Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-06-2024 01:40

General

  • Target

    af77c0b6a10ac159b0e3c87c02e16a2b44daab8e67fe097327e90ae48f814403.exe

  • Size

    36.5MB

  • MD5

    0e12bdd2a8200d4c1f368750e2c87bfe

  • SHA1

    6c8b533e2c7f6ebef027971c3a06f4c55ed64cfe

  • SHA256

    af77c0b6a10ac159b0e3c87c02e16a2b44daab8e67fe097327e90ae48f814403

  • SHA512

    909f15876f3a6cbe608eb53df4286927b013c45ff6acbc496a1590b9cc3fe47b1bb449ed45c3302f6d03cccb876cd2cc26f2b5e7c1ca4ff2d17dd4dee77bf75b

  • SSDEEP

    393216:sYJEy4Te0rrigZ9BCbZPBKAgKBXSTzdOskYXXDeycerzHP+THt+/nDSpQg:sYJcrlZ9BGfg8XIJOkXXPCTV

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 16 IoCs

    Using powershell.exe command.

  • Creates new service(s) 2 TTPs
  • Executes dropped EXE 5 IoCs
  • Power Settings 1 TTPs 5 IoCs

    powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

  • Drops file in System32 directory 20 IoCs
  • Launches sc.exe 4 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Embeds OpenSSL 1 IoCs

    Embeds OpenSSL, may be used to circumvent TLS interception.

  • Kills process with taskkill 13 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 60 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\af77c0b6a10ac159b0e3c87c02e16a2b44daab8e67fe097327e90ae48f814403.exe
    "C:\Users\Admin\AppData\Local\Temp\af77c0b6a10ac159b0e3c87c02e16a2b44daab8e67fe097327e90ae48f814403.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4484
    • C:\Users\Admin\AppData\Local\Temp\af77c0b6a10ac159b0e3c87c02e16a2b44daab8e67fe097327e90ae48f814403-f533bb1940ce1cd3\af77c0b6a10ac159b0e3c87c02e16a2b44daab8e67fe097327e90ae48f814403.exe
      "C:\Users\Admin\AppData\Local\Temp\af77c0b6a10ac159b0e3c87c02e16a2b44daab8e67fe097327e90ae48f814403-f533bb1940ce1cd3\af77c0b6a10ac159b0e3c87c02e16a2b44daab8e67fe097327e90ae48f814403.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:3608
      • C:\Windows\system32\winsvc.exe
        "C:\Windows\system32\winsvc.exe" "C:\Users\Admin\AppData\Local\Temp\af77c0b6a10ac159b0e3c87c02e16a2b44daab8e67fe097327e90ae48f814403-f533bb1940ce1cd3\af77c0b6a10ac159b0e3c87c02e16a2b44daab8e67fe097327e90ae48f814403.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3712
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" "-WindowStyle" "Hidden" "-Command" "&" "\"C:\Windows\system32\sc.exe\"" "create" "winsvc" "type=own" "start=auto" "error=ignore" "binPath=\"C:\Windows\system32\winsvc.exe\"" "DisplayName=\"Windows System Service\""
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2156
          • C:\Windows\system32\sc.exe
            "C:\Windows\system32\sc.exe" create winsvc type=own start=auto error=ignore binPath=C:\Windows\system32\winsvc.exe "DisplayName=Windows System Service"
            5⤵
            • Launches sc.exe
            PID:1640
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" "-WindowStyle" "Hidden" "-Command" "&" "\"C:\Windows\system32\sc.exe\"" "failure" "winsvc" "reset=0" "actions=restart/0/restart/0/restart/0"
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3828
          • C:\Windows\system32\sc.exe
            "C:\Windows\system32\sc.exe" failure winsvc reset=0 actions=restart/0/restart/0/restart/0
            5⤵
            • Launches sc.exe
            PID:3476
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" "-WindowStyle" "Hidden" "-Command" "&" "\"C:\Windows\system32\sc.exe\"" "description" "winsvc" "\"Windows System Service is the main system supervision service.\""
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3216
          • C:\Windows\system32\sc.exe
            "C:\Windows\system32\sc.exe" description winsvc "Windows System Service is the main system supervision service."
            5⤵
            • Launches sc.exe
            PID:4188
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" "-WindowStyle" "Hidden" "-Command" "&" "\"C:\Windows\system32\sc.exe\"" "start" "winsvc"
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1664
          • C:\Windows\system32\sc.exe
            "C:\Windows\system32\sc.exe" start winsvc
            5⤵
            • Launches sc.exe
            PID:4292
  • C:\Windows\system32\winsvc.exe
    C:\Windows\system32\winsvc.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1444
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" "-WindowStyle" "Hidden" "-Command" "Add-MpPreference" "-ExclusionPath" "\"C:\Windows\system32\""
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Drops file in System32 directory
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4108
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" "-WindowStyle" "Hidden" "-Command" "Add-MpPreference" "-ExclusionPath" "\"C:\Windows\Temp\""
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Modifies data under HKEY_USERS
      PID:1660
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" "-WindowStyle" "Hidden" "-Command" "&" "powercfg.exe" "-SETACTIVE" "8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Drops file in System32 directory
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4484
      • C:\Windows\system32\powercfg.exe
        "C:\Windows\system32\powercfg.exe" -SETACTIVE 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c
        3⤵
        • Power Settings
        • Suspicious use of AdjustPrivilegeToken
        PID:3152
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" "-WindowStyle" "Hidden" "-Command" "&" "powercfg.exe" "-change" "standby-timeout-ac" "0"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Drops file in System32 directory
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4364
      • C:\Windows\system32\powercfg.exe
        "C:\Windows\system32\powercfg.exe" -change standby-timeout-ac 0
        3⤵
        • Power Settings
        • Suspicious use of AdjustPrivilegeToken
        PID:4468
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" "-WindowStyle" "Hidden" "-Command" "&" "powercfg.exe" "-change" "standby-timeout-dc" "0"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Drops file in System32 directory
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4340
      • C:\Windows\system32\powercfg.exe
        "C:\Windows\system32\powercfg.exe" -change standby-timeout-dc 0
        3⤵
        • Power Settings
        • Suspicious use of AdjustPrivilegeToken
        PID:2708
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" "-WindowStyle" "Hidden" "-Command" "&" "powercfg.exe" "-change" "hibernate-timeout-ac" "0"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Drops file in System32 directory
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2292
      • C:\Windows\system32\powercfg.exe
        "C:\Windows\system32\powercfg.exe" -change hibernate-timeout-ac 0
        3⤵
        • Power Settings
        • Suspicious use of AdjustPrivilegeToken
        PID:1680
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" "-WindowStyle" "Hidden" "-Command" "&" "powercfg.exe" "-change" "hibernate-timeout-dc" "0"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Drops file in System32 directory
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2976
      • C:\Windows\system32\powercfg.exe
        "C:\Windows\system32\powercfg.exe" -change hibernate-timeout-dc 0
        3⤵
        • Power Settings
        • Suspicious use of AdjustPrivilegeToken
        PID:5112
    • C:\Windows\system32\taskkill.exe
      "taskkill.exe" "/F" "/IM" "winnet.exe"
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:1340
    • C:\Windows\system32\taskkill.exe
      "taskkill.exe" "/F" "/IM" "winnet.exe"
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:3144
    • C:\Windows\system32\taskkill.exe
      "taskkill.exe" "/F" "/IM" "wincfg.exe"
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:2340
    • C:\Windows\system32\taskkill.exe
      "taskkill.exe" "/F" "/IM" "wincfg.exe"
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:3076
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" "-WindowStyle" "Hidden" "-Command" "Remove-NetFirewallRule" "-DisplayName" "\"Windows Network Manager\""
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Drops file in System32 directory
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1600
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" "-WindowStyle" "Hidden" "-Command" "New-NetFirewallRule" "-DisplayName" "\"Windows Network Manager\"" "-Program" "\"C:\Windows\system32\winnet.exe\"" "-Action" "Allow" "-Direction" "Inbound" "-EdgeTraversalPolicy" "Allow" "-Enabled" "True"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Drops file in System32 directory
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4636
    • C:\Windows\system32\taskkill.exe
      "taskkill.exe" "/F" "/IM" "WINNET.exe"
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:2668
    • C:\Windows\system32\taskkill.exe
      "taskkill.exe" "/F" "/IM" "WINNET.exe"
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:4528
    • C:\Windows\system32\taskkill.exe
      "taskkill.exe" "/F" "/IM" "WINCFG.exe"
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:3108
    • C:\Windows\system32\taskkill.exe
      "taskkill.exe" "/F" "/IM" "WINCFG.exe"
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:4220
    • C:\Windows\system32\taskkill.exe
      "taskkill.exe" "/F" "/IM" "WINNET.exe"
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:468
    • C:\Windows\system32\taskkill.exe
      "taskkill.exe" "/F" "/IM" "WINCFG.exe"
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:3348
    • C:\Windows\system32\taskkill.exe
      "taskkill.exe" "/F" "/IM" "WINNET.exe"
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:2620
    • C:\Windows\system32\taskkill.exe
      "taskkill.exe" "/F" "/IM" "WINCFG.exe"
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:4504
    • C:\WINDOWS\SYSTEM32\WINCFG.EXE
      "C:\WINDOWS\SYSTEM32\WINCFG.EXE"
      2⤵
      • Executes dropped EXE
      PID:2824
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe" "-Command" "&" "taskkill.exe" "/F" "/PID" "2824"
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious use of AdjustPrivilegeToken
        PID:2788
        • C:\Windows\system32\taskkill.exe
          "C:\Windows\system32\taskkill.exe" /F /PID 2824
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1608
    • C:\WINDOWS\SYSTEM32\WINNET.EXE
      "C:\WINDOWS\SYSTEM32\WINNET.EXE" "--datadir=C:\Windows\system32\data" "--precomputation.elgamal=false" "--persist.profiles=false" "--persist.addressbook=false" "--cpuext.aesni" "--cpuext.avx" "--ipv4" "--ipv6" "--bandwidth=X" "--share=100" "--floodfill" "--nat" "--upnp.enabled=true" "--upnp.name=Microsoft" "--insomnia" "--nettime.enabled=true" "--nettime.ntpsyncinterval=1" "--sam.enabled=true" "--sam.singlethread=false" "--http.enabled=false" "--bob.enabled=false" "--httpproxy.enabled=false" "--socksproxy.enabled=false" "--i2cp.enabled=false" "--i2pcontrol.enabled=false" "--loglevel=none" "--log=stdout"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      PID:2968

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
    Filesize

    2KB

    MD5

    d85ba6ff808d9e5444a4b369f5bc2730

    SHA1

    31aa9d96590fff6981b315e0b391b575e4c0804a

    SHA256

    84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

    SHA512

    8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    64B

    MD5

    d8b9a260789a22d72263ef3bb119108c

    SHA1

    376a9bd48726f422679f2cd65003442c0b6f6dd5

    SHA256

    d69d47e428298f194850d14c3ce375e7926128a0bfb62c1e75940ab206f8fddc

    SHA512

    550314fab1e363851a7543c989996a440d95f7c9db9695cce5abaad64523f377f48790aa091d66368f50f941179440b1fa94448289ee514d5b5a2f4fe6225e9b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    64B

    MD5

    446dd1cf97eaba21cf14d03aebc79f27

    SHA1

    36e4cc7367e0c7b40f4a8ace272941ea46373799

    SHA256

    a7de5177c68a64bd48b36d49e2853799f4ebcfa8e4761f7cc472f333dc5f65cf

    SHA512

    a6d754709f30b122112ae30e5ab22486393c5021d33da4d1304c061863d2e1e79e8aeb029cae61261bb77d0e7becd53a7b0106d6ea4368b4c302464e3d941cf7

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_zznjvuzh.rwp.ps1
    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Temp\af77c0b6a10ac159b0e3c87c02e16a2b44daab8e67fe097327e90ae48f814403-f533bb1940ce1cd3\af77c0b6a10ac159b0e3c87c02e16a2b44daab8e67fe097327e90ae48f814403.exe
    Filesize

    41.6MB

    MD5

    312c3e03890f7d5242fe2158acabd4e8

    SHA1

    d148cf18f876b55c03f2718bfff321b7d6287f87

    SHA256

    6ac290f077cd4228dff7dc37a4c37e0a675207ad345543e8cd01008ce67ea751

    SHA512

    da0e5c199a7ab586a17dd7b74cc4b6727ac5c9efcb3397b45f8806a6418c20bfc7515804ca10e2a9c52b207b56f3a56c86e3c3be646ffe27f988c59b0bc66971

  • C:\WINDOWS\SYSTEM32\WINCFG.EXE
    Filesize

    34.1MB

    MD5

    cd89e8bcf1dbd9fc74f86c82e7f86342

    SHA1

    a3c83b002d1959507ea04c099eb64965e054819b

    SHA256

    593600fd2242a51c5eef3f33d7c0df33e01f3b71f065faf403298898ef378a21

    SHA512

    0f8fc35ead17930b2741771b15ec97a85b26db3e8a56e68ba67bea53e0e954af0754e79f22c31bbe8f52564759d456281d4fccb1a645d120f2dd938c88e00ab2

  • C:\Windows\System32\data\router.info
    Filesize

    931B

    MD5

    b348e0d9a5a92350163aeaa8afa87e94

    SHA1

    4e39665a92ea98f9ec7ce1ee26b22e3c557b674e

    SHA256

    f125112f05694373a76dcba37b8e5ea2a881a710f7cfc0ebcdbd56c95d3cf6bf

    SHA512

    0b67a9f16954bb1266277d145961adc0fc589a58f8b3f27c9c0a36bfb45f97cb3acb223fbdfb5de0373b03c139d3bf98e65ca999720052b8f78b6140e93a63d4

  • C:\Windows\System32\winnet.exe
    Filesize

    9.1MB

    MD5

    2fdbf4ba6ab24cf44aa0cc08cd77ca66

    SHA1

    df5e034ba45a932b9f5d3ed7adc4a71e0b376984

    SHA256

    fcd362e0632b35dad13a87f09ea6da4d07fa89516f42d64236d2cc3e3b2b725b

    SHA512

    81d73f7540ede7337922dc18fc6b110c87f621bc0349c3fa17f50d1cb924b0d9b30a4a772b2d548238b65a1be43d458f1991320e7308e608c6cf40ccc3e59a51

  • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
    Filesize

    4KB

    MD5

    bdb25c22d14ec917e30faf353826c5de

    SHA1

    6c2feb9cea9237bc28842ebf2fea68b3bd7ad190

    SHA256

    e3274ce8296f2cd20e3189576fbadbfa0f1817cdf313487945c80e968589a495

    SHA512

    b5eddbfd4748298a302e2963cfd12d849130b6dcb8f0f85a2a623caed0ff9bd88f4ec726f646dbebfca4964adc35f882ec205113920cb546cc08193739d6728c

  • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    1KB

    MD5

    7e428aea1e8381e89378ab3addbcf298

    SHA1

    5d3854328868b928a07681e749117d6f100b94e4

    SHA256

    fcec6e8957187a65bb03233f86174a1b38be96dad3e7091afe02c665ee025bb8

    SHA512

    4937f2824bd9f066342542065a9b7ee8de9667c839c5caa3b2eba3fe030ee9a2c77708cf773a3e916cde1ede8387756ee54eea64a5e60692c3d0e8aed21d2a2e

  • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    64B

    MD5

    548921eca7a64dd1dab79cdf3cc2d85f

    SHA1

    d8c16a514039415f846a225cff18e49dde27025e

    SHA256

    54f3a589f4dec7aef1cfbdf607a63fd85b079f680aacda9b5853c2e9388afaa5

    SHA512

    86a1df01a024ee4b8df2cbdd4a478b2351a31f2aa981c8beb05282c9a9bf349d78b1a35729356c38d8f7b39ac2f7485df0594780a83b34d11b54ee8f643e2a07

  • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    944B

    MD5

    8857491a4a65a9a1d560c4705786a312

    SHA1

    4f3caf2ad5d66a2410c9cca0381d26a46e832cb4

    SHA256

    b6e1a16a11075cb4e0bae0cebdb6ac15f5d66e0005f557703708a04cd11bd360

    SHA512

    d9497c47898cdc4c4fc62158830dc931990e08bb4a28a5d19d4187a87a2afab8a4bd58ca346563210b476c9adb9a714bfe1057e0ebce85d1fd94731be6d02660

  • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    944B

    MD5

    5f9c43a636a84c0909aa1a864dbff7fe

    SHA1

    017b0ede06b0d78b600c262fd8bddc389d999e0a

    SHA256

    5a8ec9f0692a8f3a5cfa951fc98a79741764c1ec29ff1baacf4a836f7a7fe5c4

    SHA512

    928c8dc937bb7cde194be9490129901e4e488d2e0791cc1d8e8a4dec89d4eeed39ef4e8e2318f398a9acf380bf0b453a334a7d391ae4cf72233d12ac7e1dfd75

  • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    944B

    MD5

    a316ebd4efa11d6b6daf6af0cc1aebce

    SHA1

    ab338dd719969c70590dbc039b90e2758c741762

    SHA256

    f7308f111e3910da5c34c4d06d78d692f44419f848f5bf886fd466d5a96ad014

    SHA512

    67a9b94b704222a1bbe02fa8780c6b9bd364c8581b693ca28c6a444fde160df216304426bacf6b01909b80540cf0add79669b7a88ca260a6fbc93c4742f36c5a

  • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    944B

    MD5

    2ad33642f863ae14ee53bc6853ee330e

    SHA1

    ca81cc7d8c33a46ebe97bc1d3db55e41a813029e

    SHA256

    17c7b3c895766071a0d87318ec4134a9032ed113b46d3ba75889819a61a9cc19

    SHA512

    52c59a7bde3751e07da53f3942c15cc3e19a4bf1929fbc28ae568ed96531852747b4f724e01438e159c4c98bf2d846db205c48e32f4b5984e9fddeb936eb8aa9

  • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    1KB

    MD5

    96e66c6151c6ef0aa0810f6b2896f65b

    SHA1

    0191114d00782a6fe104cb07f1797238ee5e0136

    SHA256

    22074d71dbf4636080ee3b4af53612f2f1c6b0fd1dfb2e18893d267e60f3d06d

    SHA512

    e7999e91eafe60a06366ec10565265f5517fd5f8f5fceb2ef86816752b6ed1700c80a49babd84e1beab63413e71a8637174438a4dfe6f0bcc846641d83fad982

  • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    1KB

    MD5

    c5977b7d0932128d8d3d9f7eea16d23d

    SHA1

    b82c8c4e40f1b464cc7cb66bc7234b507d9669a1

    SHA256

    28017809e80371a7e7ee82e031a0e0c55426090a1def12cadbad0b6520c2395c

    SHA512

    41cf5fe75403f1c643b93b2298eb1d85e2dd3cee929ef582b0e9d61ab8088db728487f37e5f9150fc998b94e484bdb276b05feb9e4f4b57f990dbd5257cdf36e

  • memory/1444-69-0x00007FF778CB0000-0x00007FF778CC0000-memory.dmp
    Filesize

    64KB

  • memory/1444-68-0x00007FF778CA0000-0x00007FF778CB0000-memory.dmp
    Filesize

    64KB

  • memory/1600-194-0x000001C5711A0000-0x000001C5711BA000-memory.dmp
    Filesize

    104KB

  • memory/1600-193-0x000001C571140000-0x000001C57114E000-memory.dmp
    Filesize

    56KB

  • memory/2156-22-0x000002C8EAD00000-0x000002C8EAD22000-memory.dmp
    Filesize

    136KB

  • memory/2968-253-0x00007FF67F710000-0x00007FF68003C000-memory.dmp
    Filesize

    9.2MB

  • memory/4108-92-0x000001C9982A0000-0x000001C9982BC000-memory.dmp
    Filesize

    112KB

  • memory/4108-99-0x000001C9984D0000-0x000001C9984D6000-memory.dmp
    Filesize

    24KB

  • memory/4108-100-0x000001C9FDCE0000-0x000001C9FDCEA000-memory.dmp
    Filesize

    40KB

  • memory/4108-98-0x000001C9984C0000-0x000001C9984C8000-memory.dmp
    Filesize

    32KB

  • memory/4108-97-0x000001C9FFF20000-0x000001C9FFF3A000-memory.dmp
    Filesize

    104KB

  • memory/4108-96-0x000001C9FDB90000-0x000001C9FDB9A000-memory.dmp
    Filesize

    40KB

  • memory/4108-95-0x000001C9FFF00000-0x000001C9FFF1C000-memory.dmp
    Filesize

    112KB

  • memory/4108-94-0x000001C9FDB80000-0x000001C9FDB8A000-memory.dmp
    Filesize

    40KB

  • memory/4108-93-0x000001C9982C0000-0x000001C998375000-memory.dmp
    Filesize

    724KB