Malicious
Classifications
Spyware Injector
Threat Names
Mal/Generic-S
Dynamic Analysis Report
Created on 2022-03-27T00:50:00
a6ca5523fce6a4a43964319c35ecb868186465309e9226ab07c158519a5ef6f9.exe
Windows Exe (x86-32)
Remarks (1/1)
(0x0200004C): This sample is password protected and therefore could not be fully analyzed.
This is a filtered view
This list contains only the embedded files, downloaded files, and dropped files
Filters: |
There are no files for this filter
There are no files in this analysis
File Name | Category | Type | Verdict | Actions |
---|
C:\Users\RDhJ0CNFevzX\Desktop\a6ca5523fce6a4a43964319c35ecb868186465309e9226ab07c158519a5ef6f9.exe | Sample File | Binary |
malicious
|
...
|
»
File Reputation Information
»
Verdict |
malicious
|
Names | Mal/Generic-S |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x40352d |
Size Of Code | 0x6a00 |
Size Of Initialized Data | 0x2da00 |
Size Of Uninitialized Data | 0x800 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 2021-09-25 21:57:46+00:00 |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x401000 | 0x6897 | 0x6a00 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.46 |
.rdata | 0x408000 | 0x14a6 | 0x1600 | 0x6e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 5.02 |
.data | 0x40a000 | 0x2b018 | 0x600 | 0x8400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.15 |
.ndata | 0x436000 | 0x10000 | 0x0 | 0x0 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rsrc | 0x446000 | 0x42a8 | 0x4400 | 0x8a00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 4.14 |
Imports (7)
»
ADVAPI32.dll (13)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegCreateKeyExW | - | 0x408000 | 0x86b0 | 0x74b0 | 0x1d2 |
RegEnumKeyW | - | 0x408004 | 0x86b4 | 0x74b4 | 0x1e0 |
RegQueryValueExW | - | 0x408008 | 0x86b8 | 0x74b8 | 0x1f8 |
RegSetValueExW | - | 0x40800c | 0x86bc | 0x74bc | 0x205 |
RegCloseKey | - | 0x408010 | 0x86c0 | 0x74c0 | 0x1cb |
RegDeleteValueW | - | 0x408014 | 0x86c4 | 0x74c4 | 0x1d9 |
RegDeleteKeyW | - | 0x408018 | 0x86c8 | 0x74c8 | 0x1d7 |
AdjustTokenPrivileges | - | 0x40801c | 0x86cc | 0x74cc | 0x1c |
LookupPrivilegeValueW | - | 0x408020 | 0x86d0 | 0x74d0 | 0x150 |
OpenProcessToken | - | 0x408024 | 0x86d4 | 0x74d4 | 0x1ac |
SetFileSecurityW | - | 0x408028 | 0x86d8 | 0x74d8 | 0x22f |
RegOpenKeyExW | - | 0x40802c | 0x86dc | 0x74dc | 0x1ed |
RegEnumValueW | - | 0x408030 | 0x86e0 | 0x74e0 | 0x1e2 |
SHELL32.dll (6)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SHGetSpecialFolderLocation | - | 0x408178 | 0x8828 | 0x7628 | 0xc3 |
SHFileOperationW | - | 0x40817c | 0x882c | 0x762c | 0x9b |
SHBrowseForFolderW | - | 0x408180 | 0x8830 | 0x7630 | 0x7a |
SHGetPathFromIDListW | - | 0x408184 | 0x8834 | 0x7634 | 0xbd |
ShellExecuteExW | - | 0x408188 | 0x8838 | 0x7638 | 0x10a |
SHGetFileInfoW | - | 0x40818c | 0x883c | 0x763c | 0xad |
ole32.dll (5)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
OleInitialize | - | 0x408298 | 0x8948 | 0x7748 | 0xee |
OleUninitialize | - | 0x40829c | 0x894c | 0x774c | 0x105 |
CoCreateInstance | - | 0x4082a0 | 0x8950 | 0x7750 | 0x10 |
IIDFromString | - | 0x4082a4 | 0x8954 | 0x7754 | 0xc6 |
CoTaskMemFree | - | 0x4082a8 | 0x8958 | 0x7758 | 0x65 |
COMCTL32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
(by ordinal) | 0x11 | 0x408038 | 0x86e8 | 0x74e8 | - |
ImageList_Create | - | 0x40803c | 0x86ec | 0x74ec | 0x37 |
ImageList_Destroy | - | 0x408040 | 0x86f0 | 0x74f0 | 0x38 |
ImageList_AddMasked | - | 0x408044 | 0x86f4 | 0x74f4 | 0x34 |
USER32.dll (64)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetClientRect | - | 0x408194 | 0x8844 | 0x7644 | 0xff |
EndPaint | - | 0x408198 | 0x8848 | 0x7648 | 0xc8 |
DrawTextW | - | 0x40819c | 0x884c | 0x764c | 0xbf |
IsWindowEnabled | - | 0x4081a0 | 0x8850 | 0x7650 | 0x1ae |
DispatchMessageW | - | 0x4081a4 | 0x8854 | 0x7654 | 0xa2 |
wsprintfA | - | 0x4081a8 | 0x8858 | 0x7658 | 0x2d7 |
CharNextA | - | 0x4081ac | 0x885c | 0x765c | 0x2a |
CharPrevW | - | 0x4081b0 | 0x8860 | 0x7660 | 0x2f |
MessageBoxIndirectW | - | 0x4081b4 | 0x8864 | 0x7664 | 0x1e3 |
GetDlgItemTextW | - | 0x4081b8 | 0x8868 | 0x7668 | 0x114 |
SetDlgItemTextW | - | 0x4081bc | 0x886c | 0x766c | 0x254 |
GetSystemMetrics | - | 0x4081c0 | 0x8870 | 0x7670 | 0x15d |
FillRect | - | 0x4081c4 | 0x8874 | 0x7674 | 0xe2 |
AppendMenuW | - | 0x4081c8 | 0x8878 | 0x7678 | 0x9 |
TrackPopupMenu | - | 0x4081cc | 0x887c | 0x767c | 0x2a4 |
OpenClipboard | - | 0x4081d0 | 0x8880 | 0x7680 | 0x1f6 |
SetClipboardData | - | 0x4081d4 | 0x8884 | 0x7684 | 0x24a |
CloseClipboard | - | 0x4081d8 | 0x8888 | 0x7688 | 0x42 |
IsWindowVisible | - | 0x4081dc | 0x888c | 0x768c | 0x1b1 |
CallWindowProcW | - | 0x4081e0 | 0x8890 | 0x7690 | 0x1c |
GetMessagePos | - | 0x4081e4 | 0x8894 | 0x7694 | 0x13c |
CheckDlgButton | - | 0x4081e8 | 0x8898 | 0x7698 | 0x38 |
LoadCursorW | - | 0x4081ec | 0x889c | 0x769c | 0x1bd |
SetCursor | - | 0x4081f0 | 0x88a0 | 0x76a0 | 0x24d |
GetSysColor | - | 0x4081f4 | 0x88a4 | 0x76a4 | 0x15a |
SetWindowPos | - | 0x4081f8 | 0x88a8 | 0x76a8 | 0x283 |
GetWindowLongW | - | 0x4081fc | 0x88ac | 0x76ac | 0x16f |
PeekMessageW | - | 0x408200 | 0x88b0 | 0x76b0 | 0x201 |
SetClassLongW | - | 0x408204 | 0x88b4 | 0x76b4 | 0x248 |
GetSystemMenu | - | 0x408208 | 0x88b8 | 0x76b8 | 0x15c |
EnableMenuItem | - | 0x40820c | 0x88bc | 0x76bc | 0xc2 |
GetWindowRect | - | 0x408210 | 0x88c0 | 0x76c0 | 0x174 |
ScreenToClient | - | 0x408214 | 0x88c4 | 0x76c4 | 0x231 |
EndDialog | - | 0x408218 | 0x88c8 | 0x76c8 | 0xc6 |
RegisterClassW | - | 0x40821c | 0x88cc | 0x76cc | 0x219 |
SystemParametersInfoW | - | 0x408220 | 0x88d0 | 0x76d0 | 0x29a |
CreateWindowExW | - | 0x408224 | 0x88d4 | 0x76d4 | 0x61 |
GetClassInfoW | - | 0x408228 | 0x88d8 | 0x76d8 | 0xf9 |
DialogBoxParamW | - | 0x40822c | 0x88dc | 0x76dc | 0x9f |
CharNextW | - | 0x408230 | 0x88e0 | 0x76e0 | 0x2c |
ExitWindowsEx | - | 0x408234 | 0x88e4 | 0x76e4 | 0xe1 |
DestroyWindow | - | 0x408238 | 0x88e8 | 0x76e8 | 0x99 |
CreateDialogParamW | - | 0x40823c | 0x88ec | 0x76ec | 0x56 |
SetTimer | - | 0x408240 | 0x88f0 | 0x76f0 | 0x27a |
SetWindowTextW | - | 0x408244 | 0x88f4 | 0x76f4 | 0x287 |
PostQuitMessage | - | 0x408248 | 0x88f8 | 0x76f8 | 0x204 |
SetForegroundWindow | - | 0x40824c | 0x88fc | 0x76fc | 0x257 |
ShowWindow | - | 0x408250 | 0x8900 | 0x7700 | 0x292 |
wsprintfW | - | 0x408254 | 0x8904 | 0x7704 | 0x2d8 |
SendMessageTimeoutW | - | 0x408258 | 0x8908 | 0x7708 | 0x23f |
FindWindowExW | - | 0x40825c | 0x890c | 0x770c | 0xe5 |
IsWindow | - | 0x408260 | 0x8910 | 0x7710 | 0x1ad |
GetDlgItem | - | 0x408264 | 0x8914 | 0x7714 | 0x111 |
SetWindowLongW | - | 0x408268 | 0x8918 | 0x7718 | 0x281 |
LoadImageW | - | 0x40826c | 0x891c | 0x771c | 0x1c1 |
GetDC | - | 0x408270 | 0x8920 | 0x7720 | 0x10c |
ReleaseDC | - | 0x408274 | 0x8924 | 0x7724 | 0x22a |
EnableWindow | - | 0x408278 | 0x8928 | 0x7728 | 0xc4 |
InvalidateRect | - | 0x40827c | 0x892c | 0x772c | 0x193 |
SendMessageW | - | 0x408280 | 0x8930 | 0x7730 | 0x240 |
DefWindowProcW | - | 0x408284 | 0x8934 | 0x7734 | 0x8f |
BeginPaint | - | 0x408288 | 0x8938 | 0x7738 | 0xd |
EmptyClipboard | - | 0x40828c | 0x893c | 0x773c | 0xc1 |
CreatePopupMenu | - | 0x408290 | 0x8940 | 0x7740 | 0x5e |
GDI32.dll (8)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SetBkMode | - | 0x40804c | 0x86fc | 0x74fc | 0x216 |
SetBkColor | - | 0x408050 | 0x8700 | 0x7500 | 0x215 |
GetDeviceCaps | - | 0x408054 | 0x8704 | 0x7504 | 0x16b |
CreateFontIndirectW | - | 0x408058 | 0x8708 | 0x7508 | 0x3d |
CreateBrushIndirect | - | 0x40805c | 0x870c | 0x750c | 0x29 |
DeleteObject | - | 0x408060 | 0x8710 | 0x7510 | 0x8f |
SetTextColor | - | 0x408064 | 0x8714 | 0x7514 | 0x23c |
SelectObject | - | 0x408068 | 0x8718 | 0x7518 | 0x20e |
KERNEL32.dll (65)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetExitCodeProcess | - | 0x408070 | 0x8720 | 0x7520 | 0x15a |
WaitForSingleObject | - | 0x408074 | 0x8724 | 0x7524 | 0x390 |
GetModuleHandleA | - | 0x408078 | 0x8728 | 0x7528 | 0x17f |
GetProcAddress | - | 0x40807c | 0x872c | 0x752c | 0x1a0 |
GetSystemDirectoryW | - | 0x408080 | 0x8730 | 0x7530 | 0x1c2 |
lstrcatW | - | 0x408084 | 0x8734 | 0x7534 | 0x3be |
Sleep | - | 0x408088 | 0x8738 | 0x7538 | 0x356 |
lstrcpyA | - | 0x40808c | 0x873c | 0x753c | 0x3c6 |
WriteFile | - | 0x408090 | 0x8740 | 0x7540 | 0x3a4 |
GetTempFileNameW | - | 0x408094 | 0x8744 | 0x7544 | 0x1d4 |
CreateFileW | - | 0x408098 | 0x8748 | 0x7548 | 0x56 |
lstrcmpiA | - | 0x40809c | 0x874c | 0x754c | 0x3c3 |
RemoveDirectoryW | - | 0x4080a0 | 0x8750 | 0x7550 | 0x2c5 |
CreateProcessW | - | 0x4080a4 | 0x8754 | 0x7554 | 0x69 |
CreateDirectoryW | - | 0x4080a8 | 0x8758 | 0x7558 | 0x4e |
GetLastError | - | 0x4080ac | 0x875c | 0x755c | 0x171 |
CreateThread | - | 0x4080b0 | 0x8760 | 0x7560 | 0x6f |
GlobalLock | - | 0x4080b4 | 0x8764 | 0x7564 | 0x203 |
GlobalUnlock | - | 0x4080b8 | 0x8768 | 0x7568 | 0x20a |
GetDiskFreeSpaceW | - | 0x4080bc | 0x876c | 0x756c | 0x150 |
WideCharToMultiByte | - | 0x4080c0 | 0x8770 | 0x7570 | 0x394 |
lstrcpynW | - | 0x4080c4 | 0x8774 | 0x7574 | 0x3ca |
lstrlenW | - | 0x4080c8 | 0x8778 | 0x7578 | 0x3cd |
SetErrorMode | - | 0x4080cc | 0x877c | 0x757c | 0x315 |
GetVersionExW | - | 0x4080d0 | 0x8780 | 0x7580 | 0x1ea |
GetCommandLineW | - | 0x4080d4 | 0x8784 | 0x7584 | 0x111 |
GetTempPathW | - | 0x4080d8 | 0x8788 | 0x7588 | 0x1d6 |
GetWindowsDirectoryW | - | 0x4080dc | 0x878c | 0x758c | 0x1f4 |
SetEnvironmentVariableW | - | 0x4080e0 | 0x8790 | 0x7590 | 0x314 |
CopyFileW | - | 0x4080e4 | 0x8794 | 0x7594 | 0x46 |
ExitProcess | - | 0x4080e8 | 0x8798 | 0x7598 | 0xb9 |
GetCurrentProcess | - | 0x4080ec | 0x879c | 0x759c | 0x142 |
GetModuleFileNameW | - | 0x4080f0 | 0x87a0 | 0x75a0 | 0x17e |
GetFileSize | - | 0x4080f4 | 0x87a4 | 0x75a4 | 0x163 |
GetTickCount | - | 0x4080f8 | 0x87a8 | 0x75a8 | 0x1df |
MulDiv | - | 0x4080fc | 0x87ac | 0x75ac | 0x274 |
SetFileAttributesW | - | 0x408100 | 0x87b0 | 0x75b0 | 0x31a |
GetFileAttributesW | - | 0x408104 | 0x87b4 | 0x75b4 | 0x161 |
SetCurrentDirectoryW | - | 0x408108 | 0x87b8 | 0x75b8 | 0x30b |
MoveFileW | - | 0x40810c | 0x87bc | 0x75bc | 0x271 |
GetFullPathNameW | - | 0x408110 | 0x87c0 | 0x75c0 | 0x16a |
GetShortPathNameW | - | 0x408114 | 0x87c4 | 0x75c4 | 0x1b6 |
SearchPathW | - | 0x408118 | 0x87c8 | 0x75c8 | 0x2dc |
CompareFileTime | - | 0x40811c | 0x87cc | 0x75cc | 0x39 |
SetFileTime | - | 0x408120 | 0x87d0 | 0x75d0 | 0x31f |
CloseHandle | - | 0x408124 | 0x87d4 | 0x75d4 | 0x34 |
lstrcmpiW | - | 0x408128 | 0x87d8 | 0x75d8 | 0x3c4 |
lstrcmpW | - | 0x40812c | 0x87dc | 0x75dc | 0x3c1 |
ExpandEnvironmentStringsW | - | 0x408130 | 0x87e0 | 0x75e0 | 0xbd |
GlobalFree | - | 0x408134 | 0x87e4 | 0x75e4 | 0x1ff |
GlobalAlloc | - | 0x408138 | 0x87e8 | 0x75e8 | 0x1f8 |
GetModuleHandleW | - | 0x40813c | 0x87ec | 0x75ec | 0x182 |
LoadLibraryExW | - | 0x408140 | 0x87f0 | 0x75f0 | 0x254 |
MoveFileExW | - | 0x408144 | 0x87f4 | 0x75f4 | 0x270 |
FreeLibrary | - | 0x408148 | 0x87f8 | 0x75f8 | 0xf8 |
WritePrivateProfileStringW | - | 0x40814c | 0x87fc | 0x75fc | 0x3aa |
GetPrivateProfileStringW | - | 0x408150 | 0x8800 | 0x7600 | 0x19d |
lstrlenA | - | 0x408154 | 0x8804 | 0x7604 | 0x3cc |
MultiByteToWideChar | - | 0x408158 | 0x8808 | 0x7608 | 0x275 |
ReadFile | - | 0x40815c | 0x880c | 0x760c | 0x2b5 |
SetFilePointer | - | 0x408160 | 0x8810 | 0x7610 | 0x31b |
FindClose | - | 0x408164 | 0x8814 | 0x7614 | 0xce |
FindNextFileW | - | 0x408168 | 0x8818 | 0x7618 | 0xdd |
FindFirstFileW | - | 0x40816c | 0x881c | 0x761c | 0xd5 |
DeleteFileW | - | 0x408170 | 0x8820 | 0x7620 | 0x84 |
Memory Dumps (2)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Point | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|
a6ca5523fce6a4a43964319c35ecb868186465309e9226ab07c158519a5ef6f9.exe | 1 | 0x00400000 | 0x0044AFFF | Relevant Image | 32-bit | 0x0040690A |
...
|
||
a6ca5523fce6a4a43964319c35ecb868186465309e9226ab07c158519a5ef6f9.exe | 1 | 0x00400000 | 0x0044AFFF | Process Termination | 32-bit | - |
...
|
C:\Users\RDhJ0CNFevzX\AppData\Roaming\ChiefKeefofficialnaxyi_crypted(6).exe | Dropped File | Binary |
malicious
|
...
|
»
File Reputation Information
»
Verdict |
malicious
|
Names | Mal/Generic-S |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x40953b |
Size Of Code | 0x42b000 |
Size Of Initialized Data | 0x14000 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_cui |
Machine Type | MachineType.i386 |
Compile Timestamp | 2022-03-24 19:13:50+00:00 |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x401000 | 0x23fe5 | 0x24000 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.58 |
.nQuHRq | 0x425000 | 0x406fed | 0x407000 | 0x24400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 5.79 |
.rdata | 0x82c000 | 0xfbbe | 0xfc00 | 0x42b400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 5.69 |
.data | 0x83c000 | 0x1ce8 | 0x1000 | 0x43b000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.05 |
.9SAT | 0x83e000 | 0x88cb0 | 0x88e00 | 0x43c000 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.84 |
Imports (2)
»
USER32.dll (6)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetSysColorBrush | - | 0x82c140 | 0x43b568 | 0x43a968 | 0x1c2 |
MessageBeep | - | 0x82c144 | 0x43b56c | 0x43a96c | 0x280 |
MessageBoxW | - | 0x82c148 | 0x43b570 | 0x43a970 | 0x288 |
MessageBoxA | - | 0x82c14c | 0x43b574 | 0x43a974 | 0x281 |
GetSystemMetrics | - | 0x82c150 | 0x43b578 | 0x43a978 | 0x1c5 |
SendNotifyMessageA | - | 0x82c154 | 0x43b57c | 0x43a97c | 0x315 |
KERNEL32.dll (79)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TlsGetValue | - | 0x82c000 | 0x43b428 | 0x43a828 | 0x5a4 |
CreateFileW | - | 0x82c004 | 0x43b42c | 0x43a82c | 0xce |
HeapSize | - | 0x82c008 | 0x43b430 | 0x43a830 | 0x351 |
GetProcessHeap | - | 0x82c00c | 0x43b434 | 0x43a834 | 0x2b7 |
SetStdHandle | - | 0x82c010 | 0x43b438 | 0x43a838 | 0x54e |
SetEnvironmentVariableW | - | 0x82c014 | 0x43b43c | 0x43a83c | 0x516 |
FreeEnvironmentStringsW | - | 0x82c018 | 0x43b440 | 0x43a840 | 0x1ad |
GetLastError | - | 0x82c01c | 0x43b444 | 0x43a844 | 0x264 |
GetCurrentProcessId | - | 0x82c020 | 0x43b448 | 0x43a848 | 0x21b |
GetCurrentThreadId | - | 0x82c024 | 0x43b44c | 0x43a84c | 0x21f |
VirtualAlloc | - | 0x82c028 | 0x43b450 | 0x43a850 | 0x5ca |
GetModuleHandleA | - | 0x82c02c | 0x43b454 | 0x43a854 | 0x278 |
GetProcAddress | - | 0x82c030 | 0x43b458 | 0x43a858 | 0x2b1 |
MultiByteToWideChar | - | 0x82c034 | 0x43b45c | 0x43a85c | 0x3f3 |
FreeConsole | - | 0x82c038 | 0x43b460 | 0x43a860 | 0x1ab |
GetConsoleWindow | - | 0x82c03c | 0x43b464 | 0x43a864 | 0x20a |
WideCharToMultiByte | - | 0x82c040 | 0x43b468 | 0x43a868 | 0x602 |
EnterCriticalSection | - | 0x82c044 | 0x43b46c | 0x43a86c | 0x134 |
LeaveCriticalSection | - | 0x82c048 | 0x43b470 | 0x43a870 | 0x3c1 |
InitializeCriticalSectionEx | - | 0x82c04c | 0x43b474 | 0x43a874 | 0x363 |
DeleteCriticalSection | - | 0x82c050 | 0x43b478 | 0x43a878 | 0x113 |
EncodePointer | - | 0x82c054 | 0x43b47c | 0x43a87c | 0x130 |
DecodePointer | - | 0x82c058 | 0x43b480 | 0x43a880 | 0x10c |
LCMapStringEx | - | 0x82c05c | 0x43b484 | 0x43a884 | 0x3b4 |
GetStringTypeW | - | 0x82c060 | 0x43b488 | 0x43a888 | 0x2da |
GetCPInfo | - | 0x82c064 | 0x43b48c | 0x43a88c | 0x1c4 |
UnhandledExceptionFilter | - | 0x82c068 | 0x43b490 | 0x43a890 | 0x5b1 |
SetUnhandledExceptionFilter | - | 0x82c06c | 0x43b494 | 0x43a894 | 0x571 |
GetCurrentProcess | - | 0x82c070 | 0x43b498 | 0x43a898 | 0x21a |
TerminateProcess | - | 0x82c074 | 0x43b49c | 0x43a89c | 0x590 |
IsProcessorFeaturePresent | - | 0x82c078 | 0x43b4a0 | 0x43a8a0 | 0x389 |
QueryPerformanceCounter | - | 0x82c07c | 0x43b4a4 | 0x43a8a4 | 0x44f |
GetSystemTimeAsFileTime | - | 0x82c080 | 0x43b4a8 | 0x43a8a8 | 0x2ec |
InitializeSListHead | - | 0x82c084 | 0x43b4ac | 0x43a8ac | 0x366 |
IsDebuggerPresent | - | 0x82c088 | 0x43b4b0 | 0x43a8b0 | 0x382 |
GetStartupInfoW | - | 0x82c08c | 0x43b4b4 | 0x43a8b4 | 0x2d3 |
GetModuleHandleW | - | 0x82c090 | 0x43b4b8 | 0x43a8b8 | 0x27b |
GetEnvironmentStringsW | - | 0x82c094 | 0x43b4bc | 0x43a8bc | 0x23a |
RaiseException | - | 0x82c098 | 0x43b4c0 | 0x43a8c0 | 0x464 |
RtlUnwind | - | 0x82c09c | 0x43b4c4 | 0x43a8c4 | 0x4d5 |
SetLastError | - | 0x82c0a0 | 0x43b4c8 | 0x43a8c8 | 0x534 |
InitializeCriticalSectionAndSpinCount | - | 0x82c0a4 | 0x43b4cc | 0x43a8cc | 0x362 |
TlsAlloc | - | 0x82c0a8 | 0x43b4d0 | 0x43a8d0 | 0x5a2 |
WriteConsoleW | - | 0x82c0ac | 0x43b4d4 | 0x43a8d4 | 0x615 |
TlsSetValue | - | 0x82c0b0 | 0x43b4d8 | 0x43a8d8 | 0x5a5 |
TlsFree | - | 0x82c0b4 | 0x43b4dc | 0x43a8dc | 0x5a3 |
FreeLibrary | - | 0x82c0b8 | 0x43b4e0 | 0x43a8e0 | 0x1ae |
LoadLibraryExW | - | 0x82c0bc | 0x43b4e4 | 0x43a8e4 | 0x3c7 |
GetStdHandle | - | 0x82c0c0 | 0x43b4e8 | 0x43a8e8 | 0x2d5 |
WriteFile | - | 0x82c0c4 | 0x43b4ec | 0x43a8ec | 0x616 |
GetModuleFileNameW | - | 0x82c0c8 | 0x43b4f0 | 0x43a8f0 | 0x277 |
ExitProcess | - | 0x82c0cc | 0x43b4f4 | 0x43a8f4 | 0x161 |
GetModuleHandleExW | - | 0x82c0d0 | 0x43b4f8 | 0x43a8f8 | 0x27a |
GetCommandLineA | - | 0x82c0d4 | 0x43b4fc | 0x43a8fc | 0x1d9 |
GetCommandLineW | - | 0x82c0d8 | 0x43b500 | 0x43a900 | 0x1da |
HeapAlloc | - | 0x82c0dc | 0x43b504 | 0x43a904 | 0x348 |
HeapFree | - | 0x82c0e0 | 0x43b508 | 0x43a908 | 0x34c |
CompareStringW | - | 0x82c0e4 | 0x43b50c | 0x43a90c | 0x9e |
LCMapStringW | - | 0x82c0e8 | 0x43b510 | 0x43a910 | 0x3b5 |
GetLocaleInfoW | - | 0x82c0ec | 0x43b514 | 0x43a914 | 0x268 |
IsValidLocale | - | 0x82c0f0 | 0x43b518 | 0x43a918 | 0x391 |
GetUserDefaultLCID | - | 0x82c0f4 | 0x43b51c | 0x43a91c | 0x315 |
EnumSystemLocalesW | - | 0x82c0f8 | 0x43b520 | 0x43a920 | 0x157 |
GetFileType | - | 0x82c0fc | 0x43b524 | 0x43a924 | 0x251 |
CloseHandle | - | 0x82c100 | 0x43b528 | 0x43a928 | 0x89 |
FlushFileBuffers | - | 0x82c104 | 0x43b52c | 0x43a92c | 0x1a2 |
GetConsoleOutputCP | - | 0x82c108 | 0x43b530 | 0x43a930 | 0x203 |
GetConsoleMode | - | 0x82c10c | 0x43b534 | 0x43a934 | 0x1ff |
ReadFile | - | 0x82c110 | 0x43b538 | 0x43a938 | 0x475 |
GetFileSizeEx | - | 0x82c114 | 0x43b53c | 0x43a93c | 0x24f |
SetFilePointerEx | - | 0x82c118 | 0x43b540 | 0x43a940 | 0x525 |
ReadConsoleW | - | 0x82c11c | 0x43b544 | 0x43a944 | 0x472 |
HeapReAlloc | - | 0x82c120 | 0x43b548 | 0x43a948 | 0x34f |
FindClose | - | 0x82c124 | 0x43b54c | 0x43a94c | 0x178 |
FindFirstFileExW | - | 0x82c128 | 0x43b550 | 0x43a950 | 0x17e |
FindNextFileW | - | 0x82c12c | 0x43b554 | 0x43a954 | 0x18f |
IsValidCodePage | - | 0x82c130 | 0x43b558 | 0x43a958 | 0x38f |
GetACP | - | 0x82c134 | 0x43b55c | 0x43a95c | 0x1b5 |
GetOEMCP | - | 0x82c138 | 0x43b560 | 0x43a960 | 0x29a |
Digital Signature Information
»
Verification Status | Failed |
Verification Error | The signature hash does not match the file contents |
Certificate: Gary Kramlich
»
Issued by | Gary Kramlich |
Parent Certificate | Sectigo RSA Code Signing CA |
Country Name | US |
Valid From | 2021-03-22 01:00 (UTC+1) |
Valid Until | 2024-03-22 00:59 (UTC+1) |
Algorithm | sha256_rsa |
Serial Number | F6 AD 45 18 8E 55 66 AA 31 7B E2 3B 4B 8B 2C 2F |
Thumbprint | AD FA 74 4A A0 74 FB 5D C5 7E E6 44 5A 3E 18 D6 06 C7 BF 96 |
Certificate: Sectigo RSA Code Signing CA
»
Issued by | Sectigo RSA Code Signing CA |
Parent Certificate | USERTrust RSA Certification Authority |
Country Name | GB |
Valid From | 2018-11-02 01:00 (UTC+1) |
Valid Until | 2031-01-01 00:59 (UTC+1) |
Algorithm | sha384_rsa |
Serial Number | 1D A2 48 30 6F 9B 26 18 D0 82 E0 96 7D 33 D3 6A |
Thumbprint | 94 C9 5D A1 E8 50 BD 85 20 9A 4A 2A F3 E1 FB 16 04 F9 BB 66 |
Certificate: USERTrust RSA Certification Authority
»
Issued by | USERTrust RSA Certification Authority |
Parent Certificate | AAA Certificate Services |
Country Name | US |
Valid From | 2019-03-12 01:00 (UTC+1) |
Valid Until | 2029-01-01 00:59 (UTC+1) |
Algorithm | sha384_rsa |
Serial Number | 39 72 44 3A F9 22 B7 51 D7 D3 6C 10 DD 31 35 95 |
Thumbprint | D8 9E 3B D4 3D 5D 90 9B 47 A1 89 77 AA 9D 5C E3 6C EE 18 4C |
Certificate: AAA Certificate Services
»
Issued by | AAA Certificate Services |
Country Name | GB |
Valid From | 2004-01-01 01:00 (UTC+1) |
Valid Until | 2029-01-01 00:59 (UTC+1) |
Algorithm | sha1_rsa |
Serial Number | 01 |
Thumbprint | D1 EB 23 A4 6D 17 D6 8F D9 25 64 C2 F1 F1 60 17 64 D8 E3 49 |
Memory Dumps (9)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Point | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|
chiefkeefofficialnaxyi_crypted(6).exe | 2 | 0x00400000 | 0x008C6FFF | Relevant Image | 32-bit | 0x0040BE2E |
...
|
||
buffer | 2 | 0x00112384 | 0x00112B01 | First Execution | 32-bit | 0x00112505 |
...
|
||
buffer | 2 | 0x02320000 | 0x023B1FFF | Content Changed | 32-bit | - |
...
|
||
buffer | 2 | 0x009B0000 | 0x009B0FFF | Process Termination | 32-bit | - |
...
|
||
buffer | 2 | 0x009CDC58 | 0x009CDCE7 | Process Termination | 32-bit | - |
...
|
||
buffer | 2 | 0x009D1510 | 0x009D230F | Process Termination | 32-bit | - |
...
|
||
buffer | 2 | 0x009D2318 | 0x009D2537 | Process Termination | 32-bit | - |
...
|
||
buffer | 2 | 0x009D6E90 | 0x009D7E8F | Process Termination | 32-bit | - |
...
|
||
chiefkeefofficialnaxyi_crypted(6).exe | 2 | 0x00400000 | 0x008C6FFF | Process Termination | 32-bit | - |
...
|
C:\Users\RDhJ0CNFevzX\AppData\Roaming\34432.exe | Dropped File | Binary |
malicious
|
...
|
»
File Reputation Information
»
Verdict |
malicious
|
Names | Mal/Generic-S |
PE Information
»
Image Base | 0x140000000 |
Size Of Code | 0x241600 |
Size Of Initialized Data | 0x600 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.amd64 |
Compile Timestamp | 2022-03-24 19:20:47+00:00 |
Version Information (10)
»
Comments | Google Chrome |
CompanyName | Google Inc. |
FileDescription | chrome.exe |
FileVersion | 70.0.3538.110 |
InternalName | 34432.exe |
LegalCopyright | Copyright 2017 Google Inc. All rights reserved. |
OriginalFilename | 34432.exe |
ProductName | Google Chrome |
ProductVersion | 70.0.3538.110 |
Assembly Version | 0.0.0.0 |
Sections (2)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x140002000 | 0x2414f0 | 0x241600 | 0x200 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 7.99 |
.rsrc | 0x140244000 | 0x5f8 | 0x600 | 0x241800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 4.26 |
Memory Dumps (2)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Point | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|
34432.exe | 4 | 0x140000000 | 0x140245FFF | Relevant Image | 64-bit | - |
...
|
||
buffer | 4 | 0x1BB10000 | 0x1BD39FFF | Reflectively Loaded .NET Assembly | 64-bit | - |
...
|
C:\Users\RDhJ0CNFevzX\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex | Modified File | Stream |
clean
|
...
|
»
C:\Users\RDhJ0CNFevzX\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_6fe77092-4798-42ae-bda5-e7f822b580e9 | Modified File | Stream |
clean
Known to be clean.
|
...
|
»
C:\Users\RDhJ0CNFevzX\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_da21122d-ae44-4f93-ba1d-c9a978ca5b20 | Modified File | Stream |
clean
Known to be clean.
|
...
|
»
C:\Users\RDhJ0CNFevzX\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_cc38888a-7080-4220-9b7d-de7a9b2167ba | Modified File | Stream |
clean
Known to be clean.
|
...
|
»
C:\Users\RDhJ0CNFevzX\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_6de40067-cd2a-4666-8cd9-870e0a588215 | Modified File | Stream |
clean
Known to be clean.
|
...
|
»
C:\Users\RDhJ0CNFevzX\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_f9e52a2e-51b0-4ce6-9de0-3959d95ded6e | Modified File | Stream |
clean
Known to be clean.
|
...
|
»
C:\Users\RDhJ0CNFevzX\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_67a2505d-bf00-4e2f-b010-406d32caddc3 | Modified File | Stream |
clean
Known to be clean.
|
...
|
»
C:\Users\RDhJ0CNFevzX\AppData\Local\Temp\x4g0yyrm.yrp.ps1 | Dropped File | Stream |
clean
Known to be clean.
|
...
|
»
C:\Users\RDhJ0CNFevzX\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_35cafaf5-03f2-42a2-93c9-176611e1b15a | Dropped File | Stream |
clean
|
...
|
»
C:\Users\RDhJ0CNFevzX\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_04225cbb-d96f-4dc7-adf1-f8d1760f2748 | Dropped File | Stream |
clean
|
...
|
»
C:\Users\RDhJ0CNFevzX\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_0c0b8ee4-e605-4bc0-a33a-4cb3dc447974 | Dropped File | Stream |
clean
|
...
|
»
C:\Users\RDhJ0CNFevzX\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_67d62fa6-fc88-4ec3-88c2-3552f80eed04 | Dropped File | Stream |
clean
|
...
|
»
C:\Users\RDhJ0CNFevzX\AppData\Local\035feb13ecf1f3145b7745a75a2e1a75\RDhJ0CNFevzX@XC64ZB_en-US_2022_03_27_03_52_17@v1.3.1\Screenshot.jpg | Dropped File | Image |
clean
|
...
|
»
C:\Users\RDhJ0CNFevzX\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_d59564cf-b104-4c7d-9004-001b825e68ce | Dropped File | Stream |
clean
|
...
|
»
C:\Users\RDhJ0CNFevzX\AppData\Local\035feb13ecf1f3145b7745a75a2e1a75\RDhJ0CNFevzX@XC64ZB_en-US_2022_03_27_03_52_17@v1.3.1\Information.txt | Dropped File | Text |
clean
|
...
|
»
C:\Users\RDhJ0CNFevzX\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_c2e444a1-a8cf-4642-84d4-bf6b49447700 | Dropped File | Stream |
clean
|
...
|
»
C:\Users\RDhJ0CNFevzX\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_743373ac-59ce-4f0d-866c-dfe07f42ee30 | Dropped File | Stream |
clean
|
...
|
»
C:\Users\RDhJ0CNFevzX\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_faf4cf84-0480-4120-a4e7-df44a75895d1 | Dropped File | Stream |
clean
|
...
|
»
C:\Users\RDhJ0CNFevzX\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_dc1db2eb-0493-4424-b2cc-9326164d47fe | Dropped File | Stream |
clean
|
...
|
»
C:\Users\RDhJ0CNFevzX\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_e819a753-bfee-41cc-87e9-7a88fcadf60e | Dropped File | Stream |
clean
|
...
|
»
C:\Users\RDhJ0CNFevzX\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_07198b07-5f67-4979-b796-a52fe0942b9c | Dropped File | Stream |
clean
|
...
|
»
C:\Users\RDhJ0CNFevzX\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_e9866120-4b16-4ca2-9e66-af55aa604142 | Dropped File | Stream |
clean
|
...
|
»
C:\Users\RDhJ0CNFevzX\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_8e96ee40-6b35-47dc-81d5-b2d5c2e260b3 | Dropped File | Stream |
clean
|
...
|
»
C:\Users\RDhJ0CNFevzX\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_3f4f516c-24cd-4f8d-980a-b1ceaf0436fb | Dropped File | Stream |
clean
|
...
|
»
C:\Users\RDhJ0CNFevzX\AppData\Local\035feb13ecf1f3145b7745a75a2e1a75\DotNetZip-nxtjuzlo.tmp | Dropped File | ZIP |
clean
|
...
|
»
C:\Users\RDhJ0CNFevzX\AppData\Local\035feb13ecf1f3145b7745a75a2e1a75\msgid.dat | Dropped File | Text |
clean
|
...
|
»
C:\Users\RDhJ0CNFevzX\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex | Dropped File | Stream |
clean
|
...
|
»
C:\Users\RDhJ0CNFevzX\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex | Dropped File | Stream |
clean
|
...
|
»
C:\Users\RDhJ0CNFevzX\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex | Dropped File | Stream |
clean
|
...
|
»
C:\Users\RDhJ0CNFevzX\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex | Dropped File | Stream |
clean
|
...
|
»
C:\Users\RDhJ0CNFevzX\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex | Dropped File | Stream |
clean
|
...
|
»
C:\Users\RDhJ0CNFevzX\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex | Dropped File | Stream |
clean
|
...
|
»
C:\Users\RDhJ0CNFevzX\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex | Dropped File | Stream |
clean
|
...
|
»
C:\Users\RDhJ0CNFevzX\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex | Dropped File | Stream |
clean
|
...
|
»
C:\Users\RDhJ0CNFevzX\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex | Dropped File | Stream |
clean
|
...
|
»
C:\Users\RDhJ0CNFevzX\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex | Dropped File | Stream |
clean
|
...
|
»
C:\Users\RDhJ0CNFevzX\AppData\Local\035feb13ecf1f3145b7745a75a2e1a75\RDhJ0CNFevzX@XC64ZB_en-US_2022_03_27_03_52_17@v1.3.1\Grabber\Users\RDhJ0CNFevzX\Desktop\UJaeOBQUW7h.rtf | Dropped File | RTF |
clean
|
...
|
»
Office Information
»
C:\Users\RDhJ0CNFevzX\AppData\Local\035feb13ecf1f3145b7745a75a2e1a75\RDhJ0CNFevzX@XC64ZB_en-US_2022_03_27_03_52_17@v1.3.1\Software.txt | Dropped File | Text |
clean
|
...
|
»
C:\Users\RDhJ0CNFevzX\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex | Dropped File | Stream |
clean
|
...
|
»
C:\Users\RDhJ0CNFevzX\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex | Dropped File | Stream |
clean
|
...
|
»
C:\Users\RDhJ0CNFevzX\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex | Dropped File | Stream |
clean
|
...
|
»
C:\Users\RDhJ0CNFevzX\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex | Dropped File | Stream |
clean
|
...
|
»
C:\Users\RDhJ0CNFevzX\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex | Dropped File | Stream |
clean
|
...
|
»
C:\Users\RDhJ0CNFevzX\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex | Dropped File | Stream |
clean
|
...
|
»
C:\Users\RDhJ0CNFevzX\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex | Dropped File | Stream |
clean
|
...
|
»
C:\Users\RDhJ0CNFevzX\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex | Dropped File | Stream |
clean
|
...
|
»
C:\Users\RDhJ0CNFevzX\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex | Dropped File | Stream |
clean
|
...
|
»
C:\Users\RDhJ0CNFevzX\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex | Dropped File | Stream |
clean
|
...
|
»
C:\Users\RDhJ0CNFevzX\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex | Dropped File | Stream |
clean
|
...
|
»
C:\Users\RDhJ0CNFevzX\AppData\Local\035feb13ecf1f3145b7745a75a2e1a75\RDhJ0CNFevzX@XC64ZB_en-US_2022_03_27_03_52_17@v1.3.1\Processes.txt | Dropped File | Text |
clean
|
...
|
»
C:\Users\RDhJ0CNFevzX\AppData\Local\035feb13ecf1f3145b7745a75a2e1a75\RDhJ0CNFevzX@XC64ZB_en-US_2022_03_27_03_52_17@v1.3.1\Windows.txt | Dropped File | Text |
clean
|
...
|
»