Analysis Overview
SHA256
86994d3f5bfd356c14040ffc3226e7d01dbf5fb77f7e982126d67263e76b566e
Threat Level: Known bad
The file 61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.zip was found to be: Known bad.
Malicious Activity Summary
Lokibot
Checks computer location settings
Reads user/profile data of web browsers
Accesses Microsoft Outlook profiles
Suspicious use of SetThreadContext
Enumerates physical storage devices
Unsigned PE
Suspicious use of AdjustPrivilegeToken
outlook_win_path
outlook_office_path
Suspicious use of WriteProcessMemory
Suspicious behavior: RenamesItself
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-04-02 10:02
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-04-02 10:02
Reported
2024-04-02 10:05
Platform
win7-20240221-en
Max time kernel
135s
Max time network
136s
Command Line
Signatures
Lokibot
Reads user/profile data of web browsers
Accesses Microsoft Outlook profiles
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook | C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe | N/A |
| Key opened | \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook | C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe | N/A |
| Key opened | \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook | C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 2740 set thread context of 2604 | N/A | C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe | C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe |
Enumerates physical storage devices
Creates scheduled task(s)
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: RenamesItself
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe | N/A |
Suspicious use of WriteProcessMemory
outlook_office_path
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook | C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe | N/A |
outlook_win_path
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook | C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe
"C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe"
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe"
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\ciGjbEVbQeulG.exe"
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ciGjbEVbQeulG" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3F22.tmp"
C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe
"C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe"
C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe
"C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | sempersim.su | udp |
| US | 104.237.252.28:80 | sempersim.su | tcp |
| US | 104.237.252.28:80 | sempersim.su | tcp |
| US | 104.237.252.28:80 | sempersim.su | tcp |
| US | 8.8.8.8:53 | good.w0ln44.dnslog.cn | udp |
| US | 8.8.8.8:53 | good.w0ln44.dnslog.cn | udp |
| US | 104.237.252.28:80 | sempersim.su | tcp |
| N/A | 127.0.0.1:443 | tcp | |
| US | 104.237.252.28:80 | sempersim.su | tcp |
Files
memory/2740-0-0x0000000000CB0000-0x0000000000D30000-memory.dmp
memory/2740-1-0x0000000074B00000-0x00000000751EE000-memory.dmp
memory/2740-2-0x0000000004280000-0x00000000042C0000-memory.dmp
memory/2740-3-0x00000000005B0000-0x00000000005C4000-memory.dmp
memory/2740-5-0x00000000005F0000-0x00000000005FE000-memory.dmp
memory/2740-4-0x00000000005E0000-0x00000000005EA000-memory.dmp
memory/2740-6-0x0000000000C50000-0x0000000000CB2000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\tmp3F22.tmp
| MD5 | a974d21a411997b59bcaaef0a096352f |
| SHA1 | 0fc8aaf4d057c37ed278679d44de056ee661fb61 |
| SHA256 | 4e9992eb44f001c2c10ca5abd20ce6cc94b51dcb8be6bf567a9a387015a9c638 |
| SHA512 | fd7c1c4309606a86347a627cbece0969a7e9c863f5531dacc393b377e7e1585028530407354f2bc299bc7422111bb37ee6c43719596b70e79ab0167a9f1f95fe |
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
| MD5 | 07ce002e871f8ea878cb36f13fe3a272 |
| SHA1 | f34255f6c9d911cca202b5c234ddfcdbe2d4676d |
| SHA256 | 82c99612720f6b5db2782055ac48a14a5399562f817fa0aa5d7b76455800fcd3 |
| SHA512 | eb019c4bf24c0de5642dba59a32bdbf721dbeeccb037bab7da09f85c1ae10bac21f165b7a0e9540ef764def020821d406004fbb36e220b2fb9ce6d833e3d0016 |
memory/2604-21-0x0000000000400000-0x00000000004A2000-memory.dmp
memory/2604-33-0x0000000000400000-0x00000000004A2000-memory.dmp
memory/2740-34-0x0000000074B00000-0x00000000751EE000-memory.dmp
memory/2604-31-0x0000000000400000-0x00000000004A2000-memory.dmp
memory/2604-29-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
memory/2272-36-0x000000006F360000-0x000000006F90B000-memory.dmp
memory/2632-35-0x000000006F360000-0x000000006F90B000-memory.dmp
memory/2632-38-0x0000000002B70000-0x0000000002BB0000-memory.dmp
memory/2272-39-0x000000006F360000-0x000000006F90B000-memory.dmp
memory/2272-37-0x0000000002640000-0x0000000002680000-memory.dmp
memory/2604-27-0x0000000000400000-0x00000000004A2000-memory.dmp
memory/2632-40-0x000000006F360000-0x000000006F90B000-memory.dmp
memory/2632-44-0x0000000002B70000-0x0000000002BB0000-memory.dmp
memory/2604-43-0x0000000000400000-0x00000000004A2000-memory.dmp
memory/2632-42-0x0000000002B70000-0x0000000002BB0000-memory.dmp
memory/2272-41-0x0000000002640000-0x0000000002680000-memory.dmp
memory/2604-25-0x0000000000400000-0x00000000004A2000-memory.dmp
memory/2604-23-0x0000000000400000-0x00000000004A2000-memory.dmp
memory/2604-19-0x0000000000400000-0x00000000004A2000-memory.dmp
memory/2632-45-0x000000006F360000-0x000000006F90B000-memory.dmp
memory/2272-46-0x000000006F360000-0x000000006F90B000-memory.dmp
memory/2604-50-0x0000000000400000-0x00000000004A2000-memory.dmp
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3452737119-3959686427-228443150-1000\0f5007522459c86e95ffcc62f32308f1_ad04ce47-83ca-4cca-a79e-77cdc80ce41e
| MD5 | c07225d4e7d01d31042965f048728a0a |
| SHA1 | 69d70b340fd9f44c89adb9a2278df84faa9906b7 |
| SHA256 | 8c136c7ae08020ad16fd1928e36ad335ddef8b85906d66b712fff049aa57dc9a |
| SHA512 | 23d3cea738e1abf561320847c39dadc8b5794d7bd8761b0457956f827a17ad2556118b909a3e6929db79980ccf156a6f58ac823cf88329e62417d2807b34b64b |
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3452737119-3959686427-228443150-1000\0f5007522459c86e95ffcc62f32308f1_ad04ce47-83ca-4cca-a79e-77cdc80ce41e
| MD5 | d898504a722bff1524134c6ab6a5eaa5 |
| SHA1 | e0fdc90c2ca2a0219c99d2758e68c18875a3e11e |
| SHA256 | 878f32f76b159494f5a39f9321616c6068cdb82e88df89bcc739bbc1ea78e1f9 |
| SHA512 | 26a4398bffb0c0aef9a6ec53cd3367a2d0abf2f70097f711bbbf1e9e32fd9f1a72121691bb6a39eeb55d596edd527934e541b4defb3b1426b1d1a6429804dc61 |
memory/2604-66-0x0000000000400000-0x00000000004A2000-memory.dmp
memory/2604-67-0x0000000000400000-0x00000000004A2000-memory.dmp
memory/2604-75-0x0000000000400000-0x00000000004A2000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-04-02 10:02
Reported
2024-04-02 10:05
Platform
win10v2004-20240226-en
Max time kernel
149s
Max time network
152s
Command Line
Signatures
Lokibot
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe | N/A |
Reads user/profile data of web browsers
Accesses Microsoft Outlook profiles
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook | C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe | N/A |
| Key opened | \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook | C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe | N/A |
| Key opened | \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook | C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 4332 set thread context of 4328 | N/A | C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe | C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe |
Enumerates physical storage devices
Creates scheduled task(s)
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
Suspicious behavior: RenamesItself
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe | N/A |
Suspicious use of WriteProcessMemory
outlook_office_path
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook | C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe | N/A |
outlook_win_path
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook | C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe
"C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe"
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe"
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\ciGjbEVbQeulG.exe"
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ciGjbEVbQeulG" /XML "C:\Users\Admin\AppData\Local\Temp\tmp6BBA.tmp"
C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe
"C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 217.106.137.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 249.110.86.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 68.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 183.142.211.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | sempersim.su | udp |
| US | 104.237.252.28:80 | sempersim.su | tcp |
| US | 8.8.8.8:53 | 28.252.237.104.in-addr.arpa | udp |
| US | 104.237.252.28:80 | sempersim.su | tcp |
| US | 104.237.252.28:80 | sempersim.su | tcp |
| US | 8.8.8.8:53 | good.w0ln44.dnslog.cn | udp |
| US | 8.8.8.8:53 | 28.118.140.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 183.59.114.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 15.164.165.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| NL | 52.142.223.178:80 | tcp | |
| US | 8.8.8.8:53 | 218.110.86.104.in-addr.arpa | udp |
| US | 104.237.252.28:80 | sempersim.su | tcp |
| US | 8.8.8.8:53 | 0.205.248.87.in-addr.arpa | udp |
| N/A | 127.0.0.1:80 | tcp | |
| N/A | 127.0.0.1:443 | tcp | |
| US | 104.237.252.28:80 | sempersim.su | tcp |
| US | 8.8.8.8:53 | 17.173.189.20.in-addr.arpa | udp |
Files
memory/4332-1-0x00000000751C0000-0x0000000075970000-memory.dmp
memory/4332-0-0x00000000000C0000-0x0000000000140000-memory.dmp
memory/4332-2-0x0000000004FB0000-0x0000000005554000-memory.dmp
memory/4332-3-0x0000000004B00000-0x0000000004B92000-memory.dmp
memory/4332-4-0x0000000004AE0000-0x0000000004AF0000-memory.dmp
memory/4332-5-0x0000000004BC0000-0x0000000004BCA000-memory.dmp
memory/4332-6-0x0000000004E10000-0x0000000004E24000-memory.dmp
memory/4332-8-0x0000000004F70000-0x0000000004F7E000-memory.dmp
memory/4332-7-0x0000000004F60000-0x0000000004F6A000-memory.dmp
memory/4332-9-0x0000000005D60000-0x0000000005DC2000-memory.dmp
memory/4332-10-0x0000000008520000-0x00000000085BC000-memory.dmp
memory/2492-15-0x00000000029B0000-0x00000000029E6000-memory.dmp
memory/2492-16-0x00000000751C0000-0x0000000075970000-memory.dmp
memory/2492-17-0x00000000050F0000-0x0000000005100000-memory.dmp
memory/2492-19-0x00000000050F0000-0x0000000005100000-memory.dmp
memory/2492-18-0x0000000005730000-0x0000000005D58000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\tmp6BBA.tmp
| MD5 | 8014c0f9927456a386b0446b4ce693ce |
| SHA1 | c6187f05d4ef1ddf0b36cbfbef27fe7bee3aaaf3 |
| SHA256 | b5c7c81fd32cde7c1b3999bee24ebfccb86de819c6b25ee9ac3383acecb580ab |
| SHA512 | bec8ede466ae1e342402e16bcb860d272850478d8e9f20a80b94fe9ea68a79fd4d5f3535f13ba781d8c8d36efe69dcb5cb90150a95b26ffdfe2385a25c5e09a6 |
memory/3152-21-0x00000000751C0000-0x0000000075970000-memory.dmp
memory/3152-22-0x00000000025E0000-0x00000000025F0000-memory.dmp
memory/4328-23-0x0000000000400000-0x00000000004A2000-memory.dmp
memory/3152-26-0x0000000005740000-0x0000000005762000-memory.dmp
memory/4328-27-0x0000000000400000-0x00000000004A2000-memory.dmp
memory/4328-35-0x0000000000400000-0x00000000004A2000-memory.dmp
memory/2492-34-0x00000000055D0000-0x0000000005636000-memory.dmp
memory/3152-49-0x00000000059C0000-0x0000000005A26000-memory.dmp
memory/2492-50-0x0000000005E60000-0x00000000061B4000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ayubqc20.bct.ps1
| MD5 | d17fe0a3f47be24a6453e9ef58c94641 |
| SHA1 | 6ab83620379fc69f80c0242105ddffd7d98d5d9d |
| SHA256 | 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7 |
| SHA512 | 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82 |
memory/4332-28-0x00000000751C0000-0x0000000075970000-memory.dmp
memory/3152-51-0x0000000005E90000-0x0000000005EAE000-memory.dmp
memory/3152-52-0x0000000005EE0000-0x0000000005F2C000-memory.dmp
memory/3152-53-0x000000007F330000-0x000000007F340000-memory.dmp
memory/2492-56-0x00000000715C0000-0x000000007160C000-memory.dmp
memory/3152-79-0x00000000070A0000-0x0000000007143000-memory.dmp
memory/3152-78-0x00000000025E0000-0x00000000025F0000-memory.dmp
memory/2492-68-0x00000000050F0000-0x0000000005100000-memory.dmp
memory/3152-83-0x00000000071E0000-0x00000000071FA000-memory.dmp
memory/3152-85-0x0000000007250000-0x000000000725A000-memory.dmp
memory/2492-82-0x0000000007C50000-0x00000000082CA000-memory.dmp
memory/2492-67-0x0000000006890000-0x00000000068AE000-memory.dmp
memory/3152-57-0x00000000715C0000-0x000000007160C000-memory.dmp
memory/3152-86-0x0000000007460000-0x00000000074F6000-memory.dmp
memory/2492-55-0x000000007F190000-0x000000007F1A0000-memory.dmp
memory/2492-87-0x0000000007810000-0x0000000007821000-memory.dmp
memory/3152-54-0x0000000006450000-0x0000000006482000-memory.dmp
memory/3152-88-0x0000000007410000-0x000000000741E000-memory.dmp
memory/2492-92-0x0000000007950000-0x000000000796A000-memory.dmp
memory/3152-94-0x0000000007500000-0x0000000007508000-memory.dmp
memory/3152-89-0x0000000007420000-0x0000000007434000-memory.dmp
memory/2492-104-0x00000000751C0000-0x0000000075970000-memory.dmp
memory/3152-103-0x00000000751C0000-0x0000000075970000-memory.dmp
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3270530367-132075249-2153716227-1000\0f5007522459c86e95ffcc62f32308f1_1821d3b4-fc3c-403b-ac71-765075a19c10
| MD5 | d898504a722bff1524134c6ab6a5eaa5 |
| SHA1 | e0fdc90c2ca2a0219c99d2758e68c18875a3e11e |
| SHA256 | 878f32f76b159494f5a39f9321616c6068cdb82e88df89bcc739bbc1ea78e1f9 |
| SHA512 | 26a4398bffb0c0aef9a6ec53cd3367a2d0abf2f70097f711bbbf1e9e32fd9f1a72121691bb6a39eeb55d596edd527934e541b4defb3b1426b1d1a6429804dc61 |
memory/4328-111-0x0000000000400000-0x00000000004A2000-memory.dmp
memory/4328-112-0x0000000000400000-0x00000000004A2000-memory.dmp
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3270530367-132075249-2153716227-1000\0f5007522459c86e95ffcc62f32308f1_1821d3b4-fc3c-403b-ac71-765075a19c10
| MD5 | c07225d4e7d01d31042965f048728a0a |
| SHA1 | 69d70b340fd9f44c89adb9a2278df84faa9906b7 |
| SHA256 | 8c136c7ae08020ad16fd1928e36ad335ddef8b85906d66b712fff049aa57dc9a |
| SHA512 | 23d3cea738e1abf561320847c39dadc8b5794d7bd8761b0457956f827a17ad2556118b909a3e6929db79980ccf156a6f58ac823cf88329e62417d2807b34b64b |
memory/4328-119-0x0000000000400000-0x00000000004A2000-memory.dmp