Resubmissions
11-05-2024 19:51
240511-ykvkzahc78 1011-05-2024 19:45
240511-ygfmmsec3y 1011-05-2024 18:50
240511-xhabksfa93 10Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
11-05-2024 19:51
Static task
static1
General
-
Target
AudinoBuilder.exe
-
Size
5.6MB
-
MD5
c4cb065184458a9e05b7c893642f9b3c
-
SHA1
36327e2e82c26c3d39dcc51569c08c624c90ae20
-
SHA256
1316e22fe1e9b3d4a9c42362c21bca74598cdc11eae27282a29871fb98ab0b38
-
SHA512
2e9809bce89db2566c7aa9143afc5c818cc2765ea6c0ab2e8d583aac7a7b1cca5d601b5ecb8cc676221118ab2b8b333eea7fad614f5150ae95c76b979388faa4
-
SSDEEP
98304:lKAVWycWWgSj67/ngnLqAABRvCrnVAo3tH/Gfz7H7YzA4AzRP2HjdgW0NaBFV:8TylWgSj6DnDvRKrnVAoBQHHkERPPW0K
Malware Config
Extracted
xenorat
jctestwindows.airdns.org
Xeno_rat_nd8912d
-
delay
5000
-
install_path
appdata
-
port
45010
-
startup_name
ErrorManager
Signatures
-
Detect ZGRat V1 29 IoCs
resource yara_rule behavioral1/memory/2512-48-0x0000000005660000-0x00000000056CC000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-50-0x0000000005660000-0x00000000056C5000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-52-0x0000000005660000-0x00000000056C5000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-86-0x0000000005660000-0x00000000056C5000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-102-0x0000000005660000-0x00000000056C5000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-100-0x0000000005660000-0x00000000056C5000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-98-0x0000000005660000-0x00000000056C5000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-96-0x0000000005660000-0x00000000056C5000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-94-0x0000000005660000-0x00000000056C5000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-92-0x0000000005660000-0x00000000056C5000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-88-0x0000000005660000-0x00000000056C5000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-84-0x0000000005660000-0x00000000056C5000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-82-0x0000000005660000-0x00000000056C5000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-80-0x0000000005660000-0x00000000056C5000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-78-0x0000000005660000-0x00000000056C5000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-76-0x0000000005660000-0x00000000056C5000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-74-0x0000000005660000-0x00000000056C5000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-72-0x0000000005660000-0x00000000056C5000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-70-0x0000000005660000-0x00000000056C5000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-67-0x0000000005660000-0x00000000056C5000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-63-0x0000000005660000-0x00000000056C5000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-61-0x0000000005660000-0x00000000056C5000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-104-0x0000000005660000-0x00000000056C5000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-90-0x0000000005660000-0x00000000056C5000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-56-0x0000000005660000-0x00000000056C5000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-54-0x0000000005660000-0x00000000056C5000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-49-0x0000000005660000-0x00000000056C5000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-65-0x0000000005660000-0x00000000056C5000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-59-0x0000000005660000-0x00000000056C5000-memory.dmp family_zgrat_v1 -
pid Process 4256 powershell.exe 5488 powershell.exe 4916 powershell.exe 3684 powershell.exe 5160 powershell.exe 5500 powershell.exe 2176 powershell.exe -
Creates new service(s) 2 TTPs
-
Executes dropped EXE 7 IoCs
pid Process 2512 Ilkdt.exe 1080 WinHostMgr.exe 2520 WindowsSubsystem.exe 2412 WindowsSubsystem.exe 5612 bauwrdgwodhv.exe 2980 bauwrdgwodhv.exe 2252 bauwrdgwodhv.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 18 pastebin.com 28 pastebin.com -
Drops file in System32 directory 10 IoCs
description ioc Process File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\system32\MRT.exe bauwrdgwodhv.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\MRT.exe bauwrdgwodhv.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\system32\MRT.exe WinHostMgr.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\system32\MRT.exe bauwrdgwodhv.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 5612 set thread context of 5428 5612 bauwrdgwodhv.exe 154 PID 5612 set thread context of 2848 5612 bauwrdgwodhv.exe 159 -
Launches sc.exe 24 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1628 sc.exe 5608 sc.exe 4524 sc.exe 1120 sc.exe 2016 sc.exe 5812 sc.exe 5288 sc.exe 5460 sc.exe 5772 sc.exe 5848 sc.exe 2236 sc.exe 1440 sc.exe 2212 sc.exe 5708 sc.exe 5380 sc.exe 5332 sc.exe 4636 sc.exe 3592 sc.exe 5588 sc.exe 3232 sc.exe 5284 sc.exe 3860 sc.exe 5880 sc.exe 5380 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5628 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3433428765-2473475212-4279855560-1000_Classes\Local Settings taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 4256 powershell.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 4256 powershell.exe 4256 powershell.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 1080 WinHostMgr.exe 908 taskmgr.exe 5488 powershell.exe 5488 powershell.exe 1080 WinHostMgr.exe 1080 WinHostMgr.exe 1080 WinHostMgr.exe 1080 WinHostMgr.exe 1080 WinHostMgr.exe 1080 WinHostMgr.exe 1080 WinHostMgr.exe 1080 WinHostMgr.exe 1080 WinHostMgr.exe 1080 WinHostMgr.exe 1080 WinHostMgr.exe 1080 WinHostMgr.exe 1080 WinHostMgr.exe 1080 WinHostMgr.exe 5612 bauwrdgwodhv.exe 908 taskmgr.exe 4916 powershell.exe 4916 powershell.exe 908 taskmgr.exe 5612 bauwrdgwodhv.exe 5612 bauwrdgwodhv.exe 5612 bauwrdgwodhv.exe 5612 bauwrdgwodhv.exe 5612 bauwrdgwodhv.exe 908 taskmgr.exe 5612 bauwrdgwodhv.exe 5612 bauwrdgwodhv.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 908 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 44 IoCs
description pid Process Token: SeDebugPrivilege 908 taskmgr.exe Token: SeSystemProfilePrivilege 908 taskmgr.exe Token: SeCreateGlobalPrivilege 908 taskmgr.exe Token: SeDebugPrivilege 2512 Ilkdt.exe Token: SeDebugPrivilege 4256 powershell.exe Token: SeDebugPrivilege 5488 powershell.exe Token: SeShutdownPrivilege 3640 powercfg.exe Token: SeCreatePagefilePrivilege 3640 powercfg.exe Token: SeShutdownPrivilege 2348 powercfg.exe Token: SeCreatePagefilePrivilege 2348 powercfg.exe Token: SeShutdownPrivilege 5000 powercfg.exe Token: SeCreatePagefilePrivilege 5000 powercfg.exe Token: SeShutdownPrivilege 4328 powercfg.exe Token: SeCreatePagefilePrivilege 4328 powercfg.exe Token: SeDebugPrivilege 4916 powershell.exe Token: SeShutdownPrivilege 1748 powercfg.exe Token: SeCreatePagefilePrivilege 1748 powercfg.exe Token: SeShutdownPrivilege 5632 powercfg.exe Token: SeCreatePagefilePrivilege 5632 powercfg.exe Token: SeShutdownPrivilege 1132 powercfg.exe Token: SeCreatePagefilePrivilege 1132 powercfg.exe Token: SeShutdownPrivilege 4020 powercfg.exe Token: SeCreatePagefilePrivilege 4020 powercfg.exe Token: SeLockMemoryPrivilege 2848 explorer.exe Token: SeDebugPrivilege 3684 powershell.exe Token: SeDebugPrivilege 5160 powershell.exe Token: SeShutdownPrivilege 5700 powercfg.exe Token: SeCreatePagefilePrivilege 5700 powercfg.exe Token: SeShutdownPrivilege 5744 powercfg.exe Token: SeCreatePagefilePrivilege 5744 powercfg.exe Token: SeShutdownPrivilege 5984 powercfg.exe Token: SeCreatePagefilePrivilege 5984 powercfg.exe Token: SeShutdownPrivilege 5932 powercfg.exe Token: SeCreatePagefilePrivilege 5932 powercfg.exe Token: SeDebugPrivilege 5500 powershell.exe Token: SeDebugPrivilege 2176 powershell.exe Token: SeShutdownPrivilege 2416 powercfg.exe Token: SeCreatePagefilePrivilege 2416 powercfg.exe Token: SeShutdownPrivilege 852 powercfg.exe Token: SeCreatePagefilePrivilege 852 powercfg.exe Token: SeShutdownPrivilege 1956 powercfg.exe Token: SeCreatePagefilePrivilege 1956 powercfg.exe Token: SeShutdownPrivilege 4316 powercfg.exe Token: SeCreatePagefilePrivilege 4316 powercfg.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe 908 taskmgr.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 4372 wrote to memory of 4256 4372 AudinoBuilder.exe 92 PID 4372 wrote to memory of 4256 4372 AudinoBuilder.exe 92 PID 4372 wrote to memory of 4256 4372 AudinoBuilder.exe 92 PID 4372 wrote to memory of 2512 4372 AudinoBuilder.exe 94 PID 4372 wrote to memory of 2512 4372 AudinoBuilder.exe 94 PID 4372 wrote to memory of 2512 4372 AudinoBuilder.exe 94 PID 4372 wrote to memory of 1080 4372 AudinoBuilder.exe 95 PID 4372 wrote to memory of 1080 4372 AudinoBuilder.exe 95 PID 4372 wrote to memory of 2520 4372 AudinoBuilder.exe 96 PID 4372 wrote to memory of 2520 4372 AudinoBuilder.exe 96 PID 4372 wrote to memory of 2520 4372 AudinoBuilder.exe 96 PID 2520 wrote to memory of 2412 2520 WindowsSubsystem.exe 97 PID 2520 wrote to memory of 2412 2520 WindowsSubsystem.exe 97 PID 2520 wrote to memory of 2412 2520 WindowsSubsystem.exe 97 PID 2412 wrote to memory of 5628 2412 WindowsSubsystem.exe 100 PID 2412 wrote to memory of 5628 2412 WindowsSubsystem.exe 100 PID 2412 wrote to memory of 5628 2412 WindowsSubsystem.exe 100 PID 5728 wrote to memory of 5584 5728 cmd.exe 109 PID 5728 wrote to memory of 5584 5728 cmd.exe 109 PID 4132 wrote to memory of 8 4132 cmd.exe 143 PID 4132 wrote to memory of 8 4132 cmd.exe 143 PID 5612 wrote to memory of 5428 5612 bauwrdgwodhv.exe 154 PID 5612 wrote to memory of 5428 5612 bauwrdgwodhv.exe 154 PID 5612 wrote to memory of 5428 5612 bauwrdgwodhv.exe 154 PID 5612 wrote to memory of 5428 5612 bauwrdgwodhv.exe 154 PID 5612 wrote to memory of 5428 5612 bauwrdgwodhv.exe 154 PID 5612 wrote to memory of 5428 5612 bauwrdgwodhv.exe 154 PID 5612 wrote to memory of 5428 5612 bauwrdgwodhv.exe 154 PID 5612 wrote to memory of 5428 5612 bauwrdgwodhv.exe 154 PID 5612 wrote to memory of 5428 5612 bauwrdgwodhv.exe 154 PID 5612 wrote to memory of 2848 5612 bauwrdgwodhv.exe 159 PID 5612 wrote to memory of 2848 5612 bauwrdgwodhv.exe 159 PID 5612 wrote to memory of 2848 5612 bauwrdgwodhv.exe 159 PID 5612 wrote to memory of 2848 5612 bauwrdgwodhv.exe 159 PID 5612 wrote to memory of 2848 5612 bauwrdgwodhv.exe 159 PID 4188 wrote to memory of 3552 4188 cmd.exe 174 PID 4188 wrote to memory of 3552 4188 cmd.exe 174 PID 6136 wrote to memory of 740 6136 cmd.exe 200 PID 6136 wrote to memory of 740 6136 cmd.exe 200
Processes
-
C:\Users\Admin\AppData\Local\Temp\AudinoBuilder.exe"C:\Users\Admin\AppData\Local\Temp\AudinoBuilder.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGwAYwBiACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHMAaAB2ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHcAbgB5ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGcAeQB0ACMAPgA="2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4256
-
-
C:\Users\Admin\AppData\Local\Temp\Ilkdt.exe"C:\Users\Admin\AppData\Local\Temp\Ilkdt.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2512
-
-
C:\Users\Admin\AppData\Local\Temp\WinHostMgr.exe"C:\Users\Admin\AppData\Local\Temp\WinHostMgr.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1080 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5488
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart3⤵
- Suspicious use of WriteProcessMemory
PID:5728 -
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart4⤵PID:5584
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc3⤵
- Launches sc.exe
PID:5588
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:3232
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv3⤵
- Launches sc.exe
PID:5284
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits3⤵
- Launches sc.exe
PID:1628
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc3⤵
- Launches sc.exe
PID:2212
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2348
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:5000
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:3640
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:4328
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "GMDTJRUT"3⤵
- Launches sc.exe
PID:5708
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "GMDTJRUT" binpath= "C:\ProgramData\vcnwldzucnvl\bauwrdgwodhv.exe" start= "auto"3⤵
- Launches sc.exe
PID:5288
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog3⤵
- Launches sc.exe
PID:5380
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "GMDTJRUT"3⤵
- Launches sc.exe
PID:5460
-
-
-
C:\Users\Admin\AppData\Local\Temp\WindowsSubsystem.exe"C:\Users\Admin\AppData\Local\Temp\WindowsSubsystem.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Roaming\XenoManager\WindowsSubsystem.exe"C:\Users\Admin\AppData\Roaming\XenoManager\WindowsSubsystem.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "ErrorManager" /XML "C:\Users\Admin\AppData\Local\Temp\tmp2BAF.tmp" /F4⤵
- Creates scheduled task(s)
PID:5628
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:1576
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /01⤵
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:908
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3036
-
C:\ProgramData\vcnwldzucnvl\bauwrdgwodhv.exeC:\ProgramData\vcnwldzucnvl\bauwrdgwodhv.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5612 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4916
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵PID:8
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc2⤵
- Launches sc.exe
PID:5332
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc2⤵
- Launches sc.exe
PID:3860
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv2⤵
- Launches sc.exe
PID:5608
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits2⤵
- Launches sc.exe
PID:5772
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc2⤵
- Launches sc.exe
PID:5848
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:5632
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:1132
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:1748
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:4020
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:5428
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force3⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3684
-
-
C:\ProgramData\vcnwldzucnvl\bauwrdgwodhv.exe"C:\ProgramData\vcnwldzucnvl\bauwrdgwodhv.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2980 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force4⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5160
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart4⤵
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart5⤵PID:3552
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc4⤵
- Launches sc.exe
PID:4636
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc4⤵
- Launches sc.exe
PID:5880
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv4⤵
- Launches sc.exe
PID:4524
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits4⤵
- Launches sc.exe
PID:2236
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc4⤵
- Launches sc.exe
PID:5380
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 04⤵
- Suspicious use of AdjustPrivilegeToken
PID:5744
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 04⤵
- Suspicious use of AdjustPrivilegeToken
PID:5700
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 04⤵
- Suspicious use of AdjustPrivilegeToken
PID:5932
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 04⤵
- Suspicious use of AdjustPrivilegeToken
PID:5984
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force3⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5500
-
-
C:\ProgramData\vcnwldzucnvl\bauwrdgwodhv.exe"C:\ProgramData\vcnwldzucnvl\bauwrdgwodhv.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2252 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force4⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2176
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart4⤵
- Suspicious use of WriteProcessMemory
PID:6136 -
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart5⤵PID:740
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc4⤵
- Launches sc.exe
PID:1120
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc4⤵
- Launches sc.exe
PID:2016
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv4⤵
- Launches sc.exe
PID:3592
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits4⤵
- Launches sc.exe
PID:1440
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc4⤵
- Launches sc.exe
PID:5812
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 04⤵
- Suspicious use of AdjustPrivilegeToken
PID:4316
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 04⤵
- Suspicious use of AdjustPrivilegeToken
PID:2416
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 04⤵
- Suspicious use of AdjustPrivilegeToken
PID:852
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 04⤵
- Suspicious use of AdjustPrivilegeToken
PID:1956
-
-
-
-
C:\Windows\explorer.exeexplorer.exe2⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2848
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1System Services
2Service Execution
2Persistence
Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
18KB
MD5e5a0fb5855ba19da7329e5feaa7aac49
SHA1ad0b5ae1b42961404bb18980a206abc9b086ecc9
SHA256a80beb1bb8dd659a2af25db4092b5487f327e38e2d75c939bdaaf3b3f6c7d456
SHA512fb632526e40b7ded5d1ac3e11b855c84baa716bdb12122303fc503f65d4577cb4c6beeeee5265fa8fe7fd9a6a15b0d0ac4c74bb9ba5a456d4472716d9aa0a6aa
-
Filesize
191KB
MD5e004a568b841c74855f1a8a5d43096c7
SHA1b90fd74593ae9b5a48cb165b6d7602507e1aeca4
SHA256d49013d6be0f0e727c0b53bce1d3fed00656c7a2836ceef0a9d4cb816a5878db
SHA512402dd4d4c57fb6f5c7a531b7210a897dfe41d68df99ae4d605944f6e5b2cecaafa3fe27562fe45e7e216a7c9e29e63139d4382310b41f04a35ad56115fbed2af
-
Filesize
5.0MB
MD5e222309197c5e633aa8e294ba4bdcd29
SHA152b3f89a3d2262bf603628093f6d1e71d9cc3820
SHA256047a7ca1b8848c1c0e3c0fcc6ece056390760b24580f27f6966b86b0c2a1042b
SHA5129eb37686e0cee9ec18d12a4edd37c8334d26650c74eae5b30231c2b0db1628d52848123c9348c3da306ec950b827ec0a56cdf43ee325a9e280022c68193d8503
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD50cd3da1799bc79141a8e8b219f395b48
SHA153d117d84f3ba1066b59720965e25a84792439a5
SHA2568bb355c414170a13cc47f16128844bac5089e9c845f7d07d4d098579b7c152d6
SHA512686ef43213a06ba50e3b78c1f84782cbc2e8a87f97c297addf8bea5d78346420fd143dd7d4aa7f95a7827c2db4fd27c15cfec44fef6e700351cff887afc8e536
-
Filesize
14KB
MD50c0195c48b6b8582fa6f6373032118da
SHA1d25340ae8e92a6d29f599fef426a2bc1b5217299
SHA25611bd2c9f9e2397c9a16e0990e4ed2cf0679498fe0fd418a3dfdac60b5c160ee5
SHA512ab28e99659f219fec553155a0810de90f0c5b07dc9b66bda86d7686499fb0ec5fddeb7cd7a3c5b77dccb5e865f2715c2d81f4d40df4431c92ac7860c7e01720d
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
Filesize4KB
MD5dbbd2d4458d7e8094846420da595dfc3
SHA1267cb47b904f14a519d2bd73abfdb30e1a06e1a6
SHA256e27390d57580e3dfba07bec3d8e430203bbc91e90f6937079b3fd52abc721bd4
SHA512480e7ca865b811f79f35fcfe7a9ac0280b48d1f9459873d18f000db55c72d53345cf3a10075c1ac407439545f699ce2a7bef38b00b4e19439edf384b00045531
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize1KB
MD5f2dd68ab8e611f0143c6ad176f223ae9
SHA130f580175773f251a9572fe757de6eaef6844abc
SHA256f935809085e90f8fc2c003afb46e81de28f3312ec097cf46f2bdc2488cb893e7
SHA512f664b850c2fc6773e48171be5c180d8bc5c3a27945f5e6604605006a3c93e0bf3a516b647d6411a4d6b75bdf0a5e15b4f3621bf5702bbc3c46f9b517cb69dd04
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize1KB
MD55f2ee01ec612bd9f5bbdbe2cb2364edb
SHA146d22b155f8c92c4416577cfff3e105d9ae4f96e
SHA256bf99889c6909a04834949a53dbafedd037db3a7903425f21f695d3301eafe37a
SHA512cf688c50f0cdaca2ba3ef8d8eb145c7410a1c5db6d0ddfa3f995b9b6c82ad5caa4fea928093431ccea08ecd46c623494635a09527ceb319b6c969ba0335f4f20
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize1KB
MD5b53a6b227547a15255ef16a2040f856d
SHA156f9d2052a7a718cc821ce3a6651978ebfe99197
SHA2566808e5418d756190eff5353ff86c6a1ded314a09a494fd37e0d321e5902ae201
SHA512b82cb7f6c1a545a87053b6dbe8c32f47bdbd24022c9b067ddabdf482d784bae75078cf6eaefb79ade64250c1947bb35f36ea1011bbea5949ddf04dfc6cf5f49e
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize1KB
MD5a72576d788e89ddbf37b8f157a7b5465
SHA10d6cc1ed08a31083520485c48f429c1f5da6c93a
SHA256585c9ec0c139e75c7639b29685933fa6f2b50b688d069ea6b3a9f1011494f24b
SHA512ba3792cb1756a71c63831ef8db05b4317c798687764c0eaa7e748b612b333233c4686634e3034dd7b2b5473b777338256a3b203ceb463e68f979cdeeadb5c3de
-
Filesize
43KB
MD56b44f7785d4ce45ede1b02681227d987
SHA1444d76fb81d4fbeb9c1a2011d2de8f2b8ff0084a
SHA2562c85b511ff201346d1e6c2ab300445ad263ed40192c1748ec10fa02f6aa05186
SHA51283f96b49bf619aa8fd89a7fb7be282d7a06e6ae0dd8f42ef8ad9e1832a889d9dc3b8920989cea5fbecfec63dd894f49d5ad1d2d25894de7b523add0539d1de55