg2NyJ2xuvDRy+oOBgUebKWiz
          2⤵
            PID:4816
          • C:\Windows\System32\cmd.exe
            C:\Windows\System32\cmd.exe /c wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Program Files\Google\Libs\g.log"
            2⤵
            • Drops file in Program Files directory
            PID:3056
          • C:\Windows\System32\cmd.exe
            C:\Windows\System32\cmd.exe /c wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Program Files\Google\Libs\g.log"
            2⤵
            • Drops file in Program Files directory
            • Suspicious use of WriteProcessMemory
            PID:4616
          • C:\Windows\System32\conhost.exe
            C:\Windows\System32\conhost.exe qtdiqnkejoz
            2⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Suspicious behavior: EnumeratesProcesses
            PID:2544
        • C:\Windows\System32\choice.exe
          choice /C Y /N /D Y /T 3
          1⤵
            PID:3252
          • C:\Program Files\Google\Chrome\updater.exe
            "C:\Program Files\Google\Chrome\updater.exe"
            1⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Drops file in Program Files directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1008
          • C:\Windows\System32\Wbem\WMIC.exe
            wmic PATH Win32_VideoController GET Name, VideoProcessor
            1⤵
            • Detects videocard installed
            PID:1068

          Network

          • flag-us
            DNS
            217.106.137.52.in-addr.arpa
            Remote address:
            8.8.8.8:53
            Request
            217.106.137.52.in-addr.arpa
            IN PTR
            Response
          • flag-us
            DNS
            173.178.17.96.in-addr.arpa
            Remote address:
            8.8.8.8:53
            Request
            173.178.17.96.in-addr.arpa
            IN PTR
            Response
            173.178.17.96.in-addr.arpa
            IN PTR
            a96-17-178-173deploystaticakamaitechnologiescom
          • flag-us
            DNS
            20.160.190.20.in-addr.arpa
            Remote address:
            8.8.8.8:53
            Request
            20.160.190.20.in-addr.arpa
            IN PTR
            Response
          • flag-us
            DNS
            95.221.229.192.in-addr.arpa
            Remote address:
            8.8.8.8:53
            Request
            95.221.229.192.in-addr.arpa
            IN PTR
            Response
          • flag-us
            DNS
            183.142.211.20.in-addr.arpa
            Remote address:
            8.8.8.8:53
            Request
            183.142.211.20.in-addr.arpa
            IN PTR
            Response
          • flag-us
            DNS
            157.123.68.40.in-addr.arpa
            Remote address:
            8.8.8.8:53
            Request
            157.123.68.40.in-addr.arpa
            IN PTR
            Response
          • flag-us
            DNS
            56.126.166.20.in-addr.arpa
            Remote address:
            8.8.8.8:53
            Request
            56.126.166.20.in-addr.arpa
            IN PTR
            Response
          • flag-us
            DNS
            18.134.221.88.in-addr.arpa
            Remote address:
            8.8.8.8:53
            Request
            18.134.221.88.in-addr.arpa
            IN PTR
            Response
            18.134.221.88.in-addr.arpa
            IN PTR
            a88-221-134-18deploystaticakamaitechnologiescom
          • flag-us
            DNS
            pool.hashvault.pro
            conhost.exe
            Remote address:
            8.8.8.8:53
            Request
            pool.hashvault.pro
            IN A
            Response
            pool.hashvault.pro
            IN A
            95.179.241.203
            pool.hashvault.pro
            IN A
            45.76.89.70
          • flag-us
            DNS
            0.205.248.87.in-addr.arpa
            conhost.exe
            Remote address:
            8.8.8.8:53
            Request
            0.205.248.87.in-addr.arpa
            IN PTR
            Response
            0.205.248.87.in-addr.arpa
            IN PTR
            https-87-248-205-0lgwllnwnet
          • flag-us
            DNS
            70.89.76.45.in-addr.arpa
            Remote address:
            8.8.8.8:53
            Request
            70.89.76.45.in-addr.arpa
            IN PTR
            Response
            70.89.76.45.in-addr.arpa
            IN PTR
            45768970vultrusercontentcom
          • flag-us
            DNS
            8.173.189.20.in-addr.arpa
            Remote address:
            8.8.8.8:53
            Request
            8.173.189.20.in-addr.arpa
            IN PTR
            Response
          • flag-us
            DNS
            50.23.12.20.in-addr.arpa
            Remote address:
            8.8.8.8:53
            Request
            50.23.12.20.in-addr.arpa
            IN PTR
            Response
          • flag-us
            DNS
            0.159.190.20.in-addr.arpa
            Remote address:
            8.8.8.8:53
            Request
            0.159.190.20.in-addr.arpa
            IN PTR
            Response
          • flag-us
            DNS
            241.154.82.20.in-addr.arpa
            Remote address:
            8.8.8.8:53
            Request
            241.154.82.20.in-addr.arpa
            IN PTR
            Response
          • flag-us
            DNS
            41.110.16.96.in-addr.arpa
            Remote address:
            8.8.8.8:53
            Request
            41.110.16.96.in-addr.arpa
            IN PTR
            Response
            41.110.16.96.in-addr.arpa
            IN PTR
            a96-16-110-41deploystaticakamaitechnologiescom
          • flag-us
            DNS
            206.23.85.13.in-addr.arpa
            Remote address:
            8.8.8.8:53
            Request
            206.23.85.13.in-addr.arpa
            IN PTR
            Response
          • flag-us
            DNS
            104.241.123.92.in-addr.arpa
            Remote address:
            8.8.8.8:53
            Request
            104.241.123.92.in-addr.arpa
            IN PTR
            Response
            104.241.123.92.in-addr.arpa
            IN PTR
            a92-123-241-104deploystaticakamaitechnologiescom
          • flag-us
            DNS
            119.110.54.20.in-addr.arpa
            Remote address:
            8.8.8.8:53
            Request
            119.110.54.20.in-addr.arpa
            IN PTR
            Response
          • flag-us
            DNS
            217.135.221.88.in-addr.arpa
            Remote address:
            8.8.8.8:53
            Request
            217.135.221.88.in-addr.arpa
            IN PTR
            Response
            217.135.221.88.in-addr.arpa
            IN PTR
            a88-221-135-217deploystaticakamaitechnologiescom
          • flag-us
            DNS
            217.135.221.88.in-addr.arpa
            Remote address:
            8.8.8.8:53
            Request
            217.135.221.88.in-addr.arpa
            IN PTR
            Response
            217.135.221.88.in-addr.arpa
            IN PTR
            a88-221-135-217deploystaticakamaitechnologiescom
          • flag-us
            DNS
            176.178.17.96.in-addr.arpa
            Remote address:
            8.8.8.8:53
            Request
            176.178.17.96.in-addr.arpa
            IN PTR
            Response
            176.178.17.96.in-addr.arpa
            IN PTR
            a96-17-178-176deploystaticakamaitechnologiescom
          • flag-us
            DNS
            176.178.17.96.in-addr.arpa
            Remote address:
            8.8.8.8:53
            Request
            176.178.17.96.in-addr.arpa
            IN PTR
            Response
            176.178.17.96.in-addr.arpa
            IN PTR
            a96-17-178-176deploystaticakamaitechnologiescom
          • flag-us
            DNS
            32.134.221.88.in-addr.arpa
            Remote address:
            8.8.8.8:53
            Request
            32.134.221.88.in-addr.arpa
            IN PTR
            Response
            32.134.221.88.in-addr.arpa
            IN PTR
            a88-221-134-32deploystaticakamaitechnologiescom
          • flag-us
            DNS
            32.134.221.88.in-addr.arpa
            Remote address:
            8.8.8.8:53
            Request
            32.134.221.88.in-addr.arpa
            IN PTR
            Response
            32.134.221.88.in-addr.arpa
            IN PTR
            a88-221-134-32deploystaticakamaitechnologiescom
          • flag-us
            DNS
            174.178.17.96.in-addr.arpa
            Remote address:
            8.8.8.8:53
            Request
            174.178.17.96.in-addr.arpa
            IN PTR
            Response
            174.178.17.96.in-addr.arpa
            IN PTR
            a96-17-178-174deploystaticakamaitechnologiescom
          • flag-us
            DNS
            174.178.17.96.in-addr.arpa
            Remote address:
            8.8.8.8:53
            Request
            174.178.17.96.in-addr.arpa
            IN PTR
            Response
            174.178.17.96.in-addr.arpa
            IN PTR
            a96-17-178-174deploystaticakamaitechnologiescom
          • 45.76.89.70:3333
            pool.hashvault.pro
            tls
            conhost.exe
            24.3kB
            61.8kB
            205
            158
          • 8.8.8.8:53
            217.106.137.52.in-addr.arpa
            dns
            73 B
            147 B
            1
            1

            DNS Request

            217.106.137.52.in-addr.arpa

          • 8.8.8.8:53
            173.178.17.96.in-addr.arpa
            dns
            72 B
            137 B
            1
            1

            DNS Request

            173.178.17.96.in-addr.arpa

          • 8.8.8.8:53
            20.160.190.20.in-addr.arpa
            dns
            72 B
            158 B
            1
            1

            DNS Request

            20.160.190.20.in-addr.arpa

          • 8.8.8.8:53
            95.221.229.192.in-addr.arpa
            dns
            73 B
            144 B
            1
            1

            DNS Request

            95.221.229.192.in-addr.arpa

          • 8.8.8.8:53
            183.142.211.20.in-addr.arpa
            dns
            73 B
            159 B
            1
            1

            DNS Request

            183.142.211.20.in-addr.arpa

          • 8.8.8.8:53
            157.123.68.40.in-addr.arpa
            dns
            72 B
            146 B
            1
            1

            DNS Request

            157.123.68.40.in-addr.arpa

          • 8.8.8.8:53
            56.126.166.20.in-addr.arpa
            dns
            72 B
            158 B
            1
            1

            DNS Request

            56.126.166.20.in-addr.arpa

          • 8.8.8.8:53
            18.134.221.88.in-addr.arpa
            dns
            72 B
            137 B
            1
            1

            DNS Request

            18.134.221.88.in-addr.arpa

          • 8.8.8.8:53
            pool.hashvault.pro
            dns
            conhost.exe
            135 B
            212 B
            2
            2

            DNS Request

            pool.hashvault.pro

            DNS Response

            95.179.241.203
            45.76.89.70

            DNS Request

            0.205.248.87.in-addr.arpa

          • 8.8.8.8:53
            70.89.76.45.in-addr.arpa
            dns
            70 B
            116 B
            1
            1

            DNS Request

            70.89.76.45.in-addr.arpa

          • 8.8.8.8:53
            8.173.189.20.in-addr.arpa
            dns
            71 B
            157 B
            1
            1

            DNS Request

            8.173.189.20.in-addr.arpa

          • 8.8.8.8:53
            50.23.12.20.in-addr.arpa
            dns
            70 B
            156 B
            1
            1

            DNS Request

            50.23.12.20.in-addr.arpa

          • 8.8.8.8:53
            0.159.190.20.in-addr.arpa
            dns
            71 B
            157 B
            1
            1

            DNS Request

            0.159.190.20.in-addr.arpa

          • 8.8.8.8:53
            241.154.82.20.in-addr.arpa
            dns
            72 B
            158 B
            1
            1

            DNS Request

            241.154.82.20.in-addr.arpa

          • 8.8.8.8:53
            41.110.16.96.in-addr.arpa
            dns
            71 B
            135 B
            1
            1

            DNS Request

            41.110.16.96.in-addr.arpa

          • 8.8.8.8:53
            206.23.85.13.in-addr.arpa
            dns
            71 B
            145 B
            1
            1

            DNS Request

            206.23.85.13.in-addr.arpa

          • 8.8.8.8:53
            104.241.123.92.in-addr.arpa
            dns
            73 B
            139 B
            1
            1

            DNS Request

            104.241.123.92.in-addr.arpa

          • 8.8.8.8:53
            119.110.54.20.in-addr.arpa
            dns
            72 B
            158 B
            1
            1

            DNS Request

            119.110.54.20.in-addr.arpa

          • 8.8.8.8:53
            217.135.221.88.in-addr.arpa
            dns
            146 B
            278 B
            2
            2

            DNS Request

            217.135.221.88.in-addr.arpa

            DNS Request

            217.135.221.88.in-addr.arpa

          • 8.8.8.8:53
            176.178.17.96.in-addr.arpa
            dns
            144 B
            274 B
            2
            2

            DNS Request

            176.178.17.96.in-addr.arpa

            DNS Request

            176.178.17.96.in-addr.arpa

          • 8.8.8.8:53
            32.134.221.88.in-addr.arpa
            dns
            144 B
            274 B
            2
            2

            DNS Request

            32.134.221.88.in-addr.arpa

            DNS Request

            32.134.221.88.in-addr.arpa

          • 8.8.8.8:53
            174.178.17.96.in-addr.arpa
            dns
            144 B
            274 B
            2
            2

            DNS Request

            174.178.17.96.in-addr.arpa

            DNS Request

            174.178.17.96.in-addr.arpa

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files\Google\Chrome\updater.exe

            Filesize

            906KB

            MD5

            b0706e4a1d42857980aa9f6eded72e7b

            SHA1

            9ec358fb34b70a2d03b844bdb515a20c76a2cb86

            SHA256

            4035b12233ceec87200f04f4b4f6401e84dea363c394fe11a7a6de52626bf1a5

            SHA512

            83516cf1163d01769cd98fdb06535e77a100f473e4b6eeb92fa66837d0ec0123f1a461e38ef8f79894358651a4e6a5c4b0f84b6f3e1c9167aee36c49035b6778

          • C:\Program Files\Google\Chrome\updater.exe

            Filesize

            220KB

            MD5

            e34a9307109f906f6e28c4c3a0865a02

            SHA1

            35189a3b928bb11ee6b0b65802fee58936d881c8

            SHA256

            ff28ea66cc632447011476b9031fae0f717493b306d7b8b05fa46af0018311a5

            SHA512

            0506fe296d8d11a1a99827f53845005cdc1ec3ee436eaa60870e905f7c5f9cd32fc9af893a385f61bb8452c0f8e059e87d80361b2cbc4e7fef49e7e0b903a61f

          • C:\Program Files\Google\Libs\g.log

            Filesize

            226B

            MD5

            fdba80d4081c28c65e32fff246dc46cb

            SHA1

            74f809dedd1fc46a3a63ac9904c80f0b817b3686

            SHA256

            b9a385645ec2edddbc88b01e6b21362c14e9d7895712e67d375874eb7308e398

            SHA512

            b24a6784443c85bb56f8ae401ad4553c0955f587671ec7960bda737901d677d5e15d1a47d3674505fc98ea09ede2e5078a0aeb4481d3728e6715f3eac557cd29

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

            Filesize

            2KB

            MD5

            d85ba6ff808d9e5444a4b369f5bc2730

            SHA1

            31aa9d96590fff6981b315e0b391b575e4c0804a

            SHA256

            84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

            SHA512

            8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            Filesize

            944B

            MD5

            6d3e9c29fe44e90aae6ed30ccf799ca8

            SHA1

            c7974ef72264bbdf13a2793ccf1aed11bc565dce

            SHA256

            2360634e63e8f0b5748e2c56ebb8f4aa78e71008ea7b5c9ca1c49be03b49557d

            SHA512

            60c38c4367352537545d859f64b9c5cbada94240478d1d039fd27b5ecba4dc1c90051557c16d802269703b873546ead416279c0a80c6fd5e49ad361cef22596a

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            Filesize

            1KB

            MD5

            7140ccf74fcbd9163b3c532a69f5ff6e

            SHA1

            57bc8d30e61acbda9dcde9d9434f559c9d38aac3

            SHA256

            c32be57fa8e9807007fa8bf35a630b893a4699e5251dbc179310b5a5640085b6

            SHA512

            292be07038e4f6c0151b6d2bdb6471abb96098dbd8eb97fff59608cb1b0a06c952727847227b0248113f7f93ed6aaca59f6727e222269ec20b6933eeaa7281df

          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_4aeyi44t.ad3.ps1

            Filesize

            60B

            MD5

            d17fe0a3f47be24a6453e9ef58c94641

            SHA1

            6ab83620379fc69f80c0242105ddffd7d98d5d9d

            SHA256

            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

            SHA512

            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

          • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

            Filesize

            4KB

            MD5

            b5907d83332d76b848c110c959b879a7

            SHA1

            c9fcd89ff45eb7fd0c78dff6253b465e5cd9ac2f

            SHA256

            45ee92d3d38083b6403cb0a51316f21ed7376f6e1adb319620e9900a5ce38de3

            SHA512

            850c71c07670003864c00e7041ee6dba2140f02914e7965797959570d8e6bd3c9cc299f26082295372da1ccb40e5e6111d177e8f628d7bd5930093ba317009ca

          • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            Filesize

            1KB

            MD5

            f86cfe47fea63e5e62be4d5adfb27a97

            SHA1

            04dd13cce17e479b56cdbaf7e3d0867468085cfd

            SHA256

            8f478e740be48375bcdabf34ae4561375129b28957172e6883e8ceb13ef0b1ad

            SHA512

            60687e78ac1346c968ed00a2a7e68e72d489d5a218e810b4c21fcf23fd3680ff4f21410868568ce888448d50b897646043d9879a1a3179df3f4b9db80b02880c

          • memory/944-59-0x00007FF836220000-0x00007FF836CE1000-memory.dmp

            Filesize

            10.8MB

          • memory/944-77-0x0000028B4ABB0000-0x0000028B4ABCA000-memory.dmp

            Filesize

            104KB

          • memory/944-78-0x0000028B4AB60000-0x0000028B4AB68000-memory.dmp

            Filesize

            32KB

          • memory/944-81-0x0000028B48510000-0x0000028B48520000-memory.dmp

            Filesize

            64KB

          • memory/944-84-0x00007FF836220000-0x00007FF836CE1000-memory.dmp

            Filesize

            10.8MB

          • memory/944-79-0x0000028B4AB90000-0x0000028B4AB96000-memory.dmp

            Filesize

            24KB

          • memory/944-80-0x0000028B4ABA0000-0x0000028B4ABAA000-memory.dmp

            Filesize

            40KB

          • memory/944-76-0x0000028B4AB50000-0x0000028B4AB5A000-memory.dmp

            Filesize

            40KB

          • memory/944-71-0x0000028B4A930000-0x0000028B4A94C000-memory.dmp

            Filesize

            112KB

          • memory/944-75-0x0000028B4AB70000-0x0000028B4AB8C000-memory.dmp

            Filesize

            112KB

          • memory/944-61-0x0000028B48510000-0x0000028B48520000-memory.dmp

            Filesize

            64KB

          • memory/944-60-0x0000028B48510000-0x0000028B48520000-memory.dmp

            Filesize

            64KB

          • memory/944-74-0x0000028B4A6E0000-0x0000028B4A6EA000-memory.dmp

            Filesize

            40KB

          • memory/944-73-0x0000028B4A950000-0x0000028B4AA05000-memory.dmp

            Filesize

            724KB

          • memory/944-72-0x0000028B48510000-0x0000028B48520000-memory.dmp

            Filesize

            64KB

          • memory/1008-49-0x00007FF79C4B0000-0x00007FF79C6C1000-memory.dmp

            Filesize

            2.1MB

          • memory/1008-119-0x00007FF79C4B0000-0x00007FF79C6C1000-memory.dmp

            Filesize

            2.1MB

          • memory/2324-12-0x0000029473370000-0x0000029473380000-memory.dmp

            Filesize

            64KB

          • memory/2324-16-0x00007FF836220000-0x00007FF836CE1000-memory.dmp

            Filesize

            10.8MB

          • memory/2324-3-0x00000294753F0000-0x0000029475412000-memory.dmp

            Filesize

            136KB

          • memory/2324-11-0x00007FF836220000-0x00007FF836CE1000-memory.dmp

            Filesize

            10.8MB

          • memory/2324-13-0x0000029473370000-0x0000029473380000-memory.dmp

            Filesize

            64KB

          • memory/2360-96-0x00007FF836220000-0x00007FF836CE1000-memory.dmp

            Filesize

            10.8MB

          • memory/2360-109-0x0000025F73BE0000-0x0000025F73BF0000-memory.dmp

            Filesize

            64KB

          • memory/2360-112-0x00007FF836220000-0x00007FF836CE1000-memory.dmp

            Filesize

            10.8MB

          • memory/2360-98-0x0000025F73BE0000-0x0000025F73BF0000-memory.dmp

            Filesize

            64KB

          • memory/2360-97-0x0000025F73BE0000-0x0000025F73BF0000-memory.dmp

            Filesize

            64KB

          • memory/2360-110-0x0000025F73BE0000-0x0000025F73BF0000-memory.dmp

            Filesize

            64KB

          • memory/2360-108-0x0000025F76470000-0x0000025F76525000-memory.dmp

            Filesize

            724KB

          • memory/2432-31-0x00007FF836220000-0x00007FF836CE1000-memory.dmp

            Filesize

            10.8MB

          • memory/2432-28-0x00007FF836220000-0x00007FF836CE1000-memory.dmp

            Filesize

            10.8MB

          • memory/2432-29-0x000002432C500000-0x000002432C510000-memory.dmp

            Filesize

            64KB

          • memory/2544-123-0x00007FF664F50000-0x00007FF664F66000-memory.dmp

            Filesize

            88KB

          • memory/2544-130-0x00007FF664F50000-0x00007FF664F66000-memory.dmp

            Filesize

            88KB

          • memory/3080-33-0x00007FF6E2E30000-0x00007FF6E3041000-memory.dmp

            Filesize

            2.1MB

          • memory/3080-0-0x00007FF6E2E30000-0x00007FF6E3041000-memory.dmp

            Filesize

            2.1MB

          • memory/4388-34-0x00007FF836220000-0x00007FF836CE1000-memory.dmp

            Filesize

            10.8MB

          • memory/4388-35-0x000001A96F480000-0x000001A96F490000-memory.dmp

            Filesize

            64KB

          • memory/4388-48-0x00007FF836220000-0x00007FF836CE1000-memory.dmp

            Filesize

            10.8MB

          • memory/4816-131-0x00007FF6BF540000-0x00007FF6BFD34000-memory.dmp

            Filesize

            8.0MB

          • memory/4816-122-0x000001C0ED800000-0x000001C0ED820000-memory.dmp

            Filesize

            128KB

          • memory/4816-124-0x00007FF6BF540000-0x00007FF6BFD34000-memory.dmp

            Filesize

            8.0MB

          • memory/4816-125-0x000001C0ED820000-0x000001C0ED840000-memory.dmp

            Filesize

            128KB

          • memory/4816-126-0x000001C0ED840000-0x000001C0ED860000-memory.dmp

            Filesize

            128KB

          • memory/4816-128-0x00007FF6BF540000-0x00007FF6BFD34000-memory.dmp

            Filesize

            8.0MB

          • memory/4816-129-0x00007FF6BF540000-0x00007FF6BFD34000-memory.dmp

            Filesize

            8.0MB

          • memory/4816-139-0x00007FF6BF540000-0x00007FF6BFD34000-memory.dmp

            Filesize

            8.0MB

          • memory/4816-120-0x00007FF6BF540000-0x00007FF6BFD34000-memory.dmp

            Filesize

            8.0MB

          • memory/4816-132-0x000001C0ED820000-0x000001C0ED840000-memory.dmp

            Filesize

            128KB

          • memory/4816-134-0x000001C0ED840000-0x000001C0ED860000-memory.dmp

            Filesize

            128KB

          • memory/4816-135-0x00007FF6BF540000-0x00007FF6BFD34000-memory.dmp

            Filesize

            8.0MB

          • memory/4816-137-0x00007FF6BF540000-0x00007FF6BFD34000-memory.dmp

            Filesize

            8.0MB

          • memory/4816-121-0x000001C0DD210000-0x000001C0DD230000-memory.dmp

            Filesize

            128KB

          • memory/4816-141-0x00007FF6BF540000-0x00007FF6BFD34000-memory.dmp

            Filesize

            8.0MB

          • memory/4816-143-0x00007FF6BF540000-0x00007FF6BFD34000-memory.dmp

            Filesize

            8.0MB

          • memory/4816-145-0x00007FF6BF540000-0x00007FF6BFD34000-memory.dmp

            Filesize

            8.0MB

          • memory/4816-147-0x00007FF6BF540000-0x00007FF6BFD34000-memory.dmp

            Filesize

            8.0MB

          • memory/4816-149-0x00007FF6BF540000-0x00007FF6BFD34000-memory.dmp

            Filesize

            8.0MB

          • memory/4816-151-0x00007FF6BF540000-0x00007FF6BFD34000-memory.dmp

            Filesize

            8.0MB

          • memory/4816-153-0x00007FF6BF540000-0x00007FF6BFD34000-memory.dmp

            Filesize

            8.0MB

          • memory/4816-155-0x00007FF6BF540000-0x00007FF6BFD34000-memory.dmp

            Filesize

            8.0MB

          • memory/4816-157-0x00007FF6BF540000-0x00007FF6BFD34000-memory.dmp

            Filesize

            8.0MB

          • memory/4816-159-0x00007FF6BF540000-0x00007FF6BFD34000-memory.dmp

            Filesize

            8.0MB

          • memory/4816-161-0x00007FF6BF540000-0x00007FF6BFD34000-memory.dmp

            Filesize

            8.0MB

          • memory/4816-163-0x00007FF6BF540000-0x00007FF6BFD34000-memory.dmp

            Filesize

            8.0MB

          • memory/4816-165-0x00007FF6BF540000-0x00007FF6BFD34000-memory.dmp

            Filesize

            8.0MB

          • memory/4816-167-0x00007FF6BF540000-0x00007FF6BFD34000-memory.dmp

            Filesize

            8.0MB

          • memory/4816-169-0x00007FF6BF540000-0x00007FF6BFD34000-memory.dmp

            Filesize

            8.0MB

          • memory/4816-171-0x00007FF6BF540000-0x00007FF6BFD34000-memory.dmp

            Filesize

            8.0MB

          • memory/4816-173-0x00007FF6BF540000-0x00007FF6BFD34000-memory.dmp

            Filesize

            8.0MB

          • memory/4816-175-0x00007FF6BF540000-0x00007FF6BFD34000-memory.dmp

            Filesize

            8.0MB

          • memory/4816-177-0x00007FF6BF540000-0x00007FF6BFD34000-memory.dmp

            Filesize

            8.0MB

          • memory/4816-179-0x00007FF6BF540000-0x00007FF6BFD34000-memory.dmp

            Filesize

            8.0MB

          • memory/4816-181-0x00007FF6BF540000-0x00007FF6BFD34000-memory.dmp

            Filesize

            8.0MB

          • memory/4816-183-0x00007FF6BF540000-0x00007FF6BFD34000-memory.dmp

            Filesize

            8.0MB

          • memory/4816-185-0x00007FF6BF540000-0x00007FF6BFD34000-memory.dmp

            Filesize

            8.0MB

          We care about your privacy.

          This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.