Analysis
-
max time kernel
31s -
max time network
150s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
26-10-2021 15:12
Static task
static1
Behavioral task
behavioral1
Sample
PAYMENT-SWIFTCOPY.exe
Resource
win7-en-20210920
General
-
Target
PAYMENT-SWIFTCOPY.exe
-
Size
391KB
-
MD5
788c7a25b15a7263c24c4060f0c0df6a
-
SHA1
c28333f296ea281d90610a0866d5cdb8885fc34b
-
SHA256
4ba6a3b111db7d0e22339141a17eb368e1882734fe0a22641c46ab94c725bfad
-
SHA512
eb6b0ea6b483c000940c2a30a9ccee14d44a9b1c748486a6b6996e723526aa9e31a7f8df8599c7ed7720f528ab241b70a7f174ccfc054afc589447045c101e85
Malware Config
Signatures
-
Turns off Windows Defender SpyNet reporting 2 TTPs
-
Nirsoft 6 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\b5a63ffe-d4bf-449a-9a18-a291601cbf0f\AdvancedRun.exe Nirsoft C:\Users\Admin\AppData\Local\Temp\b5a63ffe-d4bf-449a-9a18-a291601cbf0f\AdvancedRun.exe Nirsoft C:\Users\Admin\AppData\Local\Temp\b5a63ffe-d4bf-449a-9a18-a291601cbf0f\AdvancedRun.exe Nirsoft C:\Users\Admin\AppData\Local\Temp\25e7ea62-e75c-475b-a1b2-c73cc9ec3c0a\AdvancedRun.exe Nirsoft C:\Users\Admin\AppData\Local\Temp\25e7ea62-e75c-475b-a1b2-c73cc9ec3c0a\AdvancedRun.exe Nirsoft C:\Users\Admin\AppData\Local\Temp\25e7ea62-e75c-475b-a1b2-c73cc9ec3c0a\AdvancedRun.exe Nirsoft -
Executes dropped EXE 5 IoCs
Processes:
AdvancedRun.exeAdvancedRun.exeᇩᇧሟሓᇠᇠᇨሞᇢᇡᇠᇤᇦᇥᇠ.exeAdvancedRun.exeAdvancedRun.exepid process 2532 AdvancedRun.exe 1528 AdvancedRun.exe 976 ᇩᇧሟሓᇠᇠᇨሞᇢᇡᇠᇤᇦᇥᇠ.exe 3784 AdvancedRun.exe 4120 AdvancedRun.exe -
Drops startup file 2 IoCs
Processes:
PAYMENT-SWIFTCOPY.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ᇩᇧሟሓᇠᇠᇨሞᇢᇡᇠᇤᇦᇥᇠ.exe PAYMENT-SWIFTCOPY.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ᇩᇧሟሓᇠᇠᇨሞᇢᇡᇠᇤᇦᇥᇠ.exe PAYMENT-SWIFTCOPY.exe -
Processes:
PAYMENT-SWIFTCOPY.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features PAYMENT-SWIFTCOPY.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" PAYMENT-SWIFTCOPY.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ᇩᇧሟሓᇠᇠᇨሞᇢᇡᇠᇤᇦᇥᇠ.exe = "0" PAYMENT-SWIFTCOPY.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths PAYMENT-SWIFTCOPY.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions PAYMENT-SWIFTCOPY.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\PAYMENT-SWIFTCOPY.exe = "0" PAYMENT-SWIFTCOPY.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet\SubmitSamplesConsent = "0" PAYMENT-SWIFTCOPY.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Cursors\熔燅燐熔熖熘熔熘熘熩熘熕熒燌熕\svchost.exe = "0" PAYMENT-SWIFTCOPY.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Real-Time Protection PAYMENT-SWIFTCOPY.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" PAYMENT-SWIFTCOPY.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet PAYMENT-SWIFTCOPY.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet\SpyNetReporting = "0" PAYMENT-SWIFTCOPY.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
regsvcs.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SMTP Manager = "C:\\Program Files (x86)\\SMTP Manager\\smtpmgr.exe" regsvcs.exe -
Processes:
PAYMENT-SWIFTCOPY.exeᇩᇧሟሓᇠᇠᇨሞᇢᇡᇠᇤᇦᇥᇠ.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA PAYMENT-SWIFTCOPY.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" PAYMENT-SWIFTCOPY.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ᇩᇧሟሓᇠᇠᇨሞᇢᇡᇠᇤᇦᇥᇠ.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ᇩᇧሟሓᇠᇠᇨሞᇢᇡᇠᇤᇦᇥᇠ.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 32 IoCs
Processes:
PAYMENT-SWIFTCOPY.exeᇩᇧሟሓᇠᇠᇨሞᇢᇡᇠᇤᇦᇥᇠ.exepid process 856 PAYMENT-SWIFTCOPY.exe 856 PAYMENT-SWIFTCOPY.exe 856 PAYMENT-SWIFTCOPY.exe 856 PAYMENT-SWIFTCOPY.exe 856 PAYMENT-SWIFTCOPY.exe 856 PAYMENT-SWIFTCOPY.exe 856 PAYMENT-SWIFTCOPY.exe 856 PAYMENT-SWIFTCOPY.exe 856 PAYMENT-SWIFTCOPY.exe 856 PAYMENT-SWIFTCOPY.exe 856 PAYMENT-SWIFTCOPY.exe 856 PAYMENT-SWIFTCOPY.exe 856 PAYMENT-SWIFTCOPY.exe 856 PAYMENT-SWIFTCOPY.exe 856 PAYMENT-SWIFTCOPY.exe 856 PAYMENT-SWIFTCOPY.exe 976 ᇩᇧሟሓᇠᇠᇨሞᇢᇡᇠᇤᇦᇥᇠ.exe 976 ᇩᇧሟሓᇠᇠᇨሞᇢᇡᇠᇤᇦᇥᇠ.exe 976 ᇩᇧሟሓᇠᇠᇨሞᇢᇡᇠᇤᇦᇥᇠ.exe 976 ᇩᇧሟሓᇠᇠᇨሞᇢᇡᇠᇤᇦᇥᇠ.exe 976 ᇩᇧሟሓᇠᇠᇨሞᇢᇡᇠᇤᇦᇥᇠ.exe 976 ᇩᇧሟሓᇠᇠᇨሞᇢᇡᇠᇤᇦᇥᇠ.exe 976 ᇩᇧሟሓᇠᇠᇨሞᇢᇡᇠᇤᇦᇥᇠ.exe 976 ᇩᇧሟሓᇠᇠᇨሞᇢᇡᇠᇤᇦᇥᇠ.exe 976 ᇩᇧሟሓᇠᇠᇨሞᇢᇡᇠᇤᇦᇥᇠ.exe 976 ᇩᇧሟሓᇠᇠᇨሞᇢᇡᇠᇤᇦᇥᇠ.exe 976 ᇩᇧሟሓᇠᇠᇨሞᇢᇡᇠᇤᇦᇥᇠ.exe 976 ᇩᇧሟሓᇠᇠᇨሞᇢᇡᇠᇤᇦᇥᇠ.exe 976 ᇩᇧሟሓᇠᇠᇨሞᇢᇡᇠᇤᇦᇥᇠ.exe 976 ᇩᇧሟሓᇠᇠᇨሞᇢᇡᇠᇤᇦᇥᇠ.exe 976 ᇩᇧሟሓᇠᇠᇨሞᇢᇡᇠᇤᇦᇥᇠ.exe 976 ᇩᇧሟሓᇠᇠᇨሞᇢᇡᇠᇤᇦᇥᇠ.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
PAYMENT-SWIFTCOPY.exeᇩᇧሟሓᇠᇠᇨሞᇢᇡᇠᇤᇦᇥᇠ.exedescription pid process target process PID 856 set thread context of 1320 856 PAYMENT-SWIFTCOPY.exe regsvcs.exe PID 976 set thread context of 4956 976 ᇩᇧሟሓᇠᇠᇨሞᇢᇡᇠᇤᇦᇥᇠ.exe regsvcs.exe -
Drops file in Program Files directory 2 IoCs
Processes:
regsvcs.exedescription ioc process File created C:\Program Files (x86)\SMTP Manager\smtpmgr.exe regsvcs.exe File opened for modification C:\Program Files (x86)\SMTP Manager\smtpmgr.exe regsvcs.exe -
Drops file in Windows directory 2 IoCs
Processes:
PAYMENT-SWIFTCOPY.exeWerFault.exedescription ioc process File created C:\Windows\Cursors\熔燅燐熔熖熘熔熘熘熩熘熕熒燌熕\svchost.exe PAYMENT-SWIFTCOPY.exe File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2288 856 WerFault.exe PAYMENT-SWIFTCOPY.exe 3216 976 WerFault.exe ᇩᇧሟሓᇠᇠᇨሞᇢᇡᇠᇤᇦᇥᇠ.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
AdvancedRun.exeAdvancedRun.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exePAYMENT-SWIFTCOPY.exepowershell.exepowershell.exeWerFault.exeAdvancedRun.exeAdvancedRun.exeregsvcs.exepid process 2532 AdvancedRun.exe 2532 AdvancedRun.exe 2532 AdvancedRun.exe 2532 AdvancedRun.exe 1528 AdvancedRun.exe 1528 AdvancedRun.exe 1528 AdvancedRun.exe 1528 AdvancedRun.exe 2232 powershell.exe 2980 powershell.exe 1916 powershell.exe 832 powershell.exe 3568 powershell.exe 768 powershell.exe 856 PAYMENT-SWIFTCOPY.exe 856 PAYMENT-SWIFTCOPY.exe 856 PAYMENT-SWIFTCOPY.exe 1876 powershell.exe 3528 powershell.exe 1916 powershell.exe 832 powershell.exe 3568 powershell.exe 2232 powershell.exe 2980 powershell.exe 768 powershell.exe 1876 powershell.exe 3528 powershell.exe 2288 WerFault.exe 2288 WerFault.exe 2288 WerFault.exe 2288 WerFault.exe 2288 WerFault.exe 2288 WerFault.exe 2288 WerFault.exe 2288 WerFault.exe 2288 WerFault.exe 2288 WerFault.exe 2288 WerFault.exe 2288 WerFault.exe 2288 WerFault.exe 2288 WerFault.exe 2288 WerFault.exe 2288 WerFault.exe 3784 AdvancedRun.exe 3784 AdvancedRun.exe 3784 AdvancedRun.exe 3784 AdvancedRun.exe 4120 AdvancedRun.exe 4120 AdvancedRun.exe 4120 AdvancedRun.exe 4120 AdvancedRun.exe 1320 regsvcs.exe 1320 regsvcs.exe 1320 regsvcs.exe 2980 powershell.exe 832 powershell.exe 768 powershell.exe 3568 powershell.exe 2232 powershell.exe 1916 powershell.exe 3528 powershell.exe 1876 powershell.exe 1320 regsvcs.exe 1320 regsvcs.exe -
Suspicious use of AdjustPrivilegeToken 29 IoCs
Processes:
PAYMENT-SWIFTCOPY.exeAdvancedRun.exeAdvancedRun.exeᇩᇧሟሓᇠᇠᇨሞᇢᇡᇠᇤᇦᇥᇠ.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exeWerFault.exeAdvancedRun.exeAdvancedRun.exeregsvcs.exepowershell.exepowershell.exepowershell.exeWerFault.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 856 PAYMENT-SWIFTCOPY.exe Token: SeDebugPrivilege 2532 AdvancedRun.exe Token: SeImpersonatePrivilege 2532 AdvancedRun.exe Token: SeDebugPrivilege 1528 AdvancedRun.exe Token: SeImpersonatePrivilege 1528 AdvancedRun.exe Token: SeDebugPrivilege 976 ᇩᇧሟሓᇠᇠᇨሞᇢᇡᇠᇤᇦᇥᇠ.exe Token: SeDebugPrivilege 1916 powershell.exe Token: SeDebugPrivilege 3568 powershell.exe Token: SeDebugPrivilege 2980 powershell.exe Token: SeDebugPrivilege 832 powershell.exe Token: SeDebugPrivilege 2232 powershell.exe Token: SeDebugPrivilege 768 powershell.exe Token: SeDebugPrivilege 1876 powershell.exe Token: SeDebugPrivilege 3528 powershell.exe Token: SeRestorePrivilege 2288 WerFault.exe Token: SeBackupPrivilege 2288 WerFault.exe Token: SeBackupPrivilege 2288 WerFault.exe Token: SeDebugPrivilege 2288 WerFault.exe Token: SeDebugPrivilege 3784 AdvancedRun.exe Token: SeImpersonatePrivilege 3784 AdvancedRun.exe Token: SeDebugPrivilege 4120 AdvancedRun.exe Token: SeImpersonatePrivilege 4120 AdvancedRun.exe Token: SeDebugPrivilege 1320 regsvcs.exe Token: SeDebugPrivilege 4436 powershell.exe Token: SeDebugPrivilege 4504 powershell.exe Token: SeDebugPrivilege 4588 powershell.exe Token: SeDebugPrivilege 3216 WerFault.exe Token: SeDebugPrivilege 4668 powershell.exe Token: SeDebugPrivilege 4788 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
PAYMENT-SWIFTCOPY.exeAdvancedRun.exeregsvcs.exeᇩᇧሟሓᇠᇠᇨሞᇢᇡᇠᇤᇦᇥᇠ.exeAdvancedRun.exedescription pid process target process PID 856 wrote to memory of 2532 856 PAYMENT-SWIFTCOPY.exe AdvancedRun.exe PID 856 wrote to memory of 2532 856 PAYMENT-SWIFTCOPY.exe AdvancedRun.exe PID 856 wrote to memory of 2532 856 PAYMENT-SWIFTCOPY.exe AdvancedRun.exe PID 2532 wrote to memory of 1528 2532 AdvancedRun.exe AdvancedRun.exe PID 2532 wrote to memory of 1528 2532 AdvancedRun.exe AdvancedRun.exe PID 2532 wrote to memory of 1528 2532 AdvancedRun.exe AdvancedRun.exe PID 856 wrote to memory of 3568 856 PAYMENT-SWIFTCOPY.exe powershell.exe PID 856 wrote to memory of 3568 856 PAYMENT-SWIFTCOPY.exe powershell.exe PID 856 wrote to memory of 3568 856 PAYMENT-SWIFTCOPY.exe powershell.exe PID 856 wrote to memory of 2980 856 PAYMENT-SWIFTCOPY.exe powershell.exe PID 856 wrote to memory of 2980 856 PAYMENT-SWIFTCOPY.exe powershell.exe PID 856 wrote to memory of 2980 856 PAYMENT-SWIFTCOPY.exe powershell.exe PID 856 wrote to memory of 1916 856 PAYMENT-SWIFTCOPY.exe powershell.exe PID 856 wrote to memory of 1916 856 PAYMENT-SWIFTCOPY.exe powershell.exe PID 856 wrote to memory of 1916 856 PAYMENT-SWIFTCOPY.exe powershell.exe PID 856 wrote to memory of 832 856 PAYMENT-SWIFTCOPY.exe powershell.exe PID 856 wrote to memory of 832 856 PAYMENT-SWIFTCOPY.exe powershell.exe PID 856 wrote to memory of 832 856 PAYMENT-SWIFTCOPY.exe powershell.exe PID 856 wrote to memory of 2232 856 PAYMENT-SWIFTCOPY.exe powershell.exe PID 856 wrote to memory of 2232 856 PAYMENT-SWIFTCOPY.exe powershell.exe PID 856 wrote to memory of 2232 856 PAYMENT-SWIFTCOPY.exe powershell.exe PID 856 wrote to memory of 976 856 PAYMENT-SWIFTCOPY.exe ᇩᇧሟሓᇠᇠᇨሞᇢᇡᇠᇤᇦᇥᇠ.exe PID 856 wrote to memory of 976 856 PAYMENT-SWIFTCOPY.exe ᇩᇧሟሓᇠᇠᇨሞᇢᇡᇠᇤᇦᇥᇠ.exe PID 856 wrote to memory of 976 856 PAYMENT-SWIFTCOPY.exe ᇩᇧሟሓᇠᇠᇨሞᇢᇡᇠᇤᇦᇥᇠ.exe PID 856 wrote to memory of 768 856 PAYMENT-SWIFTCOPY.exe powershell.exe PID 856 wrote to memory of 768 856 PAYMENT-SWIFTCOPY.exe powershell.exe PID 856 wrote to memory of 768 856 PAYMENT-SWIFTCOPY.exe powershell.exe PID 856 wrote to memory of 1876 856 PAYMENT-SWIFTCOPY.exe powershell.exe PID 856 wrote to memory of 1876 856 PAYMENT-SWIFTCOPY.exe powershell.exe PID 856 wrote to memory of 1876 856 PAYMENT-SWIFTCOPY.exe powershell.exe PID 856 wrote to memory of 3528 856 PAYMENT-SWIFTCOPY.exe powershell.exe PID 856 wrote to memory of 3528 856 PAYMENT-SWIFTCOPY.exe powershell.exe PID 856 wrote to memory of 3528 856 PAYMENT-SWIFTCOPY.exe powershell.exe PID 856 wrote to memory of 1320 856 PAYMENT-SWIFTCOPY.exe regsvcs.exe PID 856 wrote to memory of 1320 856 PAYMENT-SWIFTCOPY.exe regsvcs.exe PID 856 wrote to memory of 1320 856 PAYMENT-SWIFTCOPY.exe regsvcs.exe PID 856 wrote to memory of 1320 856 PAYMENT-SWIFTCOPY.exe regsvcs.exe PID 856 wrote to memory of 1320 856 PAYMENT-SWIFTCOPY.exe regsvcs.exe PID 856 wrote to memory of 1320 856 PAYMENT-SWIFTCOPY.exe regsvcs.exe PID 856 wrote to memory of 1320 856 PAYMENT-SWIFTCOPY.exe regsvcs.exe PID 856 wrote to memory of 1320 856 PAYMENT-SWIFTCOPY.exe regsvcs.exe PID 1320 wrote to memory of 2652 1320 regsvcs.exe schtasks.exe PID 1320 wrote to memory of 2652 1320 regsvcs.exe schtasks.exe PID 1320 wrote to memory of 2652 1320 regsvcs.exe schtasks.exe PID 976 wrote to memory of 3784 976 ᇩᇧሟሓᇠᇠᇨሞᇢᇡᇠᇤᇦᇥᇠ.exe AdvancedRun.exe PID 976 wrote to memory of 3784 976 ᇩᇧሟሓᇠᇠᇨሞᇢᇡᇠᇤᇦᇥᇠ.exe AdvancedRun.exe PID 976 wrote to memory of 3784 976 ᇩᇧሟሓᇠᇠᇨሞᇢᇡᇠᇤᇦᇥᇠ.exe AdvancedRun.exe PID 1320 wrote to memory of 992 1320 regsvcs.exe schtasks.exe PID 1320 wrote to memory of 992 1320 regsvcs.exe schtasks.exe PID 1320 wrote to memory of 992 1320 regsvcs.exe schtasks.exe PID 3784 wrote to memory of 4120 3784 AdvancedRun.exe AdvancedRun.exe PID 3784 wrote to memory of 4120 3784 AdvancedRun.exe AdvancedRun.exe PID 3784 wrote to memory of 4120 3784 AdvancedRun.exe AdvancedRun.exe PID 976 wrote to memory of 4436 976 ᇩᇧሟሓᇠᇠᇨሞᇢᇡᇠᇤᇦᇥᇠ.exe powershell.exe PID 976 wrote to memory of 4436 976 ᇩᇧሟሓᇠᇠᇨሞᇢᇡᇠᇤᇦᇥᇠ.exe powershell.exe PID 976 wrote to memory of 4436 976 ᇩᇧሟሓᇠᇠᇨሞᇢᇡᇠᇤᇦᇥᇠ.exe powershell.exe PID 976 wrote to memory of 4504 976 ᇩᇧሟሓᇠᇠᇨሞᇢᇡᇠᇤᇦᇥᇠ.exe powershell.exe PID 976 wrote to memory of 4504 976 ᇩᇧሟሓᇠᇠᇨሞᇢᇡᇠᇤᇦᇥᇠ.exe powershell.exe PID 976 wrote to memory of 4504 976 ᇩᇧሟሓᇠᇠᇨሞᇢᇡᇠᇤᇦᇥᇠ.exe powershell.exe PID 976 wrote to memory of 4588 976 ᇩᇧሟሓᇠᇠᇨሞᇢᇡᇠᇤᇦᇥᇠ.exe powershell.exe PID 976 wrote to memory of 4588 976 ᇩᇧሟሓᇠᇠᇨሞᇢᇡᇠᇤᇦᇥᇠ.exe powershell.exe PID 976 wrote to memory of 4588 976 ᇩᇧሟሓᇠᇠᇨሞᇢᇡᇠᇤᇦᇥᇠ.exe powershell.exe PID 976 wrote to memory of 4668 976 ᇩᇧሟሓᇠᇠᇨሞᇢᇡᇠᇤᇦᇥᇠ.exe powershell.exe PID 976 wrote to memory of 4668 976 ᇩᇧሟሓᇠᇠᇨሞᇢᇡᇠᇤᇦᇥᇠ.exe powershell.exe -
System policy modification 1 TTPs 2 IoCs
Processes:
PAYMENT-SWIFTCOPY.exeᇩᇧሟሓᇠᇠᇨሞᇢᇡᇠᇤᇦᇥᇠ.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" PAYMENT-SWIFTCOPY.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ᇩᇧሟሓᇠᇠᇨሞᇢᇡᇠᇤᇦᇥᇠ.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PAYMENT-SWIFTCOPY.exe"C:\Users\Admin\AppData\Local\Temp\PAYMENT-SWIFTCOPY.exe"1⤵
- Drops startup file
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Users\Admin\AppData\Local\Temp\b5a63ffe-d4bf-449a-9a18-a291601cbf0f\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\b5a63ffe-d4bf-449a-9a18-a291601cbf0f\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\b5a63ffe-d4bf-449a-9a18-a291601cbf0f\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\b5a63ffe-d4bf-449a-9a18-a291601cbf0f\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\b5a63ffe-d4bf-449a-9a18-a291601cbf0f\AdvancedRun.exe" /SpecialRun 4101d8 25323⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\PAYMENT-SWIFTCOPY.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\PAYMENT-SWIFTCOPY.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ᇩᇧሟሓᇠᇠᇨሞᇢᇡᇠᇤᇦᇥᇠ.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ᇩᇧሟሓᇠᇠᇨሞᇢᇡᇠᇤᇦᇥᇠ.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\PAYMENT-SWIFTCOPY.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ᇩᇧሟሓᇠᇠᇨሞᇢᇡᇠᇤᇦᇥᇠ.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ᇩᇧሟሓᇠᇠᇨሞᇢᇡᇠᇤᇦᇥᇠ.exe"2⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Users\Admin\AppData\Local\Temp\25e7ea62-e75c-475b-a1b2-c73cc9ec3c0a\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\25e7ea62-e75c-475b-a1b2-c73cc9ec3c0a\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\25e7ea62-e75c-475b-a1b2-c73cc9ec3c0a\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\25e7ea62-e75c-475b-a1b2-c73cc9ec3c0a\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\25e7ea62-e75c-475b-a1b2-c73cc9ec3c0a\AdvancedRun.exe" /SpecialRun 4101d8 37844⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ᇩᇧሟሓᇠᇠᇨሞᇢᇡᇠᇤᇦᇥᇠ.exe" -Force3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ᇩᇧሟሓᇠᇠᇨሞᇢᇡᇠᇤᇦᇥᇠ.exe" -Force3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Windows\Cursors\熔燅燐熔熖熘熔熘熘熩熘熕熒燌熕\svchost.exe" -Force3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ᇩᇧሟሓᇠᇠᇨሞᇢᇡᇠᇤᇦᇥᇠ.exe" -Force3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Windows\Cursors\熔燅燐熔熖熘熔熘熘熩熘熕熒燌熕\svchost.exe" -Force3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 976 -s 24323⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Windows\Cursors\熔燅燐熔熖熘熔熘熘熩熘熕熒燌熕\svchost.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\PAYMENT-SWIFTCOPY.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Windows\Cursors\熔燅燐熔熖熘熔熘熘熩熘熕熒燌熕\svchost.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"2⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "SMTP Manager" /xml "C:\Users\Admin\AppData\Local\Temp\tmpD7.tmp"3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "SMTP Manager Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmp905.tmp"3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 856 -s 25882⤵
- Drops file in Windows directory
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logMD5
1c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
fbb8f89b428393287ff4a30424a0b6dd
SHA122ce47d0d3b9990e2de45dab63536954d12abc18
SHA2565dc2950743d5773246c189ac2318b714d91fdfd899e9e2bc8b7f472e2c84838f
SHA512cc707a1b5cf24b07bbe92572658f97b0490b2e1d082109806d11b61bc359e3ad0ef9de536a9e62f9ae1240e8f26f0320d96dabfcc14f2fd3923740007e83f2ab
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
fbb8f89b428393287ff4a30424a0b6dd
SHA122ce47d0d3b9990e2de45dab63536954d12abc18
SHA2565dc2950743d5773246c189ac2318b714d91fdfd899e9e2bc8b7f472e2c84838f
SHA512cc707a1b5cf24b07bbe92572658f97b0490b2e1d082109806d11b61bc359e3ad0ef9de536a9e62f9ae1240e8f26f0320d96dabfcc14f2fd3923740007e83f2ab
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
71f1cd7681a0b887f835e3aadeea7767
SHA1f784f0ff4b999ddfa59633e592aba8736763bf50
SHA256f01aec7092ba6bdab328a091b414002487ae38c51df0917ffe57bc1254d11a42
SHA512450d9ac3236ce36625d0a6585f9ee0bf430c2899f77211ba79d1dd23c070d9323d3a2c91673d44988f896e1b549d839f147148ac474cad9111714cf98cd56064
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
86ceaa1de67755d7a9877e857049140d
SHA1cb8d266924a38846890aaecc1a4fd65b83ba5f2e
SHA256d0f7c5664c59315398a2c9f4d3e3c0a33ea6c45e60c01ea9b2e8449769c7d3e1
SHA51250596227c43eb10b67123d4035f9f87c3abc836ff7c097d72dd8fc5a559819a898faa0a23c9fb3e73976f8577049b4d9885d48a74129c0d7620373f7c31a6b4a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
9060e24d378bb9c8a3853d43c79fcf64
SHA1715e30722f1c64d93ae3a171c3948dba2fe554e8
SHA2567b5ec3a55e268270fd65e3eb890a1402e115443f2a3384767c008788099e7c0c
SHA51216ddcc1d7326239adbf16a9e50211b9d9dbf06593aba4ac5b8e8d2320f03429c07564521a65296416a23ead3efc96750656f1142109fd8017394ad113190a8b1
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
9060e24d378bb9c8a3853d43c79fcf64
SHA1715e30722f1c64d93ae3a171c3948dba2fe554e8
SHA2567b5ec3a55e268270fd65e3eb890a1402e115443f2a3384767c008788099e7c0c
SHA51216ddcc1d7326239adbf16a9e50211b9d9dbf06593aba4ac5b8e8d2320f03429c07564521a65296416a23ead3efc96750656f1142109fd8017394ad113190a8b1
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
9060e24d378bb9c8a3853d43c79fcf64
SHA1715e30722f1c64d93ae3a171c3948dba2fe554e8
SHA2567b5ec3a55e268270fd65e3eb890a1402e115443f2a3384767c008788099e7c0c
SHA51216ddcc1d7326239adbf16a9e50211b9d9dbf06593aba4ac5b8e8d2320f03429c07564521a65296416a23ead3efc96750656f1142109fd8017394ad113190a8b1
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
71f1cd7681a0b887f835e3aadeea7767
SHA1f784f0ff4b999ddfa59633e592aba8736763bf50
SHA256f01aec7092ba6bdab328a091b414002487ae38c51df0917ffe57bc1254d11a42
SHA512450d9ac3236ce36625d0a6585f9ee0bf430c2899f77211ba79d1dd23c070d9323d3a2c91673d44988f896e1b549d839f147148ac474cad9111714cf98cd56064
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
3178cc56733beb3c79acea7ee4c292f5
SHA198df439453aa360bace4c6971615528b541112c4
SHA256d4dabf38d393c2d13833afc30951ac45ac1416e228c875f6e4d40fb119a33d7c
SHA5125f0b7840ea31f577d94924488eee9d8f741236bd4bae2417d684636f68e0e0801901b05c73939d27a40baba226ee5aeec41b4e0c47ca9da47fc01a1ef7d2f12f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
3178cc56733beb3c79acea7ee4c292f5
SHA198df439453aa360bace4c6971615528b541112c4
SHA256d4dabf38d393c2d13833afc30951ac45ac1416e228c875f6e4d40fb119a33d7c
SHA5125f0b7840ea31f577d94924488eee9d8f741236bd4bae2417d684636f68e0e0801901b05c73939d27a40baba226ee5aeec41b4e0c47ca9da47fc01a1ef7d2f12f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
3178cc56733beb3c79acea7ee4c292f5
SHA198df439453aa360bace4c6971615528b541112c4
SHA256d4dabf38d393c2d13833afc30951ac45ac1416e228c875f6e4d40fb119a33d7c
SHA5125f0b7840ea31f577d94924488eee9d8f741236bd4bae2417d684636f68e0e0801901b05c73939d27a40baba226ee5aeec41b4e0c47ca9da47fc01a1ef7d2f12f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
3178cc56733beb3c79acea7ee4c292f5
SHA198df439453aa360bace4c6971615528b541112c4
SHA256d4dabf38d393c2d13833afc30951ac45ac1416e228c875f6e4d40fb119a33d7c
SHA5125f0b7840ea31f577d94924488eee9d8f741236bd4bae2417d684636f68e0e0801901b05c73939d27a40baba226ee5aeec41b4e0c47ca9da47fc01a1ef7d2f12f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
a35336c7454f40755a4f8cd0e4e8cdd7
SHA1148ebdd2e5b97a7e3cdd7c2d082ff3a9dd7fc041
SHA2566363fe2ddfcff0defba3abfeb74f75de989147b0d2873e168c5d2eb872ab8aa3
SHA512516a72620c5a531fbfba2857e057fc55e0c29eae9988985f4d521f712c0e5faa86b3aab11eea6baf1422bb7a313adc10ee550cc021e34f9321ecba0b06c21ed2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
86ceaa1de67755d7a9877e857049140d
SHA1cb8d266924a38846890aaecc1a4fd65b83ba5f2e
SHA256d0f7c5664c59315398a2c9f4d3e3c0a33ea6c45e60c01ea9b2e8449769c7d3e1
SHA51250596227c43eb10b67123d4035f9f87c3abc836ff7c097d72dd8fc5a559819a898faa0a23c9fb3e73976f8577049b4d9885d48a74129c0d7620373f7c31a6b4a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
a35336c7454f40755a4f8cd0e4e8cdd7
SHA1148ebdd2e5b97a7e3cdd7c2d082ff3a9dd7fc041
SHA2566363fe2ddfcff0defba3abfeb74f75de989147b0d2873e168c5d2eb872ab8aa3
SHA512516a72620c5a531fbfba2857e057fc55e0c29eae9988985f4d521f712c0e5faa86b3aab11eea6baf1422bb7a313adc10ee550cc021e34f9321ecba0b06c21ed2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
a35336c7454f40755a4f8cd0e4e8cdd7
SHA1148ebdd2e5b97a7e3cdd7c2d082ff3a9dd7fc041
SHA2566363fe2ddfcff0defba3abfeb74f75de989147b0d2873e168c5d2eb872ab8aa3
SHA512516a72620c5a531fbfba2857e057fc55e0c29eae9988985f4d521f712c0e5faa86b3aab11eea6baf1422bb7a313adc10ee550cc021e34f9321ecba0b06c21ed2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
a35336c7454f40755a4f8cd0e4e8cdd7
SHA1148ebdd2e5b97a7e3cdd7c2d082ff3a9dd7fc041
SHA2566363fe2ddfcff0defba3abfeb74f75de989147b0d2873e168c5d2eb872ab8aa3
SHA512516a72620c5a531fbfba2857e057fc55e0c29eae9988985f4d521f712c0e5faa86b3aab11eea6baf1422bb7a313adc10ee550cc021e34f9321ecba0b06c21ed2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
6faff0ebd7c3554b8b1b66bdc7a8ed7f
SHA1cc38cfcd0b4265eb2200f105c9ae46b3809beb72
SHA256b5cf2e1865f49c705491963f07bbf48cd3a863e42e73c7f84b99e3edca282c3a
SHA512ab424cc9603699a5285b75527892cd20ca3209cc01c4191171e7463d149434bd877c5b2a34443bc44e7502b58e35e2ecafd56bfef8f5d496e2aea2037f7b439d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
6faff0ebd7c3554b8b1b66bdc7a8ed7f
SHA1cc38cfcd0b4265eb2200f105c9ae46b3809beb72
SHA256b5cf2e1865f49c705491963f07bbf48cd3a863e42e73c7f84b99e3edca282c3a
SHA512ab424cc9603699a5285b75527892cd20ca3209cc01c4191171e7463d149434bd877c5b2a34443bc44e7502b58e35e2ecafd56bfef8f5d496e2aea2037f7b439d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
6faff0ebd7c3554b8b1b66bdc7a8ed7f
SHA1cc38cfcd0b4265eb2200f105c9ae46b3809beb72
SHA256b5cf2e1865f49c705491963f07bbf48cd3a863e42e73c7f84b99e3edca282c3a
SHA512ab424cc9603699a5285b75527892cd20ca3209cc01c4191171e7463d149434bd877c5b2a34443bc44e7502b58e35e2ecafd56bfef8f5d496e2aea2037f7b439d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
54b389a19d2d06a6b9ae17ba1c96fc5e
SHA11970cf5bf46da7bef8305ad3f8543cc310354c92
SHA256e87b38fc3f390a8b430c92ae83f5294c94208ca235aea8ee5762aac39740991b
SHA5124c76fdbe3be1f8b46c099689bcb9edc4da848c542301052b49c313ad3721a0cdb176568bb77f78a2adf5c389184705fa0e4ffe0e6e728c67f27f8f8f384da1ae
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
54b389a19d2d06a6b9ae17ba1c96fc5e
SHA11970cf5bf46da7bef8305ad3f8543cc310354c92
SHA256e87b38fc3f390a8b430c92ae83f5294c94208ca235aea8ee5762aac39740991b
SHA5124c76fdbe3be1f8b46c099689bcb9edc4da848c542301052b49c313ad3721a0cdb176568bb77f78a2adf5c389184705fa0e4ffe0e6e728c67f27f8f8f384da1ae
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
02f825f1a07e205ff37e466b424e84be
SHA188c8b0505bfaf8de2bc033196efff1a051624f75
SHA256b6fcff164c5ddf9e1be097469fa5c2499ea76761d4202e9a35a79c06cac15be0
SHA512def34f7ac835711f519d886e2093ecd2dd10fedad8a76ace0a6d43bf26b4c67333f28da5976a261fbfea516a871edaad63faef2ad2740e09239c412358d70a8c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
7eab473ae62b30c4e12dcf935b8022df
SHA1edc65b1c28cb4c5419af067e98f94aa2836f05f8
SHA256eb9cf7156f4d149a279528d0305dbcf034ef16e1ccc3e2e37b1a4e2cfc450d15
SHA51257752f3e1064050d8e56284923887a616742088db87d2e95c45e647c41250cf4abf56c1dd9e7101a4b90aca8a0ddaace1ae2bd76347e1df1a94a6a7c71b726fa
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
7eab473ae62b30c4e12dcf935b8022df
SHA1edc65b1c28cb4c5419af067e98f94aa2836f05f8
SHA256eb9cf7156f4d149a279528d0305dbcf034ef16e1ccc3e2e37b1a4e2cfc450d15
SHA51257752f3e1064050d8e56284923887a616742088db87d2e95c45e647c41250cf4abf56c1dd9e7101a4b90aca8a0ddaace1ae2bd76347e1df1a94a6a7c71b726fa
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
d57e4f22fedd3c237dd5263e183fa9d6
SHA1a4000e3ff8bef79e01b29ab4e76c395c4ac9a7d3
SHA2564103b3a1670545906e57b3b01088fa0ae7593527d81484eccb0f79d38c155640
SHA512421f39993c42ca31db12201a8fd30e3c02f26142a3e94a951515cd8af8afc65b1844fcb6cf0f2dd3cbaa5378c262c5de4750947a32a0d32457956592b1ccb526
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
b816c0c5fdc635168ca3809e8cddcdb5
SHA15c2e60c8e6f7a3740b8951a761e8ddb0357f21f5
SHA256713e829acc606b37a48024263d50f5edc39955763d2a5719515fa677633941b9
SHA5126a780e1b095abd999fd1752395f1e88bd80c7768c101bd3ef7bbdbbf310fa202656f0cdd4348734bfe8f65657b0890d52d05745f2e1a7addbbbbfad3b1d7f6f8
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
b816c0c5fdc635168ca3809e8cddcdb5
SHA15c2e60c8e6f7a3740b8951a761e8ddb0357f21f5
SHA256713e829acc606b37a48024263d50f5edc39955763d2a5719515fa677633941b9
SHA5126a780e1b095abd999fd1752395f1e88bd80c7768c101bd3ef7bbdbbf310fa202656f0cdd4348734bfe8f65657b0890d52d05745f2e1a7addbbbbfad3b1d7f6f8
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
b816c0c5fdc635168ca3809e8cddcdb5
SHA15c2e60c8e6f7a3740b8951a761e8ddb0357f21f5
SHA256713e829acc606b37a48024263d50f5edc39955763d2a5719515fa677633941b9
SHA5126a780e1b095abd999fd1752395f1e88bd80c7768c101bd3ef7bbdbbf310fa202656f0cdd4348734bfe8f65657b0890d52d05745f2e1a7addbbbbfad3b1d7f6f8
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
a5e6279d22eac8c2c30080e2fbe1b894
SHA125cabd9b5ebc7f82e19c9b98bc1cd098874a95cf
SHA2569928038fb54ba2c85ed4ef52d2fb33253a43718c398f6c6f90d68cb7121e5203
SHA5126bd1ce866b0de27f18260020f37cf5998ab80f6ccde500fed33f9c174b42bf86c19adb111bfe99033c741f783180f20d2cd702afd4e98fe960cdd749b4f74349
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
0b5d94d20be9eecbaed3dddd04143f07
SHA1c677d0355f4cc7301075a554adc889bce502e15a
SHA2563c6f74219d419accdd3de0d14fa46ff290fd430eddcc5352deddd7de59b4928c
SHA512395e5d0f28819f773b8d53363b7df73cc976124d1accce104390fdb3f5ebf57d8bb357e616910c03e1a9d67985704592640e442bd637009e32086bb1b2088916
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
8a482813981ad1760fa36635b0e63dbe
SHA16b51430c42631bd88db251daa797538d03c6e867
SHA25624ec75a7a807b5a0a2d848cd37c940facd5092523fe7767da1f75f5ee93e4496
SHA512c073321641b2e8d50af0773ad963bbb97baf959e05f464cd0f9d406751a08f43d2d0d4a13a8a46f61fc3a192a9fa0c2a537054a7c11f8295d369c1c2db686794
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
8a482813981ad1760fa36635b0e63dbe
SHA16b51430c42631bd88db251daa797538d03c6e867
SHA25624ec75a7a807b5a0a2d848cd37c940facd5092523fe7767da1f75f5ee93e4496
SHA512c073321641b2e8d50af0773ad963bbb97baf959e05f464cd0f9d406751a08f43d2d0d4a13a8a46f61fc3a192a9fa0c2a537054a7c11f8295d369c1c2db686794
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
0b5d94d20be9eecbaed3dddd04143f07
SHA1c677d0355f4cc7301075a554adc889bce502e15a
SHA2563c6f74219d419accdd3de0d14fa46ff290fd430eddcc5352deddd7de59b4928c
SHA512395e5d0f28819f773b8d53363b7df73cc976124d1accce104390fdb3f5ebf57d8bb357e616910c03e1a9d67985704592640e442bd637009e32086bb1b2088916
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
456a198afa8a0826dcf237b0b70b662e
SHA1be1796ef19342aeb4d64e8831aae2d967a72bc92
SHA256173280e399b60783a1219af5b331a1f1e8be7907be47baaa078fd70216b2fd4a
SHA5120bdf346bdea515dc8206f653867f145d2263f05553e8f0dc12f634723a9d33ce450eb69b3023b30402b479944037f15ca55e7cacff84178bcf68b731548bbd71
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
c12ac30aabf045d119a60c63190c0349
SHA1556f7f1a37e96b48a0eca98f2f1d71fd18adec5f
SHA256d4262e67ec5f95ccf0c36965402398b37f62c0455f74d0f183579398c451195a
SHA512f8163d37cdf35c9d1da7e9e1b4b64bd966dcb304f3dd49d3389cc597b2a055534a6c5cdf025a2021cc2ff5267de90394074ede17cf7eef93eee554c8fc56bf00
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
90c2ec6898efdf0c69a6dcbd19f00c0a
SHA13c43e4f23b02eb8345f62a0dcb60beedb2b8282c
SHA2567fbf53e11cf53f6a9bf7a9f5a43a2dc19ae35f3b1640a71af08d522c5d15b034
SHA5127c60d4a952bb553a9233ab80dffad12cd361694cde33135a1a0b304c962043f16831b3fd22311dc827bc0622b4c91d40d336c29b1f06548037a63f23dc4ee833
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
0b5d94d20be9eecbaed3dddd04143f07
SHA1c677d0355f4cc7301075a554adc889bce502e15a
SHA2563c6f74219d419accdd3de0d14fa46ff290fd430eddcc5352deddd7de59b4928c
SHA512395e5d0f28819f773b8d53363b7df73cc976124d1accce104390fdb3f5ebf57d8bb357e616910c03e1a9d67985704592640e442bd637009e32086bb1b2088916
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
06034ed6e7d78e9870cff04309ade57d
SHA1930bf7735c0d6bff779637870ef282d5a2092c0b
SHA25665e5474d6df325b578a5f6b00e87b5d98568af5aa9ca5eb53952a8e0a39eeec9
SHA51277f740876868ee5af2b32fc3b15bbdbd33314ecbfce206ecd677f548c546e9b74ba67a692ba9110f963974875c415649100fb4d5fdd065cf9d2ef69138c65331
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
e5ed0b7d0f30e0b358d6664b2243be96
SHA125053a274cec85e720ede83eff2e604879617db7
SHA2567c8cf6ebdaffa136886a51cc7bd1f0ad9fd0c46d73d9d30aad6ee0a1bb1c6048
SHA512f1d291258f5dcda48a88524aa5c38bd67e9f0e7b59d056505770c5f572506d41a21df6fcdcb629251bf43f4b49ca7ccd3bba5441bdde40083d9e712d01bf0f5f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
06034ed6e7d78e9870cff04309ade57d
SHA1930bf7735c0d6bff779637870ef282d5a2092c0b
SHA25665e5474d6df325b578a5f6b00e87b5d98568af5aa9ca5eb53952a8e0a39eeec9
SHA51277f740876868ee5af2b32fc3b15bbdbd33314ecbfce206ecd677f548c546e9b74ba67a692ba9110f963974875c415649100fb4d5fdd065cf9d2ef69138c65331
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
0b5d94d20be9eecbaed3dddd04143f07
SHA1c677d0355f4cc7301075a554adc889bce502e15a
SHA2563c6f74219d419accdd3de0d14fa46ff290fd430eddcc5352deddd7de59b4928c
SHA512395e5d0f28819f773b8d53363b7df73cc976124d1accce104390fdb3f5ebf57d8bb357e616910c03e1a9d67985704592640e442bd637009e32086bb1b2088916
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
101343244d619fd29dc007b34351865b
SHA1a721bf0ee99f24b3e6c263033cfa02a63d4175cc
SHA256286038573287d04ce980461054d2377b71ab4eb8a37e466b38d120ad7f93a043
SHA5121a40055b9e2186d142059ab12afc82a21767f9fbfe98345be40f67619d128fb261f6afef74b25ba52b8f80480bb86e06006047de1b9505d5a65f7d7ee3ce0209
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
101343244d619fd29dc007b34351865b
SHA1a721bf0ee99f24b3e6c263033cfa02a63d4175cc
SHA256286038573287d04ce980461054d2377b71ab4eb8a37e466b38d120ad7f93a043
SHA5121a40055b9e2186d142059ab12afc82a21767f9fbfe98345be40f67619d128fb261f6afef74b25ba52b8f80480bb86e06006047de1b9505d5a65f7d7ee3ce0209
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
101343244d619fd29dc007b34351865b
SHA1a721bf0ee99f24b3e6c263033cfa02a63d4175cc
SHA256286038573287d04ce980461054d2377b71ab4eb8a37e466b38d120ad7f93a043
SHA5121a40055b9e2186d142059ab12afc82a21767f9fbfe98345be40f67619d128fb261f6afef74b25ba52b8f80480bb86e06006047de1b9505d5a65f7d7ee3ce0209
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
101343244d619fd29dc007b34351865b
SHA1a721bf0ee99f24b3e6c263033cfa02a63d4175cc
SHA256286038573287d04ce980461054d2377b71ab4eb8a37e466b38d120ad7f93a043
SHA5121a40055b9e2186d142059ab12afc82a21767f9fbfe98345be40f67619d128fb261f6afef74b25ba52b8f80480bb86e06006047de1b9505d5a65f7d7ee3ce0209
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
101343244d619fd29dc007b34351865b
SHA1a721bf0ee99f24b3e6c263033cfa02a63d4175cc
SHA256286038573287d04ce980461054d2377b71ab4eb8a37e466b38d120ad7f93a043
SHA5121a40055b9e2186d142059ab12afc82a21767f9fbfe98345be40f67619d128fb261f6afef74b25ba52b8f80480bb86e06006047de1b9505d5a65f7d7ee3ce0209
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
2c24d78e495ab335e7f2d460a2e0707c
SHA144b236209cfc27863b2f151db87d0f8afbd4fe96
SHA256c67b030cd86f03914ab3409a10400a63aa0c0fee64752df70ac07fe5f5efaff7
SHA512e7be6e5cf5d20298670edf8b9c55fa5cdbf26b811811371863635d81d9f4a625e39b2f0975b8c4f2a17a948aae90f46aa09723338d8dc19be909abda965a5f48
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
d9de1e2835ddb63513a13c4806f1d5d0
SHA1a06114e0f97da4f87ebdc39e154a48d68c9d3d72
SHA256c20e5559a89dafc87222c865666a2281319f74caea158f194c94a7425debfbb7
SHA5122d55700ce46e9aeb47155e46364a7e709f2d400659ab895c9b12d54ba0da75d1e2715e77c2185d9761dc504867ab0a148b634f7eae4a37c257f138720148d7f1
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
4806b1a583e25a9e72ee01f6a22b02cd
SHA1df68106de57710bda6e0754ff1bb2342d6c60863
SHA256498c81d99560f9de775ec6257523b6b5ed8e1e9c742ee22336e16d6211e46244
SHA5124913b77a4745ee72570d6e42ae84abd61aba874413c309ea9ef5789aa3e4217035a628af3438cd623b193d71c84d9228eb0c510254072f519bf7c4163a1f309c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
10790a0e13b48263dd11f2b08cb9ca7a
SHA12745c06e788411fd0d9535e3a6e443e58429ad66
SHA2560e4b5921a0a84c3995fc5419c4b00592d11d355ab49e6e00721f027fc9192907
SHA512f38df9d839c008ef4edb607f40187de271cd7a68a682abf0855780eefd009b7a95d0142921fd57e5a614851cab7e8063fb3ed2a951a7e1db90831c4e4023392c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
11c50467d2a754bc107d4b313c0e7e16
SHA1c5f35560bee3c95bf8a26419563146d716d16a4c
SHA25655b70c14abdcfc82172ac7ecd1a81fe26d1f71df5c9c30ba874a032cdec99e7f
SHA512c068d6fcec9d8b5dc63b5ca4e8c4d28da097a88bfb935c74ec0fac412acbe3f15db57b5058f37f55a49d199dc0ef2c7bc3aa8e9168511358409104b765aa33ec
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
8dc6aee54b0d9b68627e94eb6fa71aac
SHA197d07f449cb4e36f8fe59665890faf608a04fb0b
SHA2567130c4795c8eb81a6c0bcab01caf6da8abf8bd7f79d9be047ccf1a9a9c5ebdc8
SHA51265c6bb603b4442dd4db640619a8aa0d10f0554b400c4125b9a16d75a3b0892378785d876377a52cc99e5b92b8d64678d43fe1dd99d53eaed861bedc13370d537
-
C:\Users\Admin\AppData\Local\Temp\25e7ea62-e75c-475b-a1b2-c73cc9ec3c0a\AdvancedRun.exeMD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
C:\Users\Admin\AppData\Local\Temp\25e7ea62-e75c-475b-a1b2-c73cc9ec3c0a\AdvancedRun.exeMD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
C:\Users\Admin\AppData\Local\Temp\25e7ea62-e75c-475b-a1b2-c73cc9ec3c0a\AdvancedRun.exeMD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
C:\Users\Admin\AppData\Local\Temp\b5a63ffe-d4bf-449a-9a18-a291601cbf0f\AdvancedRun.exeMD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
C:\Users\Admin\AppData\Local\Temp\b5a63ffe-d4bf-449a-9a18-a291601cbf0f\AdvancedRun.exeMD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
C:\Users\Admin\AppData\Local\Temp\b5a63ffe-d4bf-449a-9a18-a291601cbf0f\AdvancedRun.exeMD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
C:\Users\Admin\AppData\Local\Temp\tmp905.tmpMD5
b3b017f9df206021717a11f11d895402
SHA1e4ea12823af6550ee634536eec1eb14490580a3b
SHA256654dfce2c28024364e679e1b958f3fb81fc6d29685d534d905d1c83a84351024
SHA51295666cb81aa1fd1ade04a32f63381ce8bff274d7d300c0b59cbb10a294c4d1eebaa3000365a2000b38793de030044995cf23e623c5e3648d9b00501f97ff9343
-
C:\Users\Admin\AppData\Local\Temp\tmpD7.tmpMD5
2511f5150c45c9c6141788c8be9a44bd
SHA11e468ad16380d3b6a7268d7af2482f6259c8651d
SHA256b95602df2c09914384788c97c9bca318fc50bb443de39b13fb2e45856a2fe065
SHA512a638b54fbe899780f6dcee8a1859085bcfd2f2195c6db092811b8019c5f4969457ba80b80e3a31c16f4bc964e3c9afbcdf6141c3a2e8953ad209838de8ca1a73
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ᇩᇧሟሓᇠᇠᇨሞᇢᇡᇠᇤᇦᇥᇠ.exeMD5
788c7a25b15a7263c24c4060f0c0df6a
SHA1c28333f296ea281d90610a0866d5cdb8885fc34b
SHA2564ba6a3b111db7d0e22339141a17eb368e1882734fe0a22641c46ab94c725bfad
SHA512eb6b0ea6b483c000940c2a30a9ccee14d44a9b1c748486a6b6996e723526aa9e31a7f8df8599c7ed7720f528ab241b70a7f174ccfc054afc589447045c101e85
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ᇩᇧሟሓᇠᇠᇨሞᇢᇡᇠᇤᇦᇥᇠ.exeMD5
788c7a25b15a7263c24c4060f0c0df6a
SHA1c28333f296ea281d90610a0866d5cdb8885fc34b
SHA2564ba6a3b111db7d0e22339141a17eb368e1882734fe0a22641c46ab94c725bfad
SHA512eb6b0ea6b483c000940c2a30a9ccee14d44a9b1c748486a6b6996e723526aa9e31a7f8df8599c7ed7720f528ab241b70a7f174ccfc054afc589447045c101e85
-
memory/768-179-0x0000000003650000-0x0000000003651000-memory.dmpFilesize
4KB
-
memory/768-387-0x000000007EBB0000-0x000000007EBB1000-memory.dmpFilesize
4KB
-
memory/768-214-0x0000000003662000-0x0000000003663000-memory.dmpFilesize
4KB
-
memory/768-157-0x0000000000000000-mapping.dmp
-
memory/768-540-0x0000000003663000-0x0000000003664000-memory.dmpFilesize
4KB
-
memory/768-211-0x0000000003660000-0x0000000003661000-memory.dmpFilesize
4KB
-
memory/768-180-0x0000000003650000-0x0000000003651000-memory.dmpFilesize
4KB
-
memory/832-161-0x0000000006760000-0x0000000006761000-memory.dmpFilesize
4KB
-
memory/832-206-0x00000000076C0000-0x00000000076C1000-memory.dmpFilesize
4KB
-
memory/832-169-0x0000000006762000-0x0000000006763000-memory.dmpFilesize
4KB
-
memory/832-153-0x0000000000A60000-0x0000000000A61000-memory.dmpFilesize
4KB
-
memory/832-156-0x0000000000A60000-0x0000000000A61000-memory.dmpFilesize
4KB
-
memory/832-134-0x0000000000000000-mapping.dmp
-
memory/832-372-0x000000007ECF0000-0x000000007ECF1000-memory.dmpFilesize
4KB
-
memory/832-538-0x0000000006763000-0x0000000006764000-memory.dmpFilesize
4KB
-
memory/856-125-0x00000000079D0000-0x00000000079D1000-memory.dmpFilesize
4KB
-
memory/856-117-0x00000000056B0000-0x00000000056B1000-memory.dmpFilesize
4KB
-
memory/856-124-0x000000000C230000-0x000000000C231000-memory.dmpFilesize
4KB
-
memory/856-115-0x0000000000DC0000-0x0000000000DC1000-memory.dmpFilesize
4KB
-
memory/856-119-0x00000000030A0000-0x00000000030A3000-memory.dmpFilesize
12KB
-
memory/856-118-0x0000000005800000-0x0000000005801000-memory.dmpFilesize
4KB
-
memory/856-196-0x0000000008BD0000-0x0000000008BD1000-memory.dmpFilesize
4KB
-
memory/856-123-0x00000000078A0000-0x000000000792B000-memory.dmpFilesize
556KB
-
memory/976-170-0x0000000004F10000-0x0000000004F11000-memory.dmpFilesize
4KB
-
memory/976-148-0x0000000000000000-mapping.dmp
-
memory/992-258-0x0000000000000000-mapping.dmp
-
memory/1320-277-0x00000000050B0000-0x00000000055AE000-memory.dmpFilesize
5.0MB
-
memory/1320-213-0x000000000041E792-mapping.dmp
-
memory/1320-238-0x00000000050B0000-0x00000000055AE000-memory.dmpFilesize
5.0MB
-
memory/1528-129-0x0000000000000000-mapping.dmp
-
memory/1876-544-0x00000000073C3000-0x00000000073C4000-memory.dmpFilesize
4KB
-
memory/1876-184-0x0000000004DE0000-0x0000000004DE1000-memory.dmpFilesize
4KB
-
memory/1876-217-0x00000000073C2000-0x00000000073C3000-memory.dmpFilesize
4KB
-
memory/1876-418-0x000000007EFD0000-0x000000007EFD1000-memory.dmpFilesize
4KB
-
memory/1876-216-0x00000000073C0000-0x00000000073C1000-memory.dmpFilesize
4KB
-
memory/1876-168-0x0000000000000000-mapping.dmp
-
memory/1876-185-0x0000000004DE0000-0x0000000004DE1000-memory.dmpFilesize
4KB
-
memory/1916-519-0x0000000004B23000-0x0000000004B24000-memory.dmpFilesize
4KB
-
memory/1916-133-0x0000000000000000-mapping.dmp
-
memory/1916-137-0x0000000002F80000-0x0000000002F81000-memory.dmpFilesize
4KB
-
memory/1916-199-0x0000000007C10000-0x0000000007C11000-memory.dmpFilesize
4KB
-
memory/1916-138-0x0000000002F80000-0x0000000002F81000-memory.dmpFilesize
4KB
-
memory/1916-164-0x0000000004B22000-0x0000000004B23000-memory.dmpFilesize
4KB
-
memory/1916-152-0x0000000004B20000-0x0000000004B21000-memory.dmpFilesize
4KB
-
memory/1916-191-0x0000000007BA0000-0x0000000007BA1000-memory.dmpFilesize
4KB
-
memory/1916-457-0x000000007EF30000-0x000000007EF31000-memory.dmpFilesize
4KB
-
memory/1916-186-0x00000000073D0000-0x00000000073D1000-memory.dmpFilesize
4KB
-
memory/2232-175-0x0000000006EC0000-0x0000000006EC1000-memory.dmpFilesize
4KB
-
memory/2232-379-0x000000007EAD0000-0x000000007EAD1000-memory.dmpFilesize
4KB
-
memory/2232-541-0x0000000006EC3000-0x0000000006EC4000-memory.dmpFilesize
4KB
-
memory/2232-173-0x0000000006EC2000-0x0000000006EC3000-memory.dmpFilesize
4KB
-
memory/2232-160-0x0000000003230000-0x0000000003231000-memory.dmpFilesize
4KB
-
memory/2232-162-0x0000000003230000-0x0000000003231000-memory.dmpFilesize
4KB
-
memory/2232-140-0x0000000000000000-mapping.dmp
-
memory/2532-126-0x0000000000000000-mapping.dmp
-
memory/2652-240-0x0000000000000000-mapping.dmp
-
memory/2980-365-0x000000007F550000-0x000000007F551000-memory.dmpFilesize
4KB
-
memory/2980-142-0x0000000000860000-0x0000000000861000-memory.dmpFilesize
4KB
-
memory/2980-471-0x00000000068E3000-0x00000000068E4000-memory.dmpFilesize
4KB
-
memory/2980-132-0x0000000000000000-mapping.dmp
-
memory/2980-177-0x00000000068E2000-0x00000000068E3000-memory.dmpFilesize
4KB
-
memory/2980-154-0x00000000068E0000-0x00000000068E1000-memory.dmpFilesize
4KB
-
memory/2980-139-0x0000000000860000-0x0000000000861000-memory.dmpFilesize
4KB
-
memory/3528-563-0x00000000045A3000-0x00000000045A4000-memory.dmpFilesize
4KB
-
memory/3528-174-0x0000000000000000-mapping.dmp
-
memory/3528-204-0x0000000004410000-0x0000000004411000-memory.dmpFilesize
4KB
-
memory/3528-198-0x0000000004410000-0x0000000004411000-memory.dmpFilesize
4KB
-
memory/3528-479-0x000000007EAE0000-0x000000007EAE1000-memory.dmpFilesize
4KB
-
memory/3528-222-0x00000000045A0000-0x00000000045A1000-memory.dmpFilesize
4KB
-
memory/3528-220-0x00000000045A2000-0x00000000045A3000-memory.dmpFilesize
4KB
-
memory/3568-145-0x0000000007120000-0x0000000007121000-memory.dmpFilesize
4KB
-
memory/3568-131-0x0000000000000000-mapping.dmp
-
memory/3568-141-0x0000000004630000-0x0000000004631000-memory.dmpFilesize
4KB
-
memory/3568-542-0x00000000046D3000-0x00000000046D4000-memory.dmpFilesize
4KB
-
memory/3568-158-0x00000000046D2000-0x00000000046D3000-memory.dmpFilesize
4KB
-
memory/3568-487-0x000000007E390000-0x000000007E391000-memory.dmpFilesize
4KB
-
memory/3568-136-0x0000000002BB0000-0x0000000002BB1000-memory.dmpFilesize
4KB
-
memory/3568-135-0x0000000002BB0000-0x0000000002BB1000-memory.dmpFilesize
4KB
-
memory/3568-151-0x00000000046D0000-0x00000000046D1000-memory.dmpFilesize
4KB
-
memory/3784-257-0x0000000000000000-mapping.dmp
-
memory/4120-265-0x0000000000000000-mapping.dmp
-
memory/4436-292-0x0000000000000000-mapping.dmp
-
memory/4436-360-0x0000000004FD2000-0x0000000004FD3000-memory.dmpFilesize
4KB
-
memory/4436-320-0x0000000004FD0000-0x0000000004FD1000-memory.dmpFilesize
4KB
-
memory/4436-1229-0x0000000004FD3000-0x0000000004FD4000-memory.dmpFilesize
4KB
-
memory/4436-975-0x000000007EAF0000-0x000000007EAF1000-memory.dmpFilesize
4KB
-
memory/4504-1499-0x0000000007094000-0x0000000007096000-memory.dmpFilesize
8KB
-
memory/4504-297-0x0000000000000000-mapping.dmp
-
memory/4504-1495-0x0000000007093000-0x0000000007094000-memory.dmpFilesize
4KB
-
memory/4504-444-0x0000000007092000-0x0000000007093000-memory.dmpFilesize
4KB
-
memory/4504-439-0x0000000007090000-0x0000000007091000-memory.dmpFilesize
4KB
-
memory/4504-1173-0x000000007E3A0000-0x000000007E3A1000-memory.dmpFilesize
4KB
-
memory/4588-452-0x0000000004B00000-0x0000000004B01000-memory.dmpFilesize
4KB
-
memory/4588-305-0x0000000000000000-mapping.dmp
-
memory/4588-405-0x0000000004B02000-0x0000000004B03000-memory.dmpFilesize
4KB
-
memory/4588-1518-0x0000000004B04000-0x0000000004B06000-memory.dmpFilesize
8KB
-
memory/4588-1516-0x0000000004B03000-0x0000000004B04000-memory.dmpFilesize
4KB
-
memory/4588-1161-0x000000007EA50000-0x000000007EA51000-memory.dmpFilesize
4KB
-
memory/4668-463-0x00000000073E0000-0x00000000073E1000-memory.dmpFilesize
4KB
-
memory/4668-1519-0x00000000073E3000-0x00000000073E4000-memory.dmpFilesize
4KB
-
memory/4668-1520-0x00000000073E4000-0x00000000073E6000-memory.dmpFilesize
8KB
-
memory/4668-1249-0x000000007EE00000-0x000000007EE01000-memory.dmpFilesize
4KB
-
memory/4668-311-0x0000000000000000-mapping.dmp
-
memory/4668-397-0x00000000073E2000-0x00000000073E3000-memory.dmpFilesize
4KB
-
memory/4788-322-0x0000000000000000-mapping.dmp
-
memory/4788-412-0x0000000006C10000-0x0000000006C11000-memory.dmpFilesize
4KB
-
memory/4788-432-0x0000000006C12000-0x0000000006C13000-memory.dmpFilesize
4KB
-
memory/4788-1522-0x0000000006C14000-0x0000000006C16000-memory.dmpFilesize
8KB
-
memory/4788-1240-0x000000007EED0000-0x000000007EED1000-memory.dmpFilesize
4KB
-
memory/4788-1521-0x0000000006C13000-0x0000000006C14000-memory.dmpFilesize
4KB
-
memory/4956-355-0x000000000041E792-mapping.dmp
-
memory/4956-424-0x0000000004CE0000-0x0000000004CE1000-memory.dmpFilesize
4KB