Malware Analysis Report

2024-09-22 23:55

Sample ID 240428-d2ewmafa97
Target SilverClient.exe
SHA256 47ba6b08c23ebfa7813dcd10cebe93876e7c972718151a018b11ff51085c4382
Tags
stormkitty evasion persistence ransomware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

47ba6b08c23ebfa7813dcd10cebe93876e7c972718151a018b11ff51085c4382

Threat Level: Known bad

The file SilverClient.exe was found to be: Known bad.

Malicious Activity Summary

stormkitty evasion persistence ransomware stealer

StormKitty payload

StormKitty

Sets file to hidden

Executes dropped EXE

Drops startup file

Legitimate hosting services abused for malware hosting/C2

Adds Run key to start application

Drops desktop.ini file(s)

Sets desktop wallpaper using registry

Unsigned PE

Enumerates physical storage devices

Uses Task Scheduler COM API

Modifies registry class

Suspicious use of WriteProcessMemory

Creates scheduled task(s)

Views/modifies file attributes

Suspicious behavior: EnumeratesProcesses

Suspicious use of SendNotifyMessage

Suspicious use of AdjustPrivilegeToken

Suspicious use of FindShellTrayWindow

Suspicious use of SetWindowsHookEx

Suspicious behavior: AddClipboardFormatListener

Delays execution with timeout.exe

Suspicious behavior: GetForegroundWindowSpam

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-04-28 03:29

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-04-28 03:29

Reported

2024-04-28 03:48

Platform

win10-20240404-en

Max time kernel

581s

Max time network

866s

Command Line

"C:\Users\Admin\AppData\Local\Temp\SilverClient.exe"

Signatures

StormKitty

stealer stormkitty

StormKitty payload

Description Indicator Process Target
N/A N/A N/A N/A

Sets file to hidden

evasion
Description Indicator Process Target
N/A N/A C:\Windows\System32\attrib.exe N/A
N/A N/A C:\Windows\System32\attrib.exe N/A

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\YOUR FILES HAS BEEN ENCRYPTED!!!.txt C:\Users\Admin\UserProfile\$77svchost.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\UserProfile\$77svchost.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ = "\"C:\\Users\\Admin\\UserProfile\\$77svchost.exe\"" C:\Users\Admin\AppData\Local\Temp\SilverClient.exe N/A

Drops desktop.ini file(s)

Description Indicator Process Target
File opened for modification \??\c:\users\admin\downloads\desktop.ini C:\Users\Admin\UserProfile\$77svchost.exe N/A

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A discord.com N/A N/A
N/A discord.com N/A N/A

Sets desktop wallpaper using registry

ransomware
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\BHlMMJJGED.jpg" C:\Users\Admin\UserProfile\$77svchost.exe N/A

Enumerates physical storage devices

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A
N/A N/A C:\Windows\System32\schtasks.exe N/A

Delays execution with timeout.exe

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\timeout.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings C:\Users\Admin\UserProfile\$77svchost.exe N/A

Suspicious behavior: AddClipboardFormatListener

Description Indicator Process Target
N/A N/A C:\Program Files\VideoLAN\VLC\vlc.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\SilverClient.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\SilverClient.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\SilverClient.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\SilverClient.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\SilverClient.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\SilverClient.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\SilverClient.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\SilverClient.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\SilverClient.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\SilverClient.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\SilverClient.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\SilverClient.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\SilverClient.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\SilverClient.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\SilverClient.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\UserProfile\$77svchost.exe N/A
N/A N/A C:\Users\Admin\UserProfile\$77svchost.exe N/A
N/A N/A C:\Users\Admin\UserProfile\$77svchost.exe N/A
N/A N/A C:\Users\Admin\UserProfile\$77svchost.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe N/A
N/A N/A C:\Users\Admin\UserProfile\$77svchost.exe N/A
N/A N/A C:\Users\Admin\UserProfile\$77svchost.exe N/A
N/A N/A C:\Users\Admin\UserProfile\$77svchost.exe N/A
N/A N/A C:\Users\Admin\UserProfile\$77svchost.exe N/A
N/A N/A C:\Users\Admin\UserProfile\$77svchost.exe N/A
N/A N/A C:\Users\Admin\UserProfile\$77svchost.exe N/A
N/A N/A C:\Users\Admin\UserProfile\$77svchost.exe N/A
N/A N/A C:\Users\Admin\UserProfile\$77svchost.exe N/A
N/A N/A C:\Users\Admin\UserProfile\$77svchost.exe N/A
N/A N/A C:\Users\Admin\UserProfile\$77svchost.exe N/A
N/A N/A C:\Users\Admin\UserProfile\$77svchost.exe N/A
N/A N/A C:\Users\Admin\UserProfile\$77svchost.exe N/A
N/A N/A C:\Users\Admin\UserProfile\$77svchost.exe N/A
N/A N/A C:\Users\Admin\UserProfile\$77svchost.exe N/A
N/A N/A C:\Users\Admin\UserProfile\$77svchost.exe N/A
N/A N/A C:\Users\Admin\UserProfile\$77svchost.exe N/A
N/A N/A C:\Users\Admin\UserProfile\$77svchost.exe N/A
N/A N/A C:\Users\Admin\UserProfile\$77svchost.exe N/A
N/A N/A C:\Users\Admin\UserProfile\$77svchost.exe N/A
N/A N/A C:\Users\Admin\UserProfile\$77svchost.exe N/A
N/A N/A C:\Users\Admin\UserProfile\$77svchost.exe N/A
N/A N/A C:\Users\Admin\UserProfile\$77svchost.exe N/A
N/A N/A C:\Users\Admin\UserProfile\$77svchost.exe N/A
N/A N/A C:\Users\Admin\UserProfile\$77svchost.exe N/A
N/A N/A C:\Users\Admin\UserProfile\$77svchost.exe N/A
N/A N/A C:\Users\Admin\UserProfile\$77svchost.exe N/A
N/A N/A C:\Users\Admin\UserProfile\$77svchost.exe N/A
N/A N/A C:\Users\Admin\UserProfile\$77svchost.exe N/A
N/A N/A C:\Users\Admin\UserProfile\$77svchost.exe N/A
N/A N/A C:\Users\Admin\UserProfile\$77svchost.exe N/A
N/A N/A C:\Users\Admin\UserProfile\$77svchost.exe N/A
N/A N/A C:\Users\Admin\UserProfile\$77svchost.exe N/A
N/A N/A C:\Users\Admin\UserProfile\$77svchost.exe N/A
N/A N/A C:\Users\Admin\UserProfile\$77svchost.exe N/A
N/A N/A C:\Users\Admin\UserProfile\$77svchost.exe N/A
N/A N/A C:\Users\Admin\UserProfile\$77svchost.exe N/A
N/A N/A C:\Users\Admin\UserProfile\$77svchost.exe N/A
N/A N/A C:\Users\Admin\UserProfile\$77svchost.exe N/A
N/A N/A C:\Users\Admin\UserProfile\$77svchost.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Program Files\VideoLAN\VLC\vlc.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\SilverClient.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\UserProfile\$77svchost.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: 33 N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: 34 N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: 35 N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: 36 N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\VideoLAN\VLC\vlc.exe N/A
N/A N/A C:\Program Files\VideoLAN\VLC\vlc.exe N/A
N/A N/A C:\Program Files\VideoLAN\VLC\vlc.exe N/A
N/A N/A C:\Program Files\VideoLAN\VLC\vlc.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Program Files\VideoLAN\VLC\vlc.exe N/A
N/A N/A C:\Program Files\VideoLAN\VLC\vlc.exe N/A
N/A N/A C:\Program Files\VideoLAN\VLC\vlc.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Program Files\VideoLAN\VLC\vlc.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3188 wrote to memory of 200 N/A C:\Users\Admin\AppData\Local\Temp\SilverClient.exe C:\Windows\System32\attrib.exe
PID 3188 wrote to memory of 200 N/A C:\Users\Admin\AppData\Local\Temp\SilverClient.exe C:\Windows\System32\attrib.exe
PID 3188 wrote to memory of 236 N/A C:\Users\Admin\AppData\Local\Temp\SilverClient.exe C:\Windows\System32\attrib.exe
PID 3188 wrote to memory of 236 N/A C:\Users\Admin\AppData\Local\Temp\SilverClient.exe C:\Windows\System32\attrib.exe
PID 3188 wrote to memory of 1356 N/A C:\Users\Admin\AppData\Local\Temp\SilverClient.exe C:\Windows\system32\cmd.exe
PID 3188 wrote to memory of 1356 N/A C:\Users\Admin\AppData\Local\Temp\SilverClient.exe C:\Windows\system32\cmd.exe
PID 1356 wrote to memory of 2148 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\timeout.exe
PID 1356 wrote to memory of 2148 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\timeout.exe
PID 1356 wrote to memory of 5060 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\UserProfile\$77svchost.exe
PID 1356 wrote to memory of 5060 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\UserProfile\$77svchost.exe
PID 5060 wrote to memory of 2700 N/A C:\Users\Admin\UserProfile\$77svchost.exe C:\Windows\SYSTEM32\schtasks.exe
PID 5060 wrote to memory of 2700 N/A C:\Users\Admin\UserProfile\$77svchost.exe C:\Windows\SYSTEM32\schtasks.exe
PID 5060 wrote to memory of 3896 N/A C:\Users\Admin\UserProfile\$77svchost.exe C:\Windows\SYSTEM32\schtasks.exe
PID 5060 wrote to memory of 3896 N/A C:\Users\Admin\UserProfile\$77svchost.exe C:\Windows\SYSTEM32\schtasks.exe
PID 5060 wrote to memory of 4248 N/A C:\Users\Admin\UserProfile\$77svchost.exe C:\Windows\SYSTEM32\schtasks.exe
PID 5060 wrote to memory of 4248 N/A C:\Users\Admin\UserProfile\$77svchost.exe C:\Windows\SYSTEM32\schtasks.exe
PID 5060 wrote to memory of 5044 N/A C:\Users\Admin\UserProfile\$77svchost.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 5060 wrote to memory of 5044 N/A C:\Users\Admin\UserProfile\$77svchost.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 5060 wrote to memory of 5004 N/A C:\Users\Admin\UserProfile\$77svchost.exe C:\Windows\System32\schtasks.exe
PID 5060 wrote to memory of 5004 N/A C:\Users\Admin\UserProfile\$77svchost.exe C:\Windows\System32\schtasks.exe
PID 5060 wrote to memory of 1248 N/A C:\Users\Admin\UserProfile\$77svchost.exe C:\Windows\system32\NOTEPAD.EXE
PID 5060 wrote to memory of 1248 N/A C:\Users\Admin\UserProfile\$77svchost.exe C:\Windows\system32\NOTEPAD.EXE
PID 5060 wrote to memory of 4976 N/A C:\Users\Admin\UserProfile\$77svchost.exe C:\Windows\SYSTEM32\Cmd.exe
PID 5060 wrote to memory of 4976 N/A C:\Users\Admin\UserProfile\$77svchost.exe C:\Windows\SYSTEM32\Cmd.exe
PID 5060 wrote to memory of 856 N/A C:\Users\Admin\UserProfile\$77svchost.exe C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe
PID 5060 wrote to memory of 856 N/A C:\Users\Admin\UserProfile\$77svchost.exe C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe

Uses Task Scheduler COM API

persistence

Views/modifies file attributes

evasion
Description Indicator Process Target
N/A N/A C:\Windows\System32\attrib.exe N/A
N/A N/A C:\Windows\System32\attrib.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\SilverClient.exe

"C:\Users\Admin\AppData\Local\Temp\SilverClient.exe"

C:\Windows\System32\attrib.exe

"C:\Windows\System32\attrib.exe" +s +h "C:\Users\Admin\UserProfile"

C:\Windows\System32\attrib.exe

"C:\Windows\System32\attrib.exe" +s +h "C:\Users\Admin\UserProfile\$77svchost.exe"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpB594.tmp.bat""

C:\Windows\system32\timeout.exe

timeout 3

C:\Users\Admin\UserProfile\$77svchost.exe

"C:\Users\Admin\UserProfile\$77svchost.exe"

C:\Windows\SYSTEM32\schtasks.exe

"schtasks.exe" /query /TN $77svchost.exe

C:\Windows\SYSTEM32\schtasks.exe

"schtasks.exe" /Create /SC ONCE /TN "$77svchost.exe" /TR "C:\Users\Admin\UserProfile\$77svchost.exe \"\$77svchost.exe\" /AsAdmin" /ST 00:01 /IT /F /RL HIGHEST

C:\Windows\SYSTEM32\schtasks.exe

"schtasks.exe" /query /TN $77svchost.exe

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionExtension exe,bat,dll,ps1;exit

C:\Windows\System32\schtasks.exe

"C:\Windows\System32\schtasks.exe" /create /sc daily /tn "svchost_Task-DAILY-21PM" /TR "%MyFile%" /ST 21:00

C:\Windows\system32\NOTEPAD.EXE

"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\YOUR FILES HAS BEEN ENCRYPTED!!!.txt

C:\Program Files\VideoLAN\VLC\vlc.exe

"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\TestComplete.m4v"

C:\Windows\SYSTEM32\Cmd.exe

"Cmd"

C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe

"PowerShell"

Network

Country Destination Domain Proto
US 8.8.8.8:53 discord.com udp
US 162.159.137.232:443 discord.com tcp
US 8.8.8.8:53 choice-certainly.gl.at.ply.gg udp
US 147.185.221.19:24253 choice-certainly.gl.at.ply.gg tcp
US 8.8.8.8:53 232.137.159.162.in-addr.arpa udp
US 8.8.8.8:53 19.221.185.147.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 147.185.221.19:24253 choice-certainly.gl.at.ply.gg tcp
US 8.8.8.8:53 43.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 9.173.189.20.in-addr.arpa udp
US 147.185.221.19:24253 choice-certainly.gl.at.ply.gg tcp
US 8.8.8.8:53 fast.com udp
BE 104.68.65.13:443 fast.com tcp
US 8.8.8.8:53 api.fast.com udp
IE 34.249.148.94:443 api.fast.com tcp
US 8.8.8.8:53 13.65.68.104.in-addr.arpa udp
IE 34.249.148.94:443 api.fast.com tcp
US 8.8.8.8:53 94.148.249.34.in-addr.arpa udp
US 147.185.221.19:24253 choice-certainly.gl.at.ply.gg tcp
US 147.185.221.19:24253 choice-certainly.gl.at.ply.gg tcp
US 147.185.221.19:24253 choice-certainly.gl.at.ply.gg tcp
US 147.185.221.19:24253 choice-certainly.gl.at.ply.gg tcp

Files

memory/3188-0-0x0000000000F20000-0x0000000000F2E000-memory.dmp

memory/3188-1-0x00007FFF04D80000-0x00007FFF0576C000-memory.dmp

memory/3188-2-0x000000001CA50000-0x000000001CA60000-memory.dmp

memory/3188-4-0x00007FFF04D80000-0x00007FFF0576C000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmpB594.tmp.bat

MD5 8d88e82f52cf8f1f1d616e864fb6924d
SHA1 050ee5fc9b565db20fadb71608f7c3b82ad32bde
SHA256 cb726a8755e86adaf7b495a227ac7199a779c243cd4a3a6e859788b3820aa68c
SHA512 20c84ec49681fd2f839e83c3c80bfce1c78eb8b6bb0844c558739dbb13a1cbc9bb02120a9a2e2b685d680dca75f9e1018e9d5be74fd279f7c85441c9b8aa5fe0

memory/3188-9-0x00007FFF04D80000-0x00007FFF0576C000-memory.dmp

C:\Users\Admin\UserProfile\$77svchost.exe

MD5 fabd8535478bee89be312833f6089099
SHA1 e14e26e8f6d05929e9a24a3b523d0a8ec2535f11
SHA256 47ba6b08c23ebfa7813dcd10cebe93876e7c972718151a018b11ff51085c4382
SHA512 6b12403e742230504a543c7135b4a20af31be1c21649904463bd0cee00fd9e0e08953f0b854089619cc0abba96cd8f1831e4799f7dc81ab600529e3f3a00c04b

memory/5044-17-0x000001B5BBD70000-0x000001B5BBD92000-memory.dmp

memory/5044-20-0x000001B5BC0A0000-0x000001B5BC116000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_cykgxcwd.q3t.ps1

MD5 c4ca4238a0b923820dcc509a6f75849b
SHA1 356a192b7913b04c54574d18c28d46e6395428ab
SHA256 6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA512 4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

memory/5060-68-0x00000000036E0000-0x0000000003700000-memory.dmp

memory/5060-69-0x00000000016A0000-0x0000000001826000-memory.dmp

memory/5060-70-0x0000000001870000-0x000000000189A000-memory.dmp

memory/5060-71-0x00000000018A0000-0x00000000018AE000-memory.dmp

memory/3000-88-0x00007FF7F9650000-0x00007FF7F9748000-memory.dmp

memory/3000-89-0x00007FFF19D10000-0x00007FFF19D44000-memory.dmp

memory/3000-90-0x00007FFF004A0000-0x00007FFF00756000-memory.dmp

memory/3000-91-0x000001D74D970000-0x000001D74EA20000-memory.dmp

memory/5060-92-0x00000000018C0000-0x00000000018D0000-memory.dmp

memory/5060-93-0x0000000000010000-0x0000000000066000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\PowerShell.exe.log

MD5 8592ba100a78835a6b94d5949e13dfc1
SHA1 63e901200ab9a57c7dd4c078d7f75dcd3b357020
SHA256 fdd7d9def6f9f0c0f2e60dbc8a2d1999071cd7d3095e9e087bb1cda7a614ac3c
SHA512 87f98e6cb61b2a2a7d65710c4d33881d89715eb7a06e00d492259f35c3902498baabffc5886be0ec5a14312ad4c262e3fc40cd3a5cb91701af0fb229726b88c3

memory/856-128-0x00000243ED4B0000-0x00000243ED4EC000-memory.dmp