Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-04-2024 01:37

General

  • Target

    855be39c3b980dbc9be89124bbe9f3e4fb660cab6a4e84af15fba8379b9eb2a7.exe

  • Size

    1.8MB

  • MD5

    a837da60643679493bdca8c00d64611c

  • SHA1

    35401c668db6b8ebec6a2871b3ed5510e927849f

  • SHA256

    855be39c3b980dbc9be89124bbe9f3e4fb660cab6a4e84af15fba8379b9eb2a7

  • SHA512

    d97fe2b5c0318a8a5a6531fcb6bedc576bac6cde969a7bff3a8e5b0d61e7cef7f85a12df91454cd1274305b1068a20fed8f2fc5bfe0af6f5df3378eefdf12bf2

  • SSDEEP

    24576:7ilKuDqhXSQdCTxP0X2HsmQXpOkWagYBLS+qTtIZaZ2c4vylc/g1AeHw:7EKukhQP7ZQ5OkWag1+qpIQV4vEcLe

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Process spawned unexpected child process 33 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 9 IoCs
  • DCRat payload 3 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Detects executables packed with SmartAssembly 5 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 6 IoCs
  • Drops file in Program Files directory 28 IoCs
  • Drops file in Windows directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 33 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs
  • System policy modification 1 TTPs 9 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\855be39c3b980dbc9be89124bbe9f3e4fb660cab6a4e84af15fba8379b9eb2a7.exe
    "C:\Users\Admin\AppData\Local\Temp\855be39c3b980dbc9be89124bbe9f3e4fb660cab6a4e84af15fba8379b9eb2a7.exe"
    1⤵
    • UAC bypass
    • Checks computer location settings
    • Checks whether UAC is enabled
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:4652
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\855be39c3b980dbc9be89124bbe9f3e4fb660cab6a4e84af15fba8379b9eb2a7.exe'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4520
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\sihost.exe'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4924
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Security\BrowserCore\en-US\taskhostw.exe'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4392
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Java\upfc.exe'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2660
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\spoolsv.exe'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3400
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\TextInputHost.exe'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2540
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\dllhost.exe'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3060
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\assembly\GAC_MSIL\MMCFxCommon\RuntimeBroker.exe'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3220
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Java\jdk-1.8\include\RuntimeBroker.exe'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1140
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Internet Explorer\es-ES\sppsvc.exe'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2692
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\N9Q7SmhqYe.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1844
      • C:\Windows\system32\w32tm.exe
        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
        3⤵
          PID:4672
        • C:\Users\Admin\AppData\Local\Temp\855be39c3b980dbc9be89124bbe9f3e4fb660cab6a4e84af15fba8379b9eb2a7.exe
          "C:\Users\Admin\AppData\Local\Temp\855be39c3b980dbc9be89124bbe9f3e4fb660cab6a4e84af15fba8379b9eb2a7.exe"
          3⤵
          • UAC bypass
          • Checks computer location settings
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:4036
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\855be39c3b980dbc9be89124bbe9f3e4fb660cab6a4e84af15fba8379b9eb2a7.exe'
            4⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:4008
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Reference Assemblies\Microsoft\services.exe'
            4⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:4128
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\IdentityCRL\production\dllhost.exe'
            4⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:4152
          • C:\Windows\IdentityCRL\production\dllhost.exe
            "C:\Windows\IdentityCRL\production\dllhost.exe"
            4⤵
            • UAC bypass
            • Executes dropped EXE
            • Checks whether UAC is enabled
            • Suspicious use of AdjustPrivilegeToken
            • System policy modification
            PID:940
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "sihosts" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\sihost.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:5100
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\sihost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:3000
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "sihosts" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\sihost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2888
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 6 /tr "'C:\Program Files\Windows Security\BrowserCore\en-US\taskhostw.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2484
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Program Files\Windows Security\BrowserCore\en-US\taskhostw.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1604
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows Security\BrowserCore\en-US\taskhostw.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:4052
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 12 /tr "'C:\Program Files\Java\upfc.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1040
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Program Files\Java\upfc.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1032
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 8 /tr "'C:\Program Files\Java\upfc.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:784
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\spoolsv.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:3440
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\spoolsv.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2192
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\spoolsv.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2376
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\TextInputHost.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:3700
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\TextInputHost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1060
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\TextInputHost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2736
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\dllhost.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1156
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\dllhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:3496
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\dllhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:4892
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 14 /tr "'C:\Windows\assembly\GAC_MSIL\MMCFxCommon\RuntimeBroker.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:3972
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\assembly\GAC_MSIL\MMCFxCommon\RuntimeBroker.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:208
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 5 /tr "'C:\Windows\assembly\GAC_MSIL\MMCFxCommon\RuntimeBroker.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:3160
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 7 /tr "'C:\Program Files\Java\jdk-1.8\include\RuntimeBroker.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:5088
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files\Java\jdk-1.8\include\RuntimeBroker.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:3552
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 5 /tr "'C:\Program Files\Java\jdk-1.8\include\RuntimeBroker.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:3472
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Internet Explorer\es-ES\sppsvc.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2924
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Program Files (x86)\Internet Explorer\es-ES\sppsvc.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:4204
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Internet Explorer\es-ES\sppsvc.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1880
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "servicess" /sc MINUTE /mo 6 /tr "'C:\Program Files\Reference Assemblies\Microsoft\services.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:3492
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Program Files\Reference Assemblies\Microsoft\services.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1384
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "servicess" /sc MINUTE /mo 9 /tr "'C:\Program Files\Reference Assemblies\Microsoft\services.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:4556
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 5 /tr "'C:\Windows\IdentityCRL\production\dllhost.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:3240
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\IdentityCRL\production\dllhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:3852
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 5 /tr "'C:\Windows\IdentityCRL\production\dllhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:4668

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Execution

    Scheduled Task/Job

    1
    T1053

    Persistence

    Scheduled Task/Job

    1
    T1053

    Privilege Escalation

    Abuse Elevation Control Mechanism

    1
    T1548

    Bypass User Account Control

    1
    T1548.002

    Scheduled Task/Job

    1
    T1053

    Defense Evasion

    Abuse Elevation Control Mechanism

    1
    T1548

    Bypass User Account Control

    1
    T1548.002

    Impair Defenses

    1
    T1562

    Disable or Modify Tools

    1
    T1562.001

    Modify Registry

    2
    T1112

    Discovery

    Query Registry

    2
    T1012

    System Information Discovery

    3
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Recovery\WindowsRE\TextInputHost.exe
      Filesize

      1.8MB

      MD5

      a837da60643679493bdca8c00d64611c

      SHA1

      35401c668db6b8ebec6a2871b3ed5510e927849f

      SHA256

      855be39c3b980dbc9be89124bbe9f3e4fb660cab6a4e84af15fba8379b9eb2a7

      SHA512

      d97fe2b5c0318a8a5a6531fcb6bedc576bac6cde969a7bff3a8e5b0d61e7cef7f85a12df91454cd1274305b1068a20fed8f2fc5bfe0af6f5df3378eefdf12bf2

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\855be39c3b980dbc9be89124bbe9f3e4fb660cab6a4e84af15fba8379b9eb2a7.exe.log
      Filesize

      1KB

      MD5

      c6ecc3bc2cdd7883e4f2039a5a5cf884

      SHA1

      20c9dd2a200e4b0390d490a7a76fa184bfc78151

      SHA256

      b3d90663a46ee5333f8f99df4d43c0c76bf3902e3ba3ab36c0903027176d340d

      SHA512

      892a8f8e50ff350e790e1543032c64b3e1c050198b1810f89b6ce8a23de947a3e8299e880f0e79da7e4b5373a6b95e7dd7814cd5d7406a1553ef104ff2ff091e

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
      Filesize

      2KB

      MD5

      d85ba6ff808d9e5444a4b369f5bc2730

      SHA1

      31aa9d96590fff6981b315e0b391b575e4c0804a

      SHA256

      84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

      SHA512

      8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
      Filesize

      944B

      MD5

      3a6bad9528f8e23fb5c77fbd81fa28e8

      SHA1

      f127317c3bc6407f536c0f0600dcbcf1aabfba36

      SHA256

      986366767de5873f1b170a63f2a33ce05132d1afd90c8f5017afbca8ef1beb05

      SHA512

      846002154a0ece6f3e9feda6f115d3161dc21b3789525dd62ae1d9188495171293efdbe7be4710666dd8a15e66b557315b5a02918a741ed1d5f3ff0c515b98e2

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
      Filesize

      944B

      MD5

      e243a38635ff9a06c87c2a61a2200656

      SHA1

      ecd95ed5bf1a9fbe96a8448fc2814a0210fa2afc

      SHA256

      af5782703f3f2d5a29fb313dae6680a64134db26064d4a321a3f23b75f6ca00f

      SHA512

      4418957a1b10eee44cf270c81816ae707352411c4f5ac14b6b61ab537c91480e24e0a0a2c276a6291081b4984c123cf673a45dcedb0ceeef682054ba0fc19cb4

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
      Filesize

      944B

      MD5

      bd5940f08d0be56e65e5f2aaf47c538e

      SHA1

      d7e31b87866e5e383ab5499da64aba50f03e8443

      SHA256

      2d2f364c75bd2897504249f42cdf1d19374f5230aad68fa9154ea3d03e3031a6

      SHA512

      c34d10c7e07da44a180fae9889b61f08903aa84e8ddfa80c31c272b1ef9d491b8cec6b8a4c836c3cb1583fe8f4955c6a8db872515de3a9e10eae09610c959406

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
      Filesize

      944B

      MD5

      eb1ad317bd25b55b2bbdce8a28a74a94

      SHA1

      98a3978be4d10d62e7411946474579ee5bdc5ea6

      SHA256

      9e94e7c9ac6134ee30e79498558aa1a5a1ac79a643666c3f8922eed215dd3a98

      SHA512

      d011f266c0240d84470c0f9577cd9e4927309bd19bb38570ca9704ed8e1d159f9bea982a59d3eefef72ce7a10bd81208b82e88ef57c7af587f7437a89769adc0

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
      Filesize

      944B

      MD5

      e58749a7a1826f6ea62df1e2ef63a32b

      SHA1

      c0bca21658b8be4f37b71eec9578bfefa44f862d

      SHA256

      0e1f0e684adb40a5d0668df5fed007c9046137d7ae16a1f2f343b139d5f9bc93

      SHA512

      4cf45b2b11ab31e7f67fff286b29d50ed28cd6043091144c5c0f1348b5f5916ed7479cf985595e6f096b586ab93b4b5dce612f688049b8366a2dd91863e98b70

    • C:\Users\Admin\AppData\Local\Temp\N9Q7SmhqYe.bat
      Filesize

      267B

      MD5

      27f0810110afd849e0c29f0dffa3bbee

      SHA1

      07e44c4bd3e65becb5b2d5d625f6982731a7913c

      SHA256

      7bbc05cb476f99180451748eb4ac7c6211ad7c298eb55ca2ad11f51a01696b47

      SHA512

      d410e5f4e2eb21bd50250fa91e5182e13c610e23e318f1eecd0a0d890fab7fec787d2d43fa4fae83c5e6674476e3e2bf6180cc936482dc27a8181166ed5c4b21

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_gmhiutic.1pt.ps1
      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\tmp9385A.tmp
      Filesize

      416B

      MD5

      0d117553839ba512a4a598210df66f38

      SHA1

      7c44cef894c7d6af514c190e3821e006be3cf206

      SHA256

      cfcb7e81d9b27976bf07146dfca28be59798bb9e079cfd317ba8f303709ccc07

      SHA512

      234f33db1653093e5137ca4846a729a2ac147f008a3e785cd13b064941439da44f7a65acbe7fddb87d4e290b43971bbe9dccdbd604bd1eab9c9408274bbe816d

    • C:\Windows\assembly\GAC_MSIL\MMCFxCommon\RuntimeBroker.exe
      Filesize

      1.8MB

      MD5

      fb0571ceceeea3eb32232eb28ff4242d

      SHA1

      18f31991925d62fefc7fd981467d4f242dbc6e88

      SHA256

      62552770d12f728805c0ce86e5fb853a5880bfde114eb118192dc08a82c34ad3

      SHA512

      6bd7b15575c3488e0520ee1a67bae0c6ba437183e7de1b3c56e5be01d609a0081eed3ca0b70e89136fd2a49ce3311921446cdac544a464581ba8960a27203e00

    • memory/1140-302-0x00007FF947640000-0x00007FF948101000-memory.dmp
      Filesize

      10.8MB

    • memory/1140-262-0x00007FF947640000-0x00007FF948101000-memory.dmp
      Filesize

      10.8MB

    • memory/1140-264-0x000001EA53840000-0x000001EA53850000-memory.dmp
      Filesize

      64KB

    • memory/1140-266-0x000001EA53840000-0x000001EA53850000-memory.dmp
      Filesize

      64KB

    • memory/2540-267-0x00000272CA7D0000-0x00000272CA7E0000-memory.dmp
      Filesize

      64KB

    • memory/2540-265-0x00000272CA7D0000-0x00000272CA7E0000-memory.dmp
      Filesize

      64KB

    • memory/2540-277-0x00000272CA7D0000-0x00000272CA7E0000-memory.dmp
      Filesize

      64KB

    • memory/2540-263-0x00007FF947640000-0x00007FF948101000-memory.dmp
      Filesize

      10.8MB

    • memory/2540-299-0x00007FF947640000-0x00007FF948101000-memory.dmp
      Filesize

      10.8MB

    • memory/2660-268-0x00007FF947640000-0x00007FF948101000-memory.dmp
      Filesize

      10.8MB

    • memory/2660-269-0x0000020589F80000-0x0000020589F90000-memory.dmp
      Filesize

      64KB

    • memory/2660-296-0x00007FF947640000-0x00007FF948101000-memory.dmp
      Filesize

      10.8MB

    • memory/2692-270-0x00007FF947640000-0x00007FF948101000-memory.dmp
      Filesize

      10.8MB

    • memory/2692-271-0x0000026868260000-0x0000026868270000-memory.dmp
      Filesize

      64KB

    • memory/2692-298-0x00007FF947640000-0x00007FF948101000-memory.dmp
      Filesize

      10.8MB

    • memory/3060-232-0x000001E86DBA0000-0x000001E86DBB0000-memory.dmp
      Filesize

      64KB

    • memory/3060-202-0x00007FF947640000-0x00007FF948101000-memory.dmp
      Filesize

      10.8MB

    • memory/3060-297-0x00007FF947640000-0x00007FF948101000-memory.dmp
      Filesize

      10.8MB

    • memory/3220-274-0x000002974BEC0000-0x000002974BED0000-memory.dmp
      Filesize

      64KB

    • memory/3220-308-0x00007FF947640000-0x00007FF948101000-memory.dmp
      Filesize

      10.8MB

    • memory/3220-222-0x000002974BEC0000-0x000002974BED0000-memory.dmp
      Filesize

      64KB

    • memory/3220-174-0x00007FF947640000-0x00007FF948101000-memory.dmp
      Filesize

      10.8MB

    • memory/3400-251-0x000002AC6A540000-0x000002AC6A550000-memory.dmp
      Filesize

      64KB

    • memory/3400-163-0x00007FF947640000-0x00007FF948101000-memory.dmp
      Filesize

      10.8MB

    • memory/3400-181-0x000002AC6A540000-0x000002AC6A550000-memory.dmp
      Filesize

      64KB

    • memory/3400-285-0x00007FF947640000-0x00007FF948101000-memory.dmp
      Filesize

      10.8MB

    • memory/4036-311-0x00007FF947360000-0x00007FF947E21000-memory.dmp
      Filesize

      10.8MB

    • memory/4036-312-0x0000000001310000-0x0000000001320000-memory.dmp
      Filesize

      64KB

    • memory/4392-272-0x00007FF947640000-0x00007FF948101000-memory.dmp
      Filesize

      10.8MB

    • memory/4392-173-0x00000166D5710000-0x00000166D5732000-memory.dmp
      Filesize

      136KB

    • memory/4392-288-0x00007FF947640000-0x00007FF948101000-memory.dmp
      Filesize

      10.8MB

    • memory/4392-162-0x00000166D5050000-0x00000166D5060000-memory.dmp
      Filesize

      64KB

    • memory/4392-273-0x00000166D5050000-0x00000166D5060000-memory.dmp
      Filesize

      64KB

    • memory/4520-307-0x00007FF947640000-0x00007FF948101000-memory.dmp
      Filesize

      10.8MB

    • memory/4520-276-0x0000017B3FD10000-0x0000017B3FD20000-memory.dmp
      Filesize

      64KB

    • memory/4520-275-0x00007FF947640000-0x00007FF948101000-memory.dmp
      Filesize

      10.8MB

    • memory/4652-7-0x0000000003340000-0x0000000003356000-memory.dmp
      Filesize

      88KB

    • memory/4652-9-0x0000000003390000-0x000000000339A000-memory.dmp
      Filesize

      40KB

    • memory/4652-15-0x000000001C6A0000-0x000000001C6A8000-memory.dmp
      Filesize

      32KB

    • memory/4652-18-0x000000001BE40000-0x000000001BE50000-memory.dmp
      Filesize

      64KB

    • memory/4652-16-0x000000001BE40000-0x000000001BE50000-memory.dmp
      Filesize

      64KB

    • memory/4652-17-0x00000000033E0000-0x00000000033EE000-memory.dmp
      Filesize

      56KB

    • memory/4652-19-0x000000001BE20000-0x000000001BE2E000-memory.dmp
      Filesize

      56KB

    • memory/4652-13-0x00000000033C0000-0x00000000033CC000-memory.dmp
      Filesize

      48KB

    • memory/4652-20-0x000000001BE30000-0x000000001BE3C000-memory.dmp
      Filesize

      48KB

    • memory/4652-11-0x00000000033A0000-0x00000000033AC000-memory.dmp
      Filesize

      48KB

    • memory/4652-12-0x00000000033B0000-0x00000000033B8000-memory.dmp
      Filesize

      32KB

    • memory/4652-10-0x0000000003380000-0x000000000338C000-memory.dmp
      Filesize

      48KB

    • memory/4652-8-0x0000000003370000-0x0000000003378000-memory.dmp
      Filesize

      32KB

    • memory/4652-14-0x00000000033D0000-0x00000000033DC000-memory.dmp
      Filesize

      48KB

    • memory/4652-21-0x000000001BE50000-0x000000001BE5C000-memory.dmp
      Filesize

      48KB

    • memory/4652-40-0x000000001BE40000-0x000000001BE50000-memory.dmp
      Filesize

      64KB

    • memory/4652-161-0x00007FF947640000-0x00007FF948101000-memory.dmp
      Filesize

      10.8MB

    • memory/4652-6-0x00000000017C0000-0x00000000017D0000-memory.dmp
      Filesize

      64KB

    • memory/4652-1-0x00007FF947640000-0x00007FF948101000-memory.dmp
      Filesize

      10.8MB

    • memory/4652-2-0x000000001BE40000-0x000000001BE50000-memory.dmp
      Filesize

      64KB

    • memory/4652-3-0x00000000017B0000-0x00000000017BE000-memory.dmp
      Filesize

      56KB

    • memory/4652-5-0x000000001BDD0000-0x000000001BE20000-memory.dmp
      Filesize

      320KB

    • memory/4652-4-0x0000000001A30000-0x0000000001A4C000-memory.dmp
      Filesize

      112KB

    • memory/4652-0-0x0000000000F30000-0x00000000010FC000-memory.dmp
      Filesize

      1.8MB

    • memory/4924-160-0x000001A1EE300000-0x000001A1EE310000-memory.dmp
      Filesize

      64KB

    • memory/4924-159-0x000001A1EE300000-0x000001A1EE310000-memory.dmp
      Filesize

      64KB

    • memory/4924-289-0x00007FF947640000-0x00007FF948101000-memory.dmp
      Filesize

      10.8MB

    • memory/4924-157-0x00007FF947640000-0x00007FF948101000-memory.dmp
      Filesize

      10.8MB