Malware Analysis Report

2024-08-06 18:37

Sample ID 240518-klkv9scb59
Target 2024-05-18_7a072413981fe91978c58ae13cda3766_ngrbot_snatch
SHA256 2b83224eb8a3b749f36c78780d727898233e371572269af2d0853c63d470cfee
Tags
xenorat evasion execution rat spyware stealer trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

2b83224eb8a3b749f36c78780d727898233e371572269af2d0853c63d470cfee

Threat Level: Known bad

The file 2024-05-18_7a072413981fe91978c58ae13cda3766_ngrbot_snatch was found to be: Known bad.

Malicious Activity Summary

xenorat evasion execution rat spyware stealer trojan

Detects executables containing possible sandbox system UUIDs

Detects executables embedding registry key / value combination indicative of disabling Windows Defender features

XenorRat

Detects executables referencing virtualization MAC addresses

Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.

Detects executables manipulated with Fody

Modifies Windows Firewall

Command and Scripting Interpreter: PowerShell

Reads user/profile data of web browsers

Checks computer location settings

Executes dropped EXE

Unsigned PE

Enumerates physical storage devices

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

Creates scheduled task(s)

Suspicious use of SetWindowsHookEx

Views/modifies file attributes

Suspicious use of WriteProcessMemory

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-05-18 08:41

Signatures

Detects executables containing possible sandbox system UUIDs

Description Indicator Process Target
N/A N/A N/A N/A

Detects executables embedding registry key / value combination indicative of disabling Windows Defender features

Description Indicator Process Target
N/A N/A N/A N/A

Detects executables referencing virtualization MAC addresses

Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-18 08:41

Reported

2024-05-18 08:44

Platform

win7-20240508-en

Max time kernel

121s

Max time network

130s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2024-05-18_7a072413981fe91978c58ae13cda3766_ngrbot_snatch.exe"

Signatures

N/A

Processes

C:\Users\Admin\AppData\Local\Temp\2024-05-18_7a072413981fe91978c58ae13cda3766_ngrbot_snatch.exe

"C:\Users\Admin\AppData\Local\Temp\2024-05-18_7a072413981fe91978c58ae13cda3766_ngrbot_snatch.exe"

Network

N/A

Files

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-18 08:41

Reported

2024-05-18 08:43

Platform

win10v2004-20240426-en

Max time kernel

150s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2024-05-18_7a072413981fe91978c58ae13cda3766_ngrbot_snatch.exe"

Signatures

XenorRat

trojan rat xenorat

Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.

Description Indicator Process Target
N/A N/A N/A N/A

Detects executables manipulated with Fody

Description Indicator Process Target
N/A N/A N/A N/A

Command and Scripting Interpreter: PowerShell

execution
Description Indicator Process Target
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\netsh.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\3886209194.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\3886209194.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\XenoManager\3886209194.exe N/A

Reads user/profile data of web browsers

spyware stealer

Enumerates physical storage devices

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\XenoManager\3886209194.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\XenoManager\3886209194.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\XenoManager\3886209194.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\XenoManager\3886209194.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\XenoManager\3886209194.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\XenoManager\3886209194.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\XenoManager\3886209194.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\XenoManager\3886209194.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\XenoManager\3886209194.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\XenoManager\3886209194.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\XenoManager\3886209194.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\XenoManager\3886209194.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\XenoManager\3886209194.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\XenoManager\3886209194.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\XenoManager\3886209194.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\XenoManager\3886209194.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\XenoManager\3886209194.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\XenoManager\3886209194.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\XenoManager\3886209194.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\XenoManager\3886209194.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\XenoManager\3886209194.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\XenoManager\3886209194.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\XenoManager\3886209194.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\XenoManager\3886209194.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\XenoManager\3886209194.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\XenoManager\3886209194.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\XenoManager\3886209194.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\XenoManager\3886209194.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\XenoManager\3886209194.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\XenoManager\3886209194.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\XenoManager\3886209194.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\XenoManager\3886209194.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\XenoManager\3886209194.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\XenoManager\3886209194.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\XenoManager\3886209194.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\XenoManager\3886209194.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\XenoManager\3886209194.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\XenoManager\3886209194.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\XenoManager\3886209194.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\XenoManager\3886209194.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\XenoManager\3886209194.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\XenoManager\3886209194.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\XenoManager\3886209194.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\XenoManager\3886209194.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\XenoManager\3886209194.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\XenoManager\3886209194.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\XenoManager\3886209194.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\XenoManager\3886209194.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\XenoManager\3886209194.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\XenoManager\3886209194.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\XenoManager\3886209194.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\XenoManager\3886209194.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\XenoManager\3886209194.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\XenoManager\3886209194.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\XenoManager\3886209194.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4524 wrote to memory of 4076 N/A C:\Users\Admin\AppData\Local\Temp\2024-05-18_7a072413981fe91978c58ae13cda3766_ngrbot_snatch.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4524 wrote to memory of 4076 N/A C:\Users\Admin\AppData\Local\Temp\2024-05-18_7a072413981fe91978c58ae13cda3766_ngrbot_snatch.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4524 wrote to memory of 5912 N/A C:\Users\Admin\AppData\Local\Temp\2024-05-18_7a072413981fe91978c58ae13cda3766_ngrbot_snatch.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4524 wrote to memory of 5912 N/A C:\Users\Admin\AppData\Local\Temp\2024-05-18_7a072413981fe91978c58ae13cda3766_ngrbot_snatch.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4524 wrote to memory of 3480 N/A C:\Users\Admin\AppData\Local\Temp\2024-05-18_7a072413981fe91978c58ae13cda3766_ngrbot_snatch.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4524 wrote to memory of 3480 N/A C:\Users\Admin\AppData\Local\Temp\2024-05-18_7a072413981fe91978c58ae13cda3766_ngrbot_snatch.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4524 wrote to memory of 5220 N/A C:\Users\Admin\AppData\Local\Temp\2024-05-18_7a072413981fe91978c58ae13cda3766_ngrbot_snatch.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4524 wrote to memory of 5220 N/A C:\Users\Admin\AppData\Local\Temp\2024-05-18_7a072413981fe91978c58ae13cda3766_ngrbot_snatch.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4524 wrote to memory of 3740 N/A C:\Users\Admin\AppData\Local\Temp\2024-05-18_7a072413981fe91978c58ae13cda3766_ngrbot_snatch.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4524 wrote to memory of 3740 N/A C:\Users\Admin\AppData\Local\Temp\2024-05-18_7a072413981fe91978c58ae13cda3766_ngrbot_snatch.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4524 wrote to memory of 5108 N/A C:\Users\Admin\AppData\Local\Temp\2024-05-18_7a072413981fe91978c58ae13cda3766_ngrbot_snatch.exe C:\Windows\system32\cmd.exe
PID 4524 wrote to memory of 5108 N/A C:\Users\Admin\AppData\Local\Temp\2024-05-18_7a072413981fe91978c58ae13cda3766_ngrbot_snatch.exe C:\Windows\system32\cmd.exe
PID 5108 wrote to memory of 5172 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 5108 wrote to memory of 5172 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 4524 wrote to memory of 5024 N/A C:\Users\Admin\AppData\Local\Temp\2024-05-18_7a072413981fe91978c58ae13cda3766_ngrbot_snatch.exe C:\Windows\system32\attrib.exe
PID 4524 wrote to memory of 5024 N/A C:\Users\Admin\AppData\Local\Temp\2024-05-18_7a072413981fe91978c58ae13cda3766_ngrbot_snatch.exe C:\Windows\system32\attrib.exe
PID 4524 wrote to memory of 5500 N/A C:\Users\Admin\AppData\Local\Temp\2024-05-18_7a072413981fe91978c58ae13cda3766_ngrbot_snatch.exe C:\Users\Admin\AppData\Local\Temp\3886209194.exe
PID 4524 wrote to memory of 5500 N/A C:\Users\Admin\AppData\Local\Temp\2024-05-18_7a072413981fe91978c58ae13cda3766_ngrbot_snatch.exe C:\Users\Admin\AppData\Local\Temp\3886209194.exe
PID 4524 wrote to memory of 5500 N/A C:\Users\Admin\AppData\Local\Temp\2024-05-18_7a072413981fe91978c58ae13cda3766_ngrbot_snatch.exe C:\Users\Admin\AppData\Local\Temp\3886209194.exe
PID 5500 wrote to memory of 5292 N/A C:\Users\Admin\AppData\Local\Temp\3886209194.exe C:\Users\Admin\AppData\Roaming\XenoManager\3886209194.exe
PID 5500 wrote to memory of 5292 N/A C:\Users\Admin\AppData\Local\Temp\3886209194.exe C:\Users\Admin\AppData\Roaming\XenoManager\3886209194.exe
PID 5500 wrote to memory of 5292 N/A C:\Users\Admin\AppData\Local\Temp\3886209194.exe C:\Users\Admin\AppData\Roaming\XenoManager\3886209194.exe
PID 5292 wrote to memory of 752 N/A C:\Users\Admin\AppData\Roaming\XenoManager\3886209194.exe C:\Windows\SysWOW64\schtasks.exe
PID 5292 wrote to memory of 752 N/A C:\Users\Admin\AppData\Roaming\XenoManager\3886209194.exe C:\Windows\SysWOW64\schtasks.exe
PID 5292 wrote to memory of 752 N/A C:\Users\Admin\AppData\Roaming\XenoManager\3886209194.exe C:\Windows\SysWOW64\schtasks.exe

Views/modifies file attributes

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\attrib.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\2024-05-18_7a072413981fe91978c58ae13cda3766_ngrbot_snatch.exe

"C:\Users\Admin\AppData\Local\Temp\2024-05-18_7a072413981fe91978c58ae13cda3766_ngrbot_snatch.exe"

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell -Command Add-MpPreference -ExclusionExtension C:\Users\Admin\AppData\Local\Temp\*.exe

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell Set-MpPreference -PUAProtection 0

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell Set-MpPreference -SubmitSamplesConsent 2

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell Set-MpPreference -DisableRealtimeMonitoring $true

C:\Windows\system32\cmd.exe

cmd /C netsh advfirewall set allprofiles state off

C:\Windows\system32\netsh.exe

netsh advfirewall set allprofiles state off

C:\Windows\system32\attrib.exe

attrib +h +s C:\Users\Admin\AppData\Local\Temp\2024-05-18_7a072413981fe91978c58ae13cda3766_ngrbot_snatch.exe

C:\Users\Admin\AppData\Local\Temp\3886209194.exe

C:\Users\Admin\AppData\Local\Temp\3886209194.exe

C:\Users\Admin\AppData\Roaming\XenoManager\3886209194.exe

"C:\Users\Admin\AppData\Roaming\XenoManager\3886209194.exe"

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /Create /TN "XenoUpdateManager" /XML "C:\Users\Admin\AppData\Local\Temp\tmp784D.tmp" /F

Network

Country Destination Domain Proto
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
US 8.8.8.8:53 0.204.248.87.in-addr.arpa udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 68.159.190.20.in-addr.arpa udp
NL 23.62.61.97:443 www.bing.com tcp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 97.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 55.36.223.20.in-addr.arpa udp
NL 23.62.61.97:443 www.bing.com tcp
US 8.8.8.8:53 28.118.140.52.in-addr.arpa udp
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 69.46.15.141:4444 tcp
US 8.8.8.8:53 141.15.46.69.in-addr.arpa udp
US 69.46.15.141:4444 tcp
US 69.46.15.141:4444 tcp
US 69.46.15.141:4444 tcp
US 69.46.15.141:4444 tcp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 79.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 21.236.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 205.47.74.20.in-addr.arpa udp
US 8.8.8.8:53 200.197.79.204.in-addr.arpa udp

Files

memory/4076-0-0x00007FFA58B13000-0x00007FFA58B15000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_2azqikd4.0yk.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/4076-10-0x0000020D329D0000-0x0000020D329F2000-memory.dmp

memory/4076-11-0x00007FFA58B10000-0x00007FFA595D1000-memory.dmp

memory/4076-12-0x00007FFA58B10000-0x00007FFA595D1000-memory.dmp

memory/4076-15-0x00007FFA58B10000-0x00007FFA595D1000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

MD5 d85ba6ff808d9e5444a4b369f5bc2730
SHA1 31aa9d96590fff6981b315e0b391b575e4c0804a
SHA256 84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA512 8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

memory/5912-27-0x00007FFA58B10000-0x00007FFA595D1000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 cadef9abd087803c630df65264a6c81c
SHA1 babbf3636c347c8727c35f3eef2ee643dbcc4bd2
SHA256 cce65b73cdfe9304bcd5207913e8b60fb69faa20cd3b684f2b0343b755b99438
SHA512 7278aa87124abb382d9024a645e881e7b7cf1b84e8894943b36e018dbf0399e6858392f77980b599fa5488e2e21bf757a0702fe6419417edac93b68e0c2ec085

memory/5912-28-0x00007FFA58B10000-0x00007FFA595D1000-memory.dmp

memory/5912-29-0x00007FFA58B10000-0x00007FFA595D1000-memory.dmp

memory/5912-31-0x00007FFA58B10000-0x00007FFA595D1000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 d8cb3e9459807e35f02130fad3f9860d
SHA1 5af7f32cb8a30e850892b15e9164030a041f4bd6
SHA256 2b139c74072ccbdaa17b950f32a6dbc934dfb7af9973d97c9b0d9c498012ba68
SHA512 045239ba31367fbdd59e883f74eafc05724e23bd6e8f0c1e7171ea2496a497eb9e0cfcb57285bb81c4d569daadba43d6ef64c626ca48f1e2a59e8d97f0cc9184

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 c65738617888921a153bd9b1ef516ee7
SHA1 5245e71ea3c181d76320c857b639272ac9e079b1
SHA256 4640ba4001fd16a593315299cbdd4988dc2c7075820687f1018aac40aca95c26
SHA512 2e2a0ebd93f9d8dd07a7599054bce232683e9add9a35e77b584618040bcfd84a42545352519ec4736cc379002210b6f3ed2d905591c6925c0981b0392b495bfa

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 c1a54dd5a1ab44cc4c4afd42f291c863
SHA1 b77043ab3582680fc96192e9d333a6be0ae0f69d
SHA256 c6dce870a896f3531ae7a10a0c2096d2eb7eb5989ae783aefea6150279502d75
SHA512 010f5093f58b0393d17c824a357513cf4f06239ccddd86c2e0581347ef3b8e7b93f869b0770bdaeb000e4fda7e14f49b9e45663a3839ab049446e9fe08ec535d

C:\Users\Admin\AppData\Local\Temp\3886209194.exe

MD5 6bc7ab284910610872d47f9cf42a8d55
SHA1 0e774a524c0a4043c7988edef661ff9902fcceef
SHA256 aa46487f9722d672ebcbdbd473d175ebe2608b5ac9cea822f33661fc43fa7cfc
SHA512 97eb72a54a4a1c98a0338b77e12d9101bdf2b717ef345f9fe9c2e67066b94cbea48ede706a8995900fbd0e9ca42f27f7e2bbb676c6fbd427e9e9c6a01f152915

memory/5500-71-0x00000000005D0000-0x00000000005E8000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\3886209194.exe.log

MD5 916851e072fbabc4796d8916c5131092
SHA1 d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA256 7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA512 07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

C:\Users\Admin\AppData\Local\Temp\tmp784D.tmp

MD5 84453390984eaaae54c58bd900b714d8
SHA1 4463bc46557f700335fa245f76ce0b58abc65a25
SHA256 44d1a263d002d35545c1be91fc51f9d97d869bd508a02d44f5e13ba5df339443
SHA512 c51b3af815827c33ad8e02fd5e08276dc7c6bc653559ba09412fdae8470271328092b833bc14794d189cfeef30b2d54c64a844afb1e5cd73c0cf70cf287cec24

memory/5292-87-0x00000000053E0000-0x0000000005446000-memory.dmp

memory/5292-88-0x0000000005790000-0x000000000579C000-memory.dmp

memory/5292-89-0x0000000005E90000-0x0000000006434000-memory.dmp

memory/5292-90-0x0000000005AF0000-0x0000000005B82000-memory.dmp

memory/5292-91-0x0000000005AD0000-0x0000000005ADA000-memory.dmp

memory/5292-92-0x0000000006540000-0x000000000663A000-memory.dmp

memory/5292-93-0x0000000006810000-0x00000000069D2000-memory.dmp

memory/5292-94-0x0000000006640000-0x0000000006690000-memory.dmp

memory/5292-95-0x0000000006710000-0x0000000006786000-memory.dmp

memory/5292-96-0x0000000006F10000-0x000000000743C000-memory.dmp

memory/5292-97-0x00000000067F0000-0x000000000680E000-memory.dmp

memory/5292-99-0x0000000006B00000-0x0000000006B9C000-memory.dmp