Analysis

  • max time kernel
    151s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-05-2024 15:42

General

  • Target

    3d23bc2b3fa66b9d251e3258f54201208ce55c0bab5f9ef966e9b1b524d6b692.exe

  • Size

    1.7MB

  • MD5

    294f7d1382358dd4bb5c5f8531be5c51

  • SHA1

    b9f76e569139729316df3d3cd16179910b7fcd35

  • SHA256

    3d23bc2b3fa66b9d251e3258f54201208ce55c0bab5f9ef966e9b1b524d6b692

  • SHA512

    34df04d8747dd8e6f9b710b7b05fb63f339ff033fef1644f0e0fe4f9e07f674f06f2bbb01a1bc143326b20cfcbb26c8fc35fea891a17de95436c8862a6469dcb

  • SSDEEP

    49152:NaW2PHAkyAy6jmYs54ADFzjTMzexw28+nyuMqUo:NP2PlyAy6iY25FzMF+nV3

Malware Config

Extracted

Family

amadey

Version

4.20

C2

http://193.233.132.139

Attributes
  • install_dir

    5454e6f062

  • install_file

    explorta.exe

  • strings_key

    c7a869c5ba1d72480093ec207994e2bf

  • url_paths

    /sev56rkm/index.php

rc4.plain

Extracted

Family

amadey

Version

4.18

C2

http://193.233.132.56

Attributes
  • install_dir

    09fd851a4f

  • install_file

    explorha.exe

  • strings_key

    443351145ece4966ded809641c77cfa8

  • url_paths

    /Pneh2sXQk0/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 18 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Identifies Wine through registry keys 2 TTPs 4 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 3 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 47 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 5 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 23 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 34 IoCs
  • Suspicious use of SendNotifyMessage 30 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3d23bc2b3fa66b9d251e3258f54201208ce55c0bab5f9ef966e9b1b524d6b692.exe
    "C:\Users\Admin\AppData\Local\Temp\3d23bc2b3fa66b9d251e3258f54201208ce55c0bab5f9ef966e9b1b524d6b692.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Checks whether UAC is enabled
    • Drops file in Windows directory
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:5076
    • C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
      "C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Suspicious use of WriteProcessMemory
      PID:4524
      • C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
        "C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe"
        3⤵
          PID:4500
        • C:\Users\Admin\AppData\Local\Temp\1000019001\amert.exe
          "C:\Users\Admin\AppData\Local\Temp\1000019001\amert.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:1976
          • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
            "C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:3548
            • C:\Windows\SysWOW64\rundll32.exe
              "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
              5⤵
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:3552
              • C:\Windows\system32\rundll32.exe
                "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
                6⤵
                • Blocklisted process makes network request
                • Loads dropped DLL
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:2516
                • C:\Windows\system32\netsh.exe
                  netsh wlan show profiles
                  7⤵
                    PID:920
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\808065738166_Desktop.zip' -CompressionLevel Optimal
                    7⤵
                    • Command and Scripting Interpreter: PowerShell
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3520
              • C:\Windows\SysWOW64\rundll32.exe
                "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
                5⤵
                • Blocklisted process makes network request
                • Loads dropped DLL
                PID:5520
          • C:\Users\Admin\AppData\Local\Temp\1000020001\6036d94397.exe
            "C:\Users\Admin\AppData\Local\Temp\1000020001\6036d94397.exe"
            3⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Checks whether UAC is enabled
            PID:5076
          • C:\Users\Admin\1000021002\95cdaba620.exe
            "C:\Users\Admin\1000021002\95cdaba620.exe"
            3⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:4344
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account
              4⤵
              • Enumerates system info in registry
              • Modifies data under HKEY_USERS
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of WriteProcessMemory
              PID:1600
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffa36409758,0x7ffa36409768,0x7ffa36409778
                5⤵
                  PID:3972
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1668 --field-trial-handle=1880,i,4706628887663291274,5322118188000928902,131072 /prefetch:2
                  5⤵
                    PID:4844
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1880,i,4706628887663291274,5322118188000928902,131072 /prefetch:8
                    5⤵
                      PID:2320
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2280 --field-trial-handle=1880,i,4706628887663291274,5322118188000928902,131072 /prefetch:8
                      5⤵
                        PID:2136
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3240 --field-trial-handle=1880,i,4706628887663291274,5322118188000928902,131072 /prefetch:1
                        5⤵
                          PID:4440
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3376 --field-trial-handle=1880,i,4706628887663291274,5322118188000928902,131072 /prefetch:1
                          5⤵
                            PID:3068
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4676 --field-trial-handle=1880,i,4706628887663291274,5322118188000928902,131072 /prefetch:1
                            5⤵
                              PID:4984
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5252 --field-trial-handle=1880,i,4706628887663291274,5322118188000928902,131072 /prefetch:8
                              5⤵
                                PID:5828
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3456 --field-trial-handle=1880,i,4706628887663291274,5322118188000928902,131072 /prefetch:8
                                5⤵
                                  PID:5868
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1328 --field-trial-handle=3060,i,1774866140584649235,8085848018931772189,262144 --variations-seed-version /prefetch:8
                          1⤵
                            PID:1332
                          • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                            "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                            1⤵
                              PID:772
                            • C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
                              C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
                              1⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Checks whether UAC is enabled
                              PID:5600
                            • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                              C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                              1⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • Suspicious behavior: EnumeratesProcesses
                              PID:5608
                            • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                              C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                              1⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • Suspicious behavior: EnumeratesProcesses
                              PID:3552
                            • C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
                              C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
                              1⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Checks whether UAC is enabled
                              PID:2960

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\1000021002\95cdaba620.exe

                              Filesize

                              1.1MB

                              MD5

                              9c8cd66ca976be3f4c9ee6aacd17fc6a

                              SHA1

                              ba9fe161459e77ba5d6c0c6067f735c6849f68e6

                              SHA256

                              9dc9dacfeb72ba5195c184987dd73a2e0947881d7a938b946147b97ce4145fcf

                              SHA512

                              37b03daf3556001debdc35f8ad771e8599ec176aef9036d5960ce6b6d4a018e7abbef8413db339b6fd97d146466cf66d284242e85abf2a5f38525e312941e968

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                              Filesize

                              240B

                              MD5

                              0d72f4fe8a25a2598c4d4f34f70cc596

                              SHA1

                              004846f502f4ec5e77a4c1fe6f076841e04d99f9

                              SHA256

                              ff0a43f88fa7a923e7c1037d34c22b7b7c31b6685dc093a92cdf7378fb48b05b

                              SHA512

                              3e5a474cd6ef9730f6a11b64992f31c1c85ba0390dddcd722f8bc1868f911f3fca9d9d1f05ff79bd5e442a3528cdde5a1b08db752e4d1213c87c29506dfa05df

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                              Filesize

                              1KB

                              MD5

                              58a25a211875a98ac0e77e4052ab6eb0

                              SHA1

                              ee7379e78bd20183edef2a871706fa677de77cc2

                              SHA256

                              40ad8bde899930d39a6cbf789cb192e5dd5b2847578fcfd51e9348f6df4bd306

                              SHA512

                              1d594020971d652fbaf2d3301dc5edfd0fe808720e0787f49c73823c98bbbe5bb25543bc7e19de80c96545408d6832202ee0506079178fe2e3688349659807d1

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                              Filesize

                              537B

                              MD5

                              a184df1f5f1e416171bbb0da65443ad1

                              SHA1

                              f56c166d8a4812299d0838637ab09f5d9c3f978f

                              SHA256

                              85144f1805d8944c879a8d503781a9e561623fd1e1ff7daffa5e0d17f15573f9

                              SHA512

                              84cafff431361b3bfa3fe7dc78354a41d7150b4de51c3ebc7173a40b5597ec2543abc5a8c188a5df6c20c237b94f0db02ce27b6631ae93215fd0967a2327ff81

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              6KB

                              MD5

                              084fa21ddbeb5f8b8061e457f3b6d1b6

                              SHA1

                              cb5175e4e62f4f6a8a0d187991ef6ea16359ba08

                              SHA256

                              064a68fa5c45a3e23250c65fa689d7505680f1a3ce589298b625016a00a5ffe9

                              SHA512

                              df3475a765b327568c237f7769a296476ad609a380573eb99a5429f3ab0c4b1e49a37eb9ad60e88d21e8b5f385faf27bd4fc76e973674880ccc4dc38870a5e95

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              6KB

                              MD5

                              2f19d1b5c55703f9f71c0d81f015d329

                              SHA1

                              0a179c6711c3bf14269441bbc60c4f63b3745997

                              SHA256

                              f31ef35bab5717914842ab2f36da19b020acdfcbf348ccfed7a69719afc69aed

                              SHA512

                              f3a6e5791d19caa026370440f46b523f19cbd8edf9f4d6047796b9989de34ef587a745e0c01719a9aa80ae93e7eae37c40976da28b28a0754b261e28037bb5f2

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              6KB

                              MD5

                              ec5cc76445c7b66d91658fe89be02860

                              SHA1

                              272e0b50dcf2d590ac3c004ba0a2163b6fdd6da9

                              SHA256

                              e457406ee1eccac0979b12b82738dcfc646f284270090340b31ea3618c96231a

                              SHA512

                              96d7a4716003a01327d0f7d3ca696b68df95c42e7a1c8dd60116c0c36050ef8ac423d80f265aa80f0f2940af20956037acfc7e1334f773570846052772dc8dd9

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                              Filesize

                              264KB

                              MD5

                              42ed12d9307db59c600aea547c725c05

                              SHA1

                              17a51f95f1005f90deba442620a80491c3de7d58

                              SHA256

                              e84d797f2e06d3f45a437bc5996514aee208991e2acdf1f526ae0d4a22c11eb7

                              SHA512

                              21e44d19b8fbf2bc3f830ef1ed8ffa85f6daf9435e0aef8f1e1c0a1da07f3c4e930e8cd3eaee305e74cda0537a3710e7292a8cd66eaa9f9bcedb4023e13561fa

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                              Filesize

                              2B

                              MD5

                              99914b932bd37a50b983c5e7c90ae93b

                              SHA1

                              bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                              SHA256

                              44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                              SHA512

                              27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                            • C:\Users\Admin\AppData\Local\Temp\1000019001\amert.exe

                              Filesize

                              1.8MB

                              MD5

                              ff66b91ccb0c5700673f7cde55db46ea

                              SHA1

                              5baa53417f6dacc4481d2b77c152eca788dc1d37

                              SHA256

                              0c154fdc849a4f9353c55a03996686c672b46dc90b34c000135c5840f0e5f590

                              SHA512

                              a836d2332fb5e3017ae835ea0cee7595ac6cc5570320530be8dc7ea64d6f8429a8f5d5976c3d6417aeae8541f6829fd97322940b69e78987e77f65fe59a65e02

                            • C:\Users\Admin\AppData\Local\Temp\1000020001\6036d94397.exe

                              Filesize

                              2.1MB

                              MD5

                              a62045b02e0e31f527d73cbb99e03291

                              SHA1

                              5ff39e694ee644028e1d57a02b4437139899b6b0

                              SHA256

                              0dd32d944214958f863e36e3b7b80fd412b6aa74460895fac222837acbf3a784

                              SHA512

                              45f81e25e502c54f6187b8717adfc2309ee2bd75732ac49f428aaf73fb27d43ac3e014182e661fc1d003c44633c90e053dd6b7a99eba63dc58cc7b9874e67e2a

                            • C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe

                              Filesize

                              1.7MB

                              MD5

                              294f7d1382358dd4bb5c5f8531be5c51

                              SHA1

                              b9f76e569139729316df3d3cd16179910b7fcd35

                              SHA256

                              3d23bc2b3fa66b9d251e3258f54201208ce55c0bab5f9ef966e9b1b524d6b692

                              SHA512

                              34df04d8747dd8e6f9b710b7b05fb63f339ff033fef1644f0e0fe4f9e07f674f06f2bbb01a1bc143326b20cfcbb26c8fc35fea891a17de95436c8862a6469dcb

                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_zaeg4wc4.iit.ps1

                              Filesize

                              60B

                              MD5

                              d17fe0a3f47be24a6453e9ef58c94641

                              SHA1

                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                              SHA256

                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                              SHA512

                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                            • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                              Filesize

                              109KB

                              MD5

                              726cd06231883a159ec1ce28dd538699

                              SHA1

                              404897e6a133d255ad5a9c26ac6414d7134285a2

                              SHA256

                              12fef2d5995d671ec0e91bdbdc91e2b0d3c90ed3a8b2b13ddaa8ad64727dcd46

                              SHA512

                              9ea82e7cb6c6a58446bd5033855947c3e2d475d2910f2b941235e0b96aa08eec822d2dd17cc86b2d3fce930f78b799291992408e309a6c63e3011266810ea83e

                            • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

                              Filesize

                              1.2MB

                              MD5

                              15a42d3e4579da615a384c717ab2109b

                              SHA1

                              22aeedeb2307b1370cdab70d6a6b6d2c13ad2301

                              SHA256

                              3c97bb410e49b11af8116feb7240b7101e1967cae7538418c45c3d2e072e8103

                              SHA512

                              1eb7f126dccc88a2479e3818c36120f5af3caa0d632b9ea803485ee6531d6e2a1fd0805b1c4364983d280df23ea5ca3ad4a5fca558ac436efae36af9b795c444

                            • memory/1976-48-0x0000000000CE0000-0x000000000118C000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/1976-61-0x0000000000CE0000-0x000000000118C000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/1976-49-0x0000000077834000-0x0000000077836000-memory.dmp

                              Filesize

                              8KB

                            • memory/2960-274-0x0000000000390000-0x00000000008E1000-memory.dmp

                              Filesize

                              5.3MB

                            • memory/2960-275-0x0000000000390000-0x00000000008E1000-memory.dmp

                              Filesize

                              5.3MB

                            • memory/2960-293-0x0000000000390000-0x00000000008E1000-memory.dmp

                              Filesize

                              5.3MB

                            • memory/3520-166-0x000001D5BEBE0000-0x000001D5BEBF2000-memory.dmp

                              Filesize

                              72KB

                            • memory/3520-167-0x000001D5BEBC0000-0x000001D5BEBCA000-memory.dmp

                              Filesize

                              40KB

                            • memory/3520-137-0x000001D5BE5D0000-0x000001D5BE5F2000-memory.dmp

                              Filesize

                              136KB

                            • memory/3548-273-0x0000000000A90000-0x0000000000F3C000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/3548-62-0x0000000000A90000-0x0000000000F3C000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/3548-93-0x0000000000A90000-0x0000000000F3C000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/3548-172-0x0000000000A90000-0x0000000000F3C000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/3548-170-0x0000000000A90000-0x0000000000F3C000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/3548-264-0x0000000000A90000-0x0000000000F3C000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/3548-228-0x0000000000A90000-0x0000000000F3C000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/3548-247-0x0000000000A90000-0x0000000000F3C000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/3548-252-0x0000000000A90000-0x0000000000F3C000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/3548-126-0x0000000000A90000-0x0000000000F3C000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/3548-266-0x0000000000A90000-0x0000000000F3C000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/3552-278-0x0000000000A90000-0x0000000000F3C000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/3552-295-0x0000000000A90000-0x0000000000F3C000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/4524-28-0x0000000000390000-0x00000000008E1000-memory.dmp

                              Filesize

                              5.3MB

                            • memory/4524-64-0x0000000000390000-0x00000000008E1000-memory.dmp

                              Filesize

                              5.3MB

                            • memory/4524-21-0x0000000000390000-0x00000000008E1000-memory.dmp

                              Filesize

                              5.3MB

                            • memory/4524-23-0x0000000000390000-0x00000000008E1000-memory.dmp

                              Filesize

                              5.3MB

                            • memory/4524-125-0x0000000000390000-0x00000000008E1000-memory.dmp

                              Filesize

                              5.3MB

                            • memory/4524-24-0x0000000000390000-0x00000000008E1000-memory.dmp

                              Filesize

                              5.3MB

                            • memory/4524-22-0x0000000000390000-0x00000000008E1000-memory.dmp

                              Filesize

                              5.3MB

                            • memory/4524-25-0x0000000000390000-0x00000000008E1000-memory.dmp

                              Filesize

                              5.3MB

                            • memory/4524-26-0x0000000000390000-0x00000000008E1000-memory.dmp

                              Filesize

                              5.3MB

                            • memory/4524-27-0x0000000000390000-0x00000000008E1000-memory.dmp

                              Filesize

                              5.3MB

                            • memory/4524-29-0x0000000000390000-0x00000000008E1000-memory.dmp

                              Filesize

                              5.3MB

                            • memory/4524-92-0x0000000000390000-0x00000000008E1000-memory.dmp

                              Filesize

                              5.3MB

                            • memory/4524-32-0x0000000000390000-0x00000000008E1000-memory.dmp

                              Filesize

                              5.3MB

                            • memory/5076-87-0x0000000000FC0000-0x0000000001636000-memory.dmp

                              Filesize

                              6.5MB

                            • memory/5076-91-0x0000000000FC0000-0x0000000001636000-memory.dmp

                              Filesize

                              6.5MB

                            • memory/5076-1-0x00000000006E0000-0x0000000000C31000-memory.dmp

                              Filesize

                              5.3MB

                            • memory/5076-3-0x00000000006E0000-0x0000000000C31000-memory.dmp

                              Filesize

                              5.3MB

                            • memory/5076-2-0x00000000006E0000-0x0000000000C31000-memory.dmp

                              Filesize

                              5.3MB

                            • memory/5076-5-0x00000000006E0000-0x0000000000C31000-memory.dmp

                              Filesize

                              5.3MB

                            • memory/5076-4-0x00000000006E0000-0x0000000000C31000-memory.dmp

                              Filesize

                              5.3MB

                            • memory/5076-6-0x00000000006E0000-0x0000000000C31000-memory.dmp

                              Filesize

                              5.3MB

                            • memory/5076-7-0x00000000006E0000-0x0000000000C31000-memory.dmp

                              Filesize

                              5.3MB

                            • memory/5076-8-0x00000000006E0000-0x0000000000C31000-memory.dmp

                              Filesize

                              5.3MB

                            • memory/5076-83-0x0000000000FC0000-0x0000000001636000-memory.dmp

                              Filesize

                              6.5MB

                            • memory/5076-0-0x00000000006E0000-0x0000000000C31000-memory.dmp

                              Filesize

                              5.3MB

                            • memory/5076-20-0x00000000006E0000-0x0000000000C31000-memory.dmp

                              Filesize

                              5.3MB

                            • memory/5076-86-0x0000000000FC0000-0x0000000001636000-memory.dmp

                              Filesize

                              6.5MB

                            • memory/5076-88-0x0000000000FC0000-0x0000000001636000-memory.dmp

                              Filesize

                              6.5MB

                            • memory/5076-85-0x0000000000FC0000-0x0000000001636000-memory.dmp

                              Filesize

                              6.5MB

                            • memory/5076-84-0x0000000000FC0000-0x0000000001636000-memory.dmp

                              Filesize

                              6.5MB

                            • memory/5076-89-0x0000000000FC0000-0x0000000001636000-memory.dmp

                              Filesize

                              6.5MB

                            • memory/5076-90-0x0000000000FC0000-0x0000000001636000-memory.dmp

                              Filesize

                              6.5MB

                            • memory/5076-127-0x0000000000FC0000-0x0000000001636000-memory.dmp

                              Filesize

                              6.5MB

                            • memory/5600-211-0x0000000000390000-0x00000000008E1000-memory.dmp

                              Filesize

                              5.3MB

                            • memory/5600-205-0x0000000000390000-0x00000000008E1000-memory.dmp

                              Filesize

                              5.3MB

                            • memory/5600-201-0x0000000000390000-0x00000000008E1000-memory.dmp

                              Filesize

                              5.3MB

                            • memory/5600-202-0x0000000000390000-0x00000000008E1000-memory.dmp

                              Filesize

                              5.3MB

                            • memory/5600-204-0x0000000000390000-0x00000000008E1000-memory.dmp

                              Filesize

                              5.3MB

                            • memory/5600-203-0x0000000000390000-0x00000000008E1000-memory.dmp

                              Filesize

                              5.3MB

                            • memory/5600-198-0x0000000000390000-0x00000000008E1000-memory.dmp

                              Filesize

                              5.3MB

                            • memory/5600-199-0x0000000000390000-0x00000000008E1000-memory.dmp

                              Filesize

                              5.3MB

                            • memory/5600-200-0x0000000000390000-0x00000000008E1000-memory.dmp

                              Filesize

                              5.3MB

                            • memory/5608-220-0x0000000000A90000-0x0000000000F3C000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/5608-197-0x0000000000A90000-0x0000000000F3C000-memory.dmp

                              Filesize

                              4.7MB