Analysis
-
max time kernel
300s -
max time network
197s -
platform
windows10_x64 -
resource
win10-20220414-en -
submitted
22-05-2022 22:15
Static task
static1
Behavioral task
behavioral1
Sample
26ef46e737087bf94204211d072b38b074d857389153b0dce16305efb05e3725.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
26ef46e737087bf94204211d072b38b074d857389153b0dce16305efb05e3725.exe
Resource
win10-20220414-en
General
-
Target
26ef46e737087bf94204211d072b38b074d857389153b0dce16305efb05e3725.exe
-
Size
63KB
-
MD5
d7cf93cdc74ec7ee635a0ab5ad0dd573
-
SHA1
88eb48930852beeec6d810967506ad4462329253
-
SHA256
26ef46e737087bf94204211d072b38b074d857389153b0dce16305efb05e3725
-
SHA512
f158983b8cce0849c4947db54ce08519cb1aae1c8d00ac56c9b24bf988aceddd5842a2fbb34ae02c29d908b33e537fd7faeaeca6bc96d6710524d581f2bf9966
Malware Config
Signatures
-
XMRig Miner Payload 6 IoCs
Processes:
resource yara_rule C:\ProgramData\Dllhost\winlogson.exe xmrig C:\ProgramData\Dllhost\winlogson.exe xmrig C:\ProgramData\Dllhost\winlogson.exe xmrig C:\ProgramData\Dllhost\winlogson.exe xmrig C:\ProgramData\Dllhost\winlogson.exe xmrig C:\ProgramData\Dllhost\winlogson.exe xmrig -
Downloads MZ/PE file
-
Executes dropped EXE 7 IoCs
Processes:
dllhost.exewinlogson.exewinlogson.exewinlogson.exewinlogson.exewinlogson.exewinlogson.exepid process 2816 dllhost.exe 4712 winlogson.exe 3916 winlogson.exe 4120 winlogson.exe 3888 winlogson.exe 220 winlogson.exe 4264 winlogson.exe -
Adds Run key to start application 2 TTPs 9 IoCs
Processes:
dllhost.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Software\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\ProgramData\\Dllhost\\dllhost.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Software\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 4868 schtasks.exe 4908 schtasks.exe 4968 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exepowershell.exedllhost.exepowershell.exepid process 4520 powershell.exe 4520 powershell.exe 4520 powershell.exe 516 powershell.exe 516 powershell.exe 516 powershell.exe 2816 dllhost.exe 1884 powershell.exe 2816 dllhost.exe 1884 powershell.exe 1884 powershell.exe 2816 dllhost.exe 2816 dllhost.exe 2816 dllhost.exe 2816 dllhost.exe 2816 dllhost.exe 2816 dllhost.exe 2816 dllhost.exe 2816 dllhost.exe 2816 dllhost.exe 2816 dllhost.exe 2816 dllhost.exe 2816 dllhost.exe 2816 dllhost.exe 2816 dllhost.exe 2816 dllhost.exe 2816 dllhost.exe 2816 dllhost.exe 2816 dllhost.exe 2816 dllhost.exe 2816 dllhost.exe 2816 dllhost.exe 2816 dllhost.exe 2816 dllhost.exe 2816 dllhost.exe 2816 dllhost.exe 2816 dllhost.exe 2816 dllhost.exe 2816 dllhost.exe 2816 dllhost.exe 2816 dllhost.exe 2816 dllhost.exe 2816 dllhost.exe 2816 dllhost.exe 2816 dllhost.exe 2816 dllhost.exe 2816 dllhost.exe 2816 dllhost.exe 2816 dllhost.exe 2816 dllhost.exe 2816 dllhost.exe 2816 dllhost.exe 2816 dllhost.exe 2816 dllhost.exe 2816 dllhost.exe 2816 dllhost.exe 2816 dllhost.exe 2816 dllhost.exe 2816 dllhost.exe 2816 dllhost.exe 2816 dllhost.exe 2816 dllhost.exe 2816 dllhost.exe 2816 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
powershell.exe26ef46e737087bf94204211d072b38b074d857389153b0dce16305efb05e3725.exepowershell.exedllhost.exepowershell.exedescription pid process Token: SeDebugPrivilege 4520 powershell.exe Token: SeDebugPrivilege 920 26ef46e737087bf94204211d072b38b074d857389153b0dce16305efb05e3725.exe Token: SeDebugPrivilege 516 powershell.exe Token: SeDebugPrivilege 2816 dllhost.exe Token: SeDebugPrivilege 1884 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
26ef46e737087bf94204211d072b38b074d857389153b0dce16305efb05e3725.execmd.exedllhost.execmd.execmd.execmd.exedescription pid process target process PID 920 wrote to memory of 4252 920 26ef46e737087bf94204211d072b38b074d857389153b0dce16305efb05e3725.exe cmd.exe PID 920 wrote to memory of 4252 920 26ef46e737087bf94204211d072b38b074d857389153b0dce16305efb05e3725.exe cmd.exe PID 920 wrote to memory of 4252 920 26ef46e737087bf94204211d072b38b074d857389153b0dce16305efb05e3725.exe cmd.exe PID 4252 wrote to memory of 4272 4252 cmd.exe chcp.com PID 4252 wrote to memory of 4272 4252 cmd.exe chcp.com PID 4252 wrote to memory of 4272 4252 cmd.exe chcp.com PID 4252 wrote to memory of 4520 4252 cmd.exe powershell.exe PID 4252 wrote to memory of 4520 4252 cmd.exe powershell.exe PID 4252 wrote to memory of 4520 4252 cmd.exe powershell.exe PID 4252 wrote to memory of 516 4252 cmd.exe powershell.exe PID 4252 wrote to memory of 516 4252 cmd.exe powershell.exe PID 4252 wrote to memory of 516 4252 cmd.exe powershell.exe PID 920 wrote to memory of 2816 920 26ef46e737087bf94204211d072b38b074d857389153b0dce16305efb05e3725.exe dllhost.exe PID 920 wrote to memory of 2816 920 26ef46e737087bf94204211d072b38b074d857389153b0dce16305efb05e3725.exe dllhost.exe PID 920 wrote to memory of 2816 920 26ef46e737087bf94204211d072b38b074d857389153b0dce16305efb05e3725.exe dllhost.exe PID 4252 wrote to memory of 1884 4252 cmd.exe powershell.exe PID 4252 wrote to memory of 1884 4252 cmd.exe powershell.exe PID 4252 wrote to memory of 1884 4252 cmd.exe powershell.exe PID 2816 wrote to memory of 656 2816 dllhost.exe cmd.exe PID 2816 wrote to memory of 656 2816 dllhost.exe cmd.exe PID 2816 wrote to memory of 656 2816 dllhost.exe cmd.exe PID 2816 wrote to memory of 784 2816 dllhost.exe cmd.exe PID 2816 wrote to memory of 784 2816 dllhost.exe cmd.exe PID 2816 wrote to memory of 784 2816 dllhost.exe cmd.exe PID 2816 wrote to memory of 4504 2816 dllhost.exe cmd.exe PID 2816 wrote to memory of 4504 2816 dllhost.exe cmd.exe PID 2816 wrote to memory of 4504 2816 dllhost.exe cmd.exe PID 2816 wrote to memory of 2532 2816 dllhost.exe cmd.exe PID 2816 wrote to memory of 2532 2816 dllhost.exe cmd.exe PID 2816 wrote to memory of 2532 2816 dllhost.exe cmd.exe PID 2816 wrote to memory of 4804 2816 dllhost.exe cmd.exe PID 2816 wrote to memory of 4804 2816 dllhost.exe cmd.exe PID 2816 wrote to memory of 4804 2816 dllhost.exe cmd.exe PID 2816 wrote to memory of 4240 2816 dllhost.exe cmd.exe PID 2816 wrote to memory of 4240 2816 dllhost.exe cmd.exe PID 2816 wrote to memory of 4240 2816 dllhost.exe cmd.exe PID 2816 wrote to memory of 704 2816 dllhost.exe cmd.exe PID 2816 wrote to memory of 704 2816 dllhost.exe cmd.exe PID 2816 wrote to memory of 704 2816 dllhost.exe cmd.exe PID 2816 wrote to memory of 1128 2816 dllhost.exe cmd.exe PID 2816 wrote to memory of 1128 2816 dllhost.exe cmd.exe PID 2816 wrote to memory of 1128 2816 dllhost.exe cmd.exe PID 2816 wrote to memory of 1288 2816 dllhost.exe cmd.exe PID 2816 wrote to memory of 1288 2816 dllhost.exe cmd.exe PID 2816 wrote to memory of 1288 2816 dllhost.exe cmd.exe PID 2816 wrote to memory of 1816 2816 dllhost.exe cmd.exe PID 2816 wrote to memory of 1816 2816 dllhost.exe cmd.exe PID 2816 wrote to memory of 1816 2816 dllhost.exe cmd.exe PID 2816 wrote to memory of 1704 2816 dllhost.exe cmd.exe PID 2816 wrote to memory of 1704 2816 dllhost.exe cmd.exe PID 2816 wrote to memory of 1704 2816 dllhost.exe cmd.exe PID 2816 wrote to memory of 4300 2816 dllhost.exe cmd.exe PID 2816 wrote to memory of 4300 2816 dllhost.exe cmd.exe PID 2816 wrote to memory of 4300 2816 dllhost.exe cmd.exe PID 656 wrote to memory of 4868 656 cmd.exe schtasks.exe PID 656 wrote to memory of 4868 656 cmd.exe schtasks.exe PID 656 wrote to memory of 4868 656 cmd.exe schtasks.exe PID 4240 wrote to memory of 4908 4240 cmd.exe schtasks.exe PID 4240 wrote to memory of 4908 4240 cmd.exe schtasks.exe PID 4240 wrote to memory of 4908 4240 cmd.exe schtasks.exe PID 1816 wrote to memory of 4968 1816 cmd.exe schtasks.exe PID 1816 wrote to memory of 4968 1816 cmd.exe schtasks.exe PID 1816 wrote to memory of 4968 1816 cmd.exe schtasks.exe PID 2816 wrote to memory of 5008 2816 dllhost.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\26ef46e737087bf94204211d072b38b074d857389153b0dce16305efb05e3725.exe"C:\Users\Admin\AppData\Local\Temp\26ef46e737087bf94204211d072b38b074d857389153b0dce16305efb05e3725.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 1251 & powershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\HostData"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 12513⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\HostData"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\ProgramData\Dllhost\dllhost.exe"C:\ProgramData\Dllhost\dllhost.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk7821" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk7878" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk7878" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk94" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk2005" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵
-
C:\ProgramData\Dllhost\winlogson.exeC:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵
-
C:\ProgramData\Dllhost\winlogson.exeC:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵
-
C:\ProgramData\Dllhost\winlogson.exeC:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵
-
C:\ProgramData\Dllhost\winlogson.exeC:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵
-
C:\ProgramData\Dllhost\winlogson.exeC:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵
-
C:\ProgramData\Dllhost\winlogson.exeC:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off4⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Dllhost\dllhost.exeFilesize
80KB
MD50426f4269f3de8ffe4f85df9e8454b4b
SHA16fa3f292df8c849d10a21140f48d9d64d27870fe
SHA256ee0a13f5d66a499fc53678ba0e4f55f769ecb8a883d90f6025cd62c7f4ddf0ad
SHA512566b6711569011ac26294ff00ce8c06667b0dd387a89ef5e49847138ad5a25144f13a1f58bac763bc3d3d454f3ba068494e08b702f5d3e4005a5cb1feab54d02
-
C:\ProgramData\Dllhost\dllhost.exeFilesize
80KB
MD50426f4269f3de8ffe4f85df9e8454b4b
SHA16fa3f292df8c849d10a21140f48d9d64d27870fe
SHA256ee0a13f5d66a499fc53678ba0e4f55f769ecb8a883d90f6025cd62c7f4ddf0ad
SHA512566b6711569011ac26294ff00ce8c06667b0dd387a89ef5e49847138ad5a25144f13a1f58bac763bc3d3d454f3ba068494e08b702f5d3e4005a5cb1feab54d02
-
C:\ProgramData\Dllhost\winlogson.exeFilesize
7.9MB
MD5ae6c92c8073b1239390369d3ed93538f
SHA1a76ea83bdcfa472cd593363e9bb254df494a5577
SHA256d8d0e8ce7d532250713c7ac9c3e3d144463ce9f47bbf5bd6fc3bb939c739c1a0
SHA51259de08ea3849243addb3b6aaa2b3ebf71a271eee77239bea0dd190d446a6eec56fd7c5b4fa3668c14074f33f06ab1f011baa0ac2266f6d2d33eb59847841c350
-
C:\ProgramData\Dllhost\winlogson.exeFilesize
7.9MB
MD5ae6c92c8073b1239390369d3ed93538f
SHA1a76ea83bdcfa472cd593363e9bb254df494a5577
SHA256d8d0e8ce7d532250713c7ac9c3e3d144463ce9f47bbf5bd6fc3bb939c739c1a0
SHA51259de08ea3849243addb3b6aaa2b3ebf71a271eee77239bea0dd190d446a6eec56fd7c5b4fa3668c14074f33f06ab1f011baa0ac2266f6d2d33eb59847841c350
-
C:\ProgramData\Dllhost\winlogson.exeFilesize
7.9MB
MD5ae6c92c8073b1239390369d3ed93538f
SHA1a76ea83bdcfa472cd593363e9bb254df494a5577
SHA256d8d0e8ce7d532250713c7ac9c3e3d144463ce9f47bbf5bd6fc3bb939c739c1a0
SHA51259de08ea3849243addb3b6aaa2b3ebf71a271eee77239bea0dd190d446a6eec56fd7c5b4fa3668c14074f33f06ab1f011baa0ac2266f6d2d33eb59847841c350
-
C:\ProgramData\Dllhost\winlogson.exeFilesize
7.9MB
MD5ae6c92c8073b1239390369d3ed93538f
SHA1a76ea83bdcfa472cd593363e9bb254df494a5577
SHA256d8d0e8ce7d532250713c7ac9c3e3d144463ce9f47bbf5bd6fc3bb939c739c1a0
SHA51259de08ea3849243addb3b6aaa2b3ebf71a271eee77239bea0dd190d446a6eec56fd7c5b4fa3668c14074f33f06ab1f011baa0ac2266f6d2d33eb59847841c350
-
C:\ProgramData\Dllhost\winlogson.exeFilesize
7.9MB
MD5ae6c92c8073b1239390369d3ed93538f
SHA1a76ea83bdcfa472cd593363e9bb254df494a5577
SHA256d8d0e8ce7d532250713c7ac9c3e3d144463ce9f47bbf5bd6fc3bb939c739c1a0
SHA51259de08ea3849243addb3b6aaa2b3ebf71a271eee77239bea0dd190d446a6eec56fd7c5b4fa3668c14074f33f06ab1f011baa0ac2266f6d2d33eb59847841c350
-
C:\ProgramData\Dllhost\winlogson.exeFilesize
7.9MB
MD5ae6c92c8073b1239390369d3ed93538f
SHA1a76ea83bdcfa472cd593363e9bb254df494a5577
SHA256d8d0e8ce7d532250713c7ac9c3e3d144463ce9f47bbf5bd6fc3bb939c739c1a0
SHA51259de08ea3849243addb3b6aaa2b3ebf71a271eee77239bea0dd190d446a6eec56fd7c5b4fa3668c14074f33f06ab1f011baa0ac2266f6d2d33eb59847841c350
-
C:\ProgramData\HostData\logs.uceFilesize
483B
MD5f18199cca935101bc69f32237311cd21
SHA19a997db9963ac2a32284871dd61b3deebc98dc64
SHA256287957d2a31213e87fc7df350ccb935cc66764605a61a66032539d6b08431cf1
SHA512f6770230ec32f440a65f78e5670bb6b99b3fdcecc923a6d96da06e9586ab2953726601367f78d3d087ab0aea886c833463b429a740b985028daded3de1c78606
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logFilesize
2KB
MD51c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
18KB
MD57a04838bb344c245cf6eb330e05877b4
SHA12863cb6a19e26de50480749793ebaaa38936e8c5
SHA2566f51bc89b4274e0b08dabf3efcc955c34389c8bdaf0dbd4ff4ad442b795528b7
SHA51254b5c07bc1692767670bc0b888328b0bbdc2c13087f8055e7a4df66ff8c76aff166726749a00286b63ad49c443779c9555f08b7b1210db4a60cc0f02a0936a0d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
18KB
MD558fa70bb0c1d6f297e57f30be575b813
SHA1b1a0d5e3a54186c49eac92a87b1970b2e0b2817a
SHA256a56256192c27a060793b6d2e828dd54ddd19636a96a60190ec8a558d9a8c054c
SHA512e0649d99478bc49f67c9d4b31977600db17be815615fdb3d48c16930852448af0b553a0f2360399abfc53eee87c55b8ce925c0b0007e7e5c9cfe1d24a32f03d3
-
memory/220-1499-0x0000000000000000-mapping.dmp
-
memory/516-541-0x0000000000000000-mapping.dmp
-
memory/656-942-0x0000000000000000-mapping.dmp
-
memory/704-968-0x0000000000000000-mapping.dmp
-
memory/784-944-0x0000000000000000-mapping.dmp
-
memory/920-158-0x00000000030F0000-0x00000000030F6000-memory.dmpFilesize
24KB
-
memory/920-168-0x0000000077010000-0x000000007719E000-memory.dmpFilesize
1.6MB
-
memory/920-137-0x0000000077010000-0x000000007719E000-memory.dmpFilesize
1.6MB
-
memory/920-138-0x0000000077010000-0x000000007719E000-memory.dmpFilesize
1.6MB
-
memory/920-139-0x0000000077010000-0x000000007719E000-memory.dmpFilesize
1.6MB
-
memory/920-140-0x0000000077010000-0x000000007719E000-memory.dmpFilesize
1.6MB
-
memory/920-141-0x0000000077010000-0x000000007719E000-memory.dmpFilesize
1.6MB
-
memory/920-142-0x0000000077010000-0x000000007719E000-memory.dmpFilesize
1.6MB
-
memory/920-143-0x0000000077010000-0x000000007719E000-memory.dmpFilesize
1.6MB
-
memory/920-144-0x0000000077010000-0x000000007719E000-memory.dmpFilesize
1.6MB
-
memory/920-145-0x0000000077010000-0x000000007719E000-memory.dmpFilesize
1.6MB
-
memory/920-146-0x0000000077010000-0x000000007719E000-memory.dmpFilesize
1.6MB
-
memory/920-147-0x0000000077010000-0x000000007719E000-memory.dmpFilesize
1.6MB
-
memory/920-148-0x0000000077010000-0x000000007719E000-memory.dmpFilesize
1.6MB
-
memory/920-149-0x0000000077010000-0x000000007719E000-memory.dmpFilesize
1.6MB
-
memory/920-150-0x0000000077010000-0x000000007719E000-memory.dmpFilesize
1.6MB
-
memory/920-151-0x0000000000DF0000-0x0000000000E06000-memory.dmpFilesize
88KB
-
memory/920-152-0x0000000077010000-0x000000007719E000-memory.dmpFilesize
1.6MB
-
memory/920-153-0x0000000077010000-0x000000007719E000-memory.dmpFilesize
1.6MB
-
memory/920-154-0x0000000077010000-0x000000007719E000-memory.dmpFilesize
1.6MB
-
memory/920-155-0x0000000077010000-0x000000007719E000-memory.dmpFilesize
1.6MB
-
memory/920-156-0x0000000077010000-0x000000007719E000-memory.dmpFilesize
1.6MB
-
memory/920-157-0x0000000077010000-0x000000007719E000-memory.dmpFilesize
1.6MB
-
memory/920-135-0x0000000077010000-0x000000007719E000-memory.dmpFilesize
1.6MB
-
memory/920-159-0x0000000077010000-0x000000007719E000-memory.dmpFilesize
1.6MB
-
memory/920-160-0x0000000009FC0000-0x000000000A4BE000-memory.dmpFilesize
5.0MB
-
memory/920-161-0x00000000057E0000-0x0000000005872000-memory.dmpFilesize
584KB
-
memory/920-162-0x0000000077010000-0x000000007719E000-memory.dmpFilesize
1.6MB
-
memory/920-163-0x0000000077010000-0x000000007719E000-memory.dmpFilesize
1.6MB
-
memory/920-164-0x0000000077010000-0x000000007719E000-memory.dmpFilesize
1.6MB
-
memory/920-165-0x0000000077010000-0x000000007719E000-memory.dmpFilesize
1.6MB
-
memory/920-166-0x0000000077010000-0x000000007719E000-memory.dmpFilesize
1.6MB
-
memory/920-167-0x0000000077010000-0x000000007719E000-memory.dmpFilesize
1.6MB
-
memory/920-136-0x0000000077010000-0x000000007719E000-memory.dmpFilesize
1.6MB
-
memory/920-169-0x0000000077010000-0x000000007719E000-memory.dmpFilesize
1.6MB
-
memory/920-170-0x0000000077010000-0x000000007719E000-memory.dmpFilesize
1.6MB
-
memory/920-171-0x0000000077010000-0x000000007719E000-memory.dmpFilesize
1.6MB
-
memory/920-172-0x0000000077010000-0x000000007719E000-memory.dmpFilesize
1.6MB
-
memory/920-173-0x0000000077010000-0x000000007719E000-memory.dmpFilesize
1.6MB
-
memory/920-174-0x0000000077010000-0x000000007719E000-memory.dmpFilesize
1.6MB
-
memory/920-175-0x0000000077010000-0x000000007719E000-memory.dmpFilesize
1.6MB
-
memory/920-176-0x0000000077010000-0x000000007719E000-memory.dmpFilesize
1.6MB
-
memory/920-177-0x0000000005610000-0x000000000561A000-memory.dmpFilesize
40KB
-
memory/920-178-0x0000000005880000-0x00000000058E6000-memory.dmpFilesize
408KB
-
memory/920-134-0x0000000077010000-0x000000007719E000-memory.dmpFilesize
1.6MB
-
memory/920-133-0x0000000077010000-0x000000007719E000-memory.dmpFilesize
1.6MB
-
memory/920-132-0x0000000077010000-0x000000007719E000-memory.dmpFilesize
1.6MB
-
memory/920-127-0x0000000077010000-0x000000007719E000-memory.dmpFilesize
1.6MB
-
memory/920-119-0x0000000077010000-0x000000007719E000-memory.dmpFilesize
1.6MB
-
memory/920-131-0x0000000077010000-0x000000007719E000-memory.dmpFilesize
1.6MB
-
memory/920-130-0x0000000077010000-0x000000007719E000-memory.dmpFilesize
1.6MB
-
memory/920-129-0x0000000077010000-0x000000007719E000-memory.dmpFilesize
1.6MB
-
memory/920-120-0x0000000077010000-0x000000007719E000-memory.dmpFilesize
1.6MB
-
memory/920-128-0x0000000077010000-0x000000007719E000-memory.dmpFilesize
1.6MB
-
memory/920-126-0x0000000077010000-0x000000007719E000-memory.dmpFilesize
1.6MB
-
memory/920-125-0x0000000077010000-0x000000007719E000-memory.dmpFilesize
1.6MB
-
memory/920-121-0x0000000077010000-0x000000007719E000-memory.dmpFilesize
1.6MB
-
memory/920-118-0x0000000077010000-0x000000007719E000-memory.dmpFilesize
1.6MB
-
memory/920-122-0x0000000077010000-0x000000007719E000-memory.dmpFilesize
1.6MB
-
memory/920-124-0x0000000077010000-0x000000007719E000-memory.dmpFilesize
1.6MB
-
memory/920-123-0x0000000077010000-0x000000007719E000-memory.dmpFilesize
1.6MB
-
memory/1128-972-0x0000000000000000-mapping.dmp
-
memory/1288-977-0x0000000000000000-mapping.dmp
-
memory/1288-1422-0x0000000000000000-mapping.dmp
-
memory/1344-1468-0x0000000000000000-mapping.dmp
-
memory/1704-989-0x0000000000000000-mapping.dmp
-
memory/1816-1474-0x0000000000000000-mapping.dmp
-
memory/1816-982-0x0000000000000000-mapping.dmp
-
memory/1884-1154-0x0000000009550000-0x00000000095F5000-memory.dmpFilesize
660KB
-
memory/1884-889-0x0000000000000000-mapping.dmp
-
memory/1884-1105-0x0000000008620000-0x000000000866B000-memory.dmpFilesize
300KB
-
memory/2216-1485-0x0000000000000000-mapping.dmp
-
memory/2440-1491-0x0000000000000000-mapping.dmp
-
memory/2532-952-0x0000000000000000-mapping.dmp
-
memory/2816-905-0x0000000005310000-0x0000000005316000-memory.dmpFilesize
24KB
-
memory/2816-844-0x0000000000000000-mapping.dmp
-
memory/2816-888-0x0000000000B80000-0x0000000000B9A000-memory.dmpFilesize
104KB
-
memory/3136-1451-0x0000000000000000-mapping.dmp
-
memory/3836-1508-0x0000000000000000-mapping.dmp
-
memory/3888-1482-0x0000000000000000-mapping.dmp
-
memory/3916-1448-0x0000000000000000-mapping.dmp
-
memory/3936-1502-0x0000000000000000-mapping.dmp
-
memory/4120-1465-0x0000000000000000-mapping.dmp
-
memory/4240-962-0x0000000000000000-mapping.dmp
-
memory/4252-181-0x0000000077010000-0x000000007719E000-memory.dmpFilesize
1.6MB
-
memory/4252-184-0x0000000077010000-0x000000007719E000-memory.dmpFilesize
1.6MB
-
memory/4252-183-0x0000000077010000-0x000000007719E000-memory.dmpFilesize
1.6MB
-
memory/4252-182-0x0000000077010000-0x000000007719E000-memory.dmpFilesize
1.6MB
-
memory/4252-180-0x0000000077010000-0x000000007719E000-memory.dmpFilesize
1.6MB
-
memory/4252-179-0x0000000000000000-mapping.dmp
-
memory/4264-1516-0x0000000000000000-mapping.dmp
-
memory/4272-188-0x0000000077010000-0x000000007719E000-memory.dmpFilesize
1.6MB
-
memory/4272-187-0x0000000077010000-0x000000007719E000-memory.dmpFilesize
1.6MB
-
memory/4272-185-0x0000000000000000-mapping.dmp
-
memory/4272-189-0x0000000077010000-0x000000007719E000-memory.dmpFilesize
1.6MB
-
memory/4272-186-0x0000000077010000-0x000000007719E000-memory.dmpFilesize
1.6MB
-
memory/4300-997-0x0000000000000000-mapping.dmp
-
memory/4476-1434-0x0000000000000000-mapping.dmp
-
memory/4504-947-0x0000000000000000-mapping.dmp
-
memory/4520-265-0x0000000008840000-0x000000000888B000-memory.dmpFilesize
300KB
-
memory/4520-193-0x0000000000000000-mapping.dmp
-
memory/4520-253-0x0000000007C30000-0x0000000007C52000-memory.dmpFilesize
136KB
-
memory/4520-518-0x0000000009A10000-0x0000000009A2A000-memory.dmpFilesize
104KB
-
memory/4520-523-0x0000000009A00000-0x0000000009A08000-memory.dmpFilesize
32KB
-
memory/4520-229-0x0000000004BA0000-0x0000000004BD6000-memory.dmpFilesize
216KB
-
memory/4520-302-0x0000000009560000-0x000000000957E000-memory.dmpFilesize
120KB
-
memory/4520-301-0x0000000009580000-0x00000000095B3000-memory.dmpFilesize
204KB
-
memory/4520-278-0x00000000086C0000-0x0000000008736000-memory.dmpFilesize
472KB
-
memory/4520-264-0x0000000007E30000-0x0000000007E4C000-memory.dmpFilesize
112KB
-
memory/4520-311-0x00000000095D0000-0x0000000009675000-memory.dmpFilesize
660KB
-
memory/4520-315-0x0000000009A70000-0x0000000009B04000-memory.dmpFilesize
592KB
-
memory/4520-234-0x00000000075D0000-0x0000000007BF8000-memory.dmpFilesize
6.2MB
-
memory/4520-254-0x0000000007CD0000-0x0000000007D36000-memory.dmpFilesize
408KB
-
memory/4520-255-0x0000000008030000-0x0000000008380000-memory.dmpFilesize
3.3MB
-
memory/4712-1431-0x0000000000000000-mapping.dmp
-
memory/4784-1457-0x0000000000000000-mapping.dmp
-
memory/4804-957-0x0000000000000000-mapping.dmp
-
memory/4868-1034-0x0000000000000000-mapping.dmp
-
memory/4908-1041-0x0000000000000000-mapping.dmp
-
memory/4968-1047-0x0000000000000000-mapping.dmp
-
memory/5008-1416-0x0000000000000000-mapping.dmp
-
memory/5116-1440-0x0000000000000000-mapping.dmp