Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
20-12-2022 23:40
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220901-en
General
-
Target
file.exe
-
Size
216KB
-
MD5
eebcd01fc997437a9e8d0d5d3251aa3d
-
SHA1
aee6094f3b7ebdd47ba91caac386f152db2355a1
-
SHA256
09ed41266242f1d86d54ea3902344cdc9b5852a57a918f0d01e178fcd92a66fa
-
SHA512
a7d45ba85cec8b6a1af81d772705ba0f8069b4e5d1f7ba6f831cfe4a145a8d1652685bd48dcc5817fe9de13fae686ba6af190da302d8e78c99fcb2cd6074a2b9
-
SSDEEP
3072:c/iJL5k8V5HrxXLxEwfWu1G1cWppLJg9Hu7b/t9jvCPNHCDml:ySL5ksFzG1nLsml9WFCa
Malware Config
Signatures
-
Detects Smokeloader packer 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1192-133-0x00000000001F0000-0x00000000001F9000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Blocklisted process makes network request 3 IoCs
Processes:
rundll32.exeflow pid process 72 3564 rundll32.exe 74 3564 rundll32.exe 112 3564 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
Processes:
E5F0.exepid process 3888 E5F0.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 3564 rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
rundll32.exedescription pid process target process PID 3564 set thread context of 944 3564 rundll32.exe rundll32.exe -
Drops file in Program Files directory 11 IoCs
Processes:
rundll32.exedescription ioc process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\AiodLite.dll rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\createpdf.svg rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Search.api rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\CPDF_RHP.aapp rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\AcroForm\PMP\QRCode.pmp rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\AcroForm\adobepdf.xdc rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\apple-touch-icon-57x57-precomposed.png rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\turnOnNotificationInAcrobat.gif rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\server_ok.gif rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Microsoft.VCLibs.x86.14.00.appx rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\reviews_super.gif rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4880 3888 WerFault.exe E5F0.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
file.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe -
Checks processor information in registry 2 TTPs 25 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Previous Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information rundll32.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Platform Specific Field 1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Component Information rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Status rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status rundll32.exe -
Processes:
description ioc process Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Toolbar Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser -
Modifies registry class 30 IoCs
Processes:
rundll32.exedescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 820074001c0043465346160031000000000000000000100041707044617461000000741a595e96dfd3488d671733bcee28bac5cdfadf9f6756418947c5c76bc0b67f400009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000004100700070004400610074006100000042000000 Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\WorkFolders Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\NodeSlot = "1" Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f44471a0359723fa74489c55595fe6b30ee0000 Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 50003100000000000000000010004c6f63616c003c0009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000004c006f00630061006c00000014000000 Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 4e0031000000000095551705100054656d7000003a0009000400efbe0c55199995551c052e00000000000000000000000000000000000000000000000000429f5d00540065006d007000000014000000 Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = ffffffff Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
pid process 2152 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
file.exepid process 1192 file.exe 1192 file.exe 2152 2152 2152 2152 2152 2152 2152 2152 2152 2152 2152 2152 2152 2152 2152 2152 2152 2152 2152 2152 2152 2152 2152 2152 2152 2152 2152 2152 2152 2152 2152 2152 2152 2152 2152 2152 2152 2152 2152 2152 2152 2152 2152 2152 2152 2152 2152 2152 2152 2152 2152 2152 2152 2152 2152 2152 2152 2152 2152 2152 2152 2152 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2152 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
file.exepid process 1192 file.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 2152 Token: SeCreatePagefilePrivilege 2152 Token: SeShutdownPrivilege 2152 Token: SeCreatePagefilePrivilege 2152 Token: SeShutdownPrivilege 2152 Token: SeCreatePagefilePrivilege 2152 Token: SeShutdownPrivilege 2152 Token: SeCreatePagefilePrivilege 2152 Token: SeShutdownPrivilege 2152 Token: SeCreatePagefilePrivilege 2152 Token: SeShutdownPrivilege 2152 Token: SeCreatePagefilePrivilege 2152 Token: SeShutdownPrivilege 2152 Token: SeCreatePagefilePrivilege 2152 Token: SeShutdownPrivilege 2152 Token: SeCreatePagefilePrivilege 2152 Token: SeShutdownPrivilege 2152 Token: SeCreatePagefilePrivilege 2152 -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
rundll32.exepid process 944 rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
pid process 2152 2152 -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
E5F0.exerundll32.exedescription pid process target process PID 2152 wrote to memory of 3888 2152 E5F0.exe PID 2152 wrote to memory of 3888 2152 E5F0.exe PID 2152 wrote to memory of 3888 2152 E5F0.exe PID 3888 wrote to memory of 3564 3888 E5F0.exe rundll32.exe PID 3888 wrote to memory of 3564 3888 E5F0.exe rundll32.exe PID 3888 wrote to memory of 3564 3888 E5F0.exe rundll32.exe PID 3564 wrote to memory of 944 3564 rundll32.exe rundll32.exe PID 3564 wrote to memory of 944 3564 rundll32.exe rundll32.exe PID 3564 wrote to memory of 944 3564 rundll32.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\E5F0.exeC:\Users\Admin\AppData\Local\Temp\E5F0.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Qsedeqtedeooeo.tmp",Wufaiiuuye2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 141443⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3888 -s 5282⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3888 -ip 38881⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k LocalService1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\WindowsPowerShell\Modules\selection-actions.dllFilesize
797KB
MD5603aaa84200d2c463de15324bd225037
SHA14fa9f0055fe6751bd5fbd1fa01d2cd79a84129dd
SHA256b24d5cc8f732324c71675009cf73b15d0c7042375f76d73c5b3b77b48a83e3fb
SHA512a38f439ad3956c70a2d5c25b079475f68c61a32d68089177d9a033491356df1c51584d2f7a83f2b0d70811e3421a82923065a8cdd288f712c46af783fb938e37
-
C:\ProgramData\{DFE614B1-1B05-F404-C372-1D93E0034A80}\Fwroes.tmpFilesize
1.3MB
MD54f73fb4e09c28f91a4847282bb7db2ac
SHA1f9c0313dae5d2dab6c7e954c09b8ee49a2d0f0b1
SHA256622f013f7ad8544d41a6682c801419445ad8b52893c878b61638efd636acbe91
SHA512af0842b61021763a4b9f6b7506a7a8f3f5291b1b81628591c87ea4b05795e56234591b6ac12466d033634ac3b2fbb89a6c301ac2ea9913f3f798eb6c2fe35a39
-
C:\Users\Admin\AppData\Local\Temp\E5F0.exeFilesize
1.1MB
MD5cefdeeedeae94644485f2f7b17479059
SHA198875840acd3da6fd699b3b8b96aa3cfa1796580
SHA25657462a03024056258e2b9979d50efb16e30ecdab9e9cda9bc7e7e62fd6a694bb
SHA512f52f8484a03dcf4d57e6f43ce46effa301ae5ab580000cd03a6d6587678c1c3a6b6ed9e289d915e342e506aa9ea46e66eec039a0db2f82d53d020bf33bb8f6c4
-
C:\Users\Admin\AppData\Local\Temp\E5F0.exeFilesize
1.1MB
MD5cefdeeedeae94644485f2f7b17479059
SHA198875840acd3da6fd699b3b8b96aa3cfa1796580
SHA25657462a03024056258e2b9979d50efb16e30ecdab9e9cda9bc7e7e62fd6a694bb
SHA512f52f8484a03dcf4d57e6f43ce46effa301ae5ab580000cd03a6d6587678c1c3a6b6ed9e289d915e342e506aa9ea46e66eec039a0db2f82d53d020bf33bb8f6c4
-
C:\Users\Admin\AppData\Local\Temp\Qsedeqtedeooeo.tmpFilesize
797KB
MD524925b25552a7d8f1d3292071e545920
SHA1f786e1d40df30f6fed0301d60c823b655f2d6eac
SHA2569931503a3ab908d2840dae6a7cb77a5abc5e77cc67af405d1329b7dfc3fe800b
SHA512242dbf94b06e67fdf0aac29b2f38ce4929d156c42e2413565f203cda1fdb6458e34b26eeb0151fe4f1914432be28b16d648affa63f20c7b480c54e2d9360fb26
-
C:\Users\Admin\AppData\Local\Temp\Qsedeqtedeooeo.tmpFilesize
797KB
MD524925b25552a7d8f1d3292071e545920
SHA1f786e1d40df30f6fed0301d60c823b655f2d6eac
SHA2569931503a3ab908d2840dae6a7cb77a5abc5e77cc67af405d1329b7dfc3fe800b
SHA512242dbf94b06e67fdf0aac29b2f38ce4929d156c42e2413565f203cda1fdb6458e34b26eeb0151fe4f1914432be28b16d648affa63f20c7b480c54e2d9360fb26
-
\??\c:\program files (x86)\windowspowershell\modules\selection-actions.dllFilesize
797KB
MD5603aaa84200d2c463de15324bd225037
SHA14fa9f0055fe6751bd5fbd1fa01d2cd79a84129dd
SHA256b24d5cc8f732324c71675009cf73b15d0c7042375f76d73c5b3b77b48a83e3fb
SHA512a38f439ad3956c70a2d5c25b079475f68c61a32d68089177d9a033491356df1c51584d2f7a83f2b0d70811e3421a82923065a8cdd288f712c46af783fb938e37
-
memory/944-153-0x00007FF6F5576890-mapping.dmp
-
memory/944-158-0x00000288210C0000-0x00000288212EA000-memory.dmpFilesize
2.2MB
-
memory/944-157-0x0000000000D10000-0x0000000000F29000-memory.dmpFilesize
2.1MB
-
memory/944-155-0x0000028822A90000-0x0000028822BD0000-memory.dmpFilesize
1.2MB
-
memory/944-154-0x0000028822A90000-0x0000028822BD0000-memory.dmpFilesize
1.2MB
-
memory/1192-135-0x0000000000400000-0x0000000000460000-memory.dmpFilesize
384KB
-
memory/1192-134-0x0000000000400000-0x0000000000460000-memory.dmpFilesize
384KB
-
memory/1192-132-0x00000000007C3000-0x00000000007D4000-memory.dmpFilesize
68KB
-
memory/1192-133-0x00000000001F0000-0x00000000001F9000-memory.dmpFilesize
36KB
-
memory/3564-139-0x0000000000000000-mapping.dmp
-
memory/3564-146-0x00000000053F0000-0x0000000005B15000-memory.dmpFilesize
7.1MB
-
memory/3564-150-0x0000000005CF0000-0x0000000005E30000-memory.dmpFilesize
1.2MB
-
memory/3564-151-0x0000000005CF0000-0x0000000005E30000-memory.dmpFilesize
1.2MB
-
memory/3564-152-0x0000000005CF0000-0x0000000005E30000-memory.dmpFilesize
1.2MB
-
memory/3564-148-0x0000000005CF0000-0x0000000005E30000-memory.dmpFilesize
1.2MB
-
memory/3564-147-0x0000000005CF0000-0x0000000005E30000-memory.dmpFilesize
1.2MB
-
memory/3564-149-0x0000000005CF0000-0x0000000005E30000-memory.dmpFilesize
1.2MB
-
memory/3564-156-0x0000000005D69000-0x0000000005D6B000-memory.dmpFilesize
8KB
-
memory/3564-145-0x00000000053F0000-0x0000000005B15000-memory.dmpFilesize
7.1MB
-
memory/3564-159-0x00000000053F0000-0x0000000005B15000-memory.dmpFilesize
7.1MB
-
memory/3888-144-0x0000000000400000-0x000000000053E000-memory.dmpFilesize
1.2MB
-
memory/3888-143-0x0000000002290000-0x00000000023C0000-memory.dmpFilesize
1.2MB
-
memory/3888-142-0x0000000000638000-0x0000000000727000-memory.dmpFilesize
956KB
-
memory/3888-136-0x0000000000000000-mapping.dmp