Analysis
-
max time kernel
91s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
06-02-2023 20:26
Static task
static1
Behavioral task
behavioral1
Sample
105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe
Resource
win7-20221111-en
General
-
Target
105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe
-
Size
2MB
-
MD5
b162ab57ef8877c9ab873932e3025039
-
SHA1
f7f290cf666bc4e8877a5ef09b8ed1ab8291638f
-
SHA256
105b3e33e393c9d0ccdaae95ffcbb9eff9a946f79683ca932a11d0fc674c64e2
-
SHA512
13927b2df2e9aeaf601def099b7f006383937f2984344571150a45aad034a85cd13832874c8382a76a8725600cb8439820fb8d691af90f7bf8ce859b8fe1e51d
-
SSDEEP
24576:EMRpqU3LsGw9tDW06PHAHHeO4ElrkWUZlDd09H7YgngNXN4dXh5nfr2Sd5+ZiTt+:lu95k+X/nT2SdQat/cM7Zcm2
Malware Config
Extracted
quasar
1.4.0
Pure____1
sabifati.linkpc.net:4784
deli.mywire.org:4784
-
encryption_key
78BC50021362B61652204981B13FE17E053A03F1
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Roaming\\Google\\chrome.exe\"," 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe -
Quasar payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2192-165-0x0000000000400000-0x0000000000484000-memory.dmp family_quasar -
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
Processes:
svchost.exedescription pid process target process PID 3620 created 2868 3620 svchost.exe AdvancedRun.exe PID 3620 created 2536 3620 svchost.exe AdvancedRun.exe -
Nirsoft 2 IoCs
Processes:
resource yara_rule behavioral2/files/0x000200000001e6c6-153.dat Nirsoft behavioral2/files/0x000200000001e6c6-156.dat Nirsoft -
Stops running service(s) 3 TTPs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe -
Executes dropped EXE 4 IoCs
Processes:
AdvancedRun.exeAdvancedRun.exeRegAsm.exeRegAsm.exepid process 2868 AdvancedRun.exe 2536 AdvancedRun.exe 4236 RegAsm.exe 2192 RegAsm.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 46 api.ipify.org 47 api.ipify.org -
Drops file in System32 directory 2 IoCs
Processes:
powershell.exedescription ioc process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exedescription pid process target process PID 4876 set thread context of 2192 4876 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe RegAsm.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 4208 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exeipconfig.exepid process 1440 ipconfig.exe 1636 ipconfig.exe -
Modifies data under HKEY_USERS 41 IoCs
Processes:
powershell.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exeAdvancedRun.exeAdvancedRun.exepowershell.exe105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exepid process 4664 powershell.exe 4664 powershell.exe 2828 powershell.exe 2828 powershell.exe 4984 powershell.exe 4984 powershell.exe 5044 powershell.exe 5044 powershell.exe 2868 AdvancedRun.exe 2868 AdvancedRun.exe 2868 AdvancedRun.exe 2868 AdvancedRun.exe 2536 AdvancedRun.exe 2536 AdvancedRun.exe 2536 AdvancedRun.exe 2536 AdvancedRun.exe 2864 powershell.exe 2864 powershell.exe 4876 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe 4876 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe 4876 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe 4876 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe 4876 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe 4876 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
Processes:
105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exepowershell.exepowershell.exepowershell.exepowershell.exeAdvancedRun.exesvchost.exeAdvancedRun.exepowershell.exeRegAsm.exedescription pid process Token: SeDebugPrivilege 4876 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe Token: SeDebugPrivilege 4664 powershell.exe Token: SeDebugPrivilege 2828 powershell.exe Token: SeDebugPrivilege 4984 powershell.exe Token: SeDebugPrivilege 5044 powershell.exe Token: SeDebugPrivilege 2868 AdvancedRun.exe Token: SeImpersonatePrivilege 2868 AdvancedRun.exe Token: SeTcbPrivilege 3620 svchost.exe Token: SeTcbPrivilege 3620 svchost.exe Token: SeDebugPrivilege 2536 AdvancedRun.exe Token: SeImpersonatePrivilege 2536 AdvancedRun.exe Token: SeDebugPrivilege 2864 powershell.exe Token: SeDebugPrivilege 2192 RegAsm.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
RegAsm.exepid process 2192 RegAsm.exe -
Suspicious use of WriteProcessMemory 39 IoCs
Processes:
105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exepowershell.exepowershell.exesvchost.exedescription pid process target process PID 4876 wrote to memory of 4664 4876 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe powershell.exe PID 4876 wrote to memory of 4664 4876 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe powershell.exe PID 4876 wrote to memory of 4664 4876 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe powershell.exe PID 4664 wrote to memory of 1636 4664 powershell.exe ipconfig.exe PID 4664 wrote to memory of 1636 4664 powershell.exe ipconfig.exe PID 4664 wrote to memory of 1636 4664 powershell.exe ipconfig.exe PID 4876 wrote to memory of 2828 4876 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe powershell.exe PID 4876 wrote to memory of 2828 4876 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe powershell.exe PID 4876 wrote to memory of 2828 4876 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe powershell.exe PID 4876 wrote to memory of 4984 4876 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe powershell.exe PID 4876 wrote to memory of 4984 4876 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe powershell.exe PID 4876 wrote to memory of 4984 4876 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe powershell.exe PID 4984 wrote to memory of 1440 4984 powershell.exe ipconfig.exe PID 4984 wrote to memory of 1440 4984 powershell.exe ipconfig.exe PID 4984 wrote to memory of 1440 4984 powershell.exe ipconfig.exe PID 4876 wrote to memory of 5044 4876 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe powershell.exe PID 4876 wrote to memory of 5044 4876 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe powershell.exe PID 4876 wrote to memory of 5044 4876 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe powershell.exe PID 4876 wrote to memory of 2868 4876 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe AdvancedRun.exe PID 4876 wrote to memory of 2868 4876 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe AdvancedRun.exe PID 4876 wrote to memory of 2868 4876 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe AdvancedRun.exe PID 3620 wrote to memory of 4208 3620 svchost.exe sc.exe PID 3620 wrote to memory of 4208 3620 svchost.exe sc.exe PID 4876 wrote to memory of 2536 4876 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe AdvancedRun.exe PID 4876 wrote to memory of 2536 4876 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe AdvancedRun.exe PID 4876 wrote to memory of 2536 4876 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe AdvancedRun.exe PID 3620 wrote to memory of 2864 3620 svchost.exe powershell.exe PID 3620 wrote to memory of 2864 3620 svchost.exe powershell.exe PID 4876 wrote to memory of 4236 4876 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe RegAsm.exe PID 4876 wrote to memory of 4236 4876 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe RegAsm.exe PID 4876 wrote to memory of 4236 4876 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe RegAsm.exe PID 4876 wrote to memory of 2192 4876 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe RegAsm.exe PID 4876 wrote to memory of 2192 4876 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe RegAsm.exe PID 4876 wrote to memory of 2192 4876 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe RegAsm.exe PID 4876 wrote to memory of 2192 4876 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe RegAsm.exe PID 4876 wrote to memory of 2192 4876 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe RegAsm.exe PID 4876 wrote to memory of 2192 4876 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe RegAsm.exe PID 4876 wrote to memory of 2192 4876 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe RegAsm.exe PID 4876 wrote to memory of 2192 4876 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe RegAsm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe"C:\Users\Admin\AppData\Local\Temp\105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe"Modifies WinLogon for persistenceChecks computer location settingsSuspicious use of SetThreadContextSuspicious behavior: EnumeratesProcessesSuspicious use of AdjustPrivilegeTokenSuspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc aQBwAGMAbwBuAGYAaQBnACAALwByAGUAbABlAGEAcwBlAA==Suspicious behavior: EnumeratesProcessesSuspicious use of AdjustPrivilegeTokenSuspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\system32\ipconfig.exe" /releaseGathers network information
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBzACAAMgA1AA==Suspicious behavior: EnumeratesProcessesSuspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc aQBwAGMAbwBuAGYAaQBnACAALwByAGUAbgBlAHcASuspicious behavior: EnumeratesProcessesSuspicious use of AdjustPrivilegeTokenSuspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\system32\ipconfig.exe" /renewGathers network information
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQAuADUASuspicious behavior: EnumeratesProcessesSuspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe" /EXEFilename "C:\Windows\System32\sc.exe" /WindowState 0 /CommandLine "stop WinDefend" /StartDirectory "" /RunAs 8 /RunExecutes dropped EXESuspicious behavior: EnumeratesProcessesSuspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\sc.exe"C:\Windows\System32\sc.exe" stop WinDefendLaunches sc.exe
-
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe" /EXEFilename "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" /WindowState 0 /CommandLine "rmdir 'C:\ProgramData\Microsoft\Windows Defender' -Recurse" /StartDirectory "" /RunAs 8 /RunExecutes dropped EXESuspicious behavior: EnumeratesProcessesSuspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" rmdir 'C:\ProgramData\Microsoft\Windows Defender' -RecurseDrops file in System32 directoryModifies data under HKEY_USERSSuspicious behavior: EnumeratesProcessesSuspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\RegAsm.exeC:\Users\Admin\AppData\Local\Temp\RegAsm.exeExecutes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\RegAsm.exeC:\Users\Admin\AppData\Local\Temp\RegAsm.exeExecutes dropped EXESuspicious use of AdjustPrivilegeTokenSuspicious use of SetWindowsHookEx
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s seclogonSuspicious use of NtCreateUserProcessOtherParentProcessSuspicious use of AdjustPrivilegeTokenSuspicious use of WriteProcessMemory
Network
MITRE ATT&CK Matrix
Collection
Command and Control
Credential Access
Defense Evasion
Modify Registry
1Execution
Command-Line Interface
1Exfiltration
Impact
Service Stop
1Initial Access
Lateral Movement
Privilege Escalation
Replay Monitor
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logFilesize
1KB
MD533b19d75aa77114216dbc23f43b195e3
SHA136a6c3975e619e0c5232aa4f5b7dc1fec9525535
SHA256b23ced31b855e5a39c94afa1f9d55b023b8c40d4dc62143e0539c6916c12c9d2
SHA512676fa2fd34878b75e5899197fe6826bb5604541aa468804bc9835bd3acabed2e6759878a8f1358955413818a51456816e90f149133828575a416c2a74fc7d821
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheFilesize
53KB
MD506ad34f9739c5159b4d92d702545bd49
SHA19152a0d4f153f3f40f7e606be75f81b582ee0c17
SHA256474813b625f00710f29fa3b488235a6a22201851efb336bddf60d7d24a66bfba
SHA512c272cd28ae164d465b779163ba9eca6a28261376414c6bbdfbd9f2128adb7f7ff1420e536b4d6000d0301ded2ec9036bc5c657588458bff41f176bdce8d74f92
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
11KB
MD58d2bfb474c8c19ad64c08ff5269579c4
SHA1feba7a1b11e0de7ebccb281bf3f5435c7720e34c
SHA256ff6c49e200f7cf2c49d09483f5e0798a7626ce99a00d1a9d7879d7ecb190a08a
SHA512b5e720d6b94451a563fdfa34f7dd6716c26c36ed1eb4b608009eba8364e5989182d5b409492d7b6814180d1dcb24dcea64ac8496c2e3406df3dc5570bb579f43
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
16KB
MD5d6036ee2d579fe8234989c131e61328c
SHA12a3b8711a5bd126982b3c936bd35610a8301b461
SHA256ecddc608d81f66ba771cd01cabcf283988908b647653a9ca5cd8851467b82b36
SHA51262fe8f9e04905471324743618b670982473b49e4389885b99800b4e158c2a7e113eb6e527f16da71c2a68ac22c19eb8e8d88c3be5eaf83b5bf79bcc025755ed7
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
11KB
MD5a27ac102c8cdd39e29d1323cb333a32c
SHA18f53ea81db8799af61770b1a2c855ab745b16cfa
SHA256f2f9f44e9de8c2e27045239d757479e2c6e498fff5f4be31270c08a76205c197
SHA512138b6973fef7d1ff97b45675718a77f893f93b663784fa6c1e5c6e3f9f66347b877f9354426f5583f402cabf86d0bf6a261bb45819cc28d4c78d1606c00c1644
-
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exeFilesize
88KB
MD517fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exeFilesize
88KB
MD517fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
C:\Users\Admin\AppData\Local\Temp\RegAsm.exeFilesize
63KB
MD50d5df43af2916f47d00c1573797c1a13
SHA1230ab5559e806574d26b4c20847c368ed55483b0
SHA256c066aee7aa3aa83f763ebc5541daa266ed6c648fbffcde0d836a13b221bb2adc
SHA512f96cf9e1890746b12daf839a6d0f16f062b72c1b8a40439f96583f242980f10f867720232a6fa0f7d4d7ac0a7a6143981a5a130d6417ea98b181447134c7cfe2
-
C:\Users\Admin\AppData\Local\Temp\RegAsm.exeFilesize
63KB
MD50d5df43af2916f47d00c1573797c1a13
SHA1230ab5559e806574d26b4c20847c368ed55483b0
SHA256c066aee7aa3aa83f763ebc5541daa266ed6c648fbffcde0d836a13b221bb2adc
SHA512f96cf9e1890746b12daf839a6d0f16f062b72c1b8a40439f96583f242980f10f867720232a6fa0f7d4d7ac0a7a6143981a5a130d6417ea98b181447134c7cfe2
-
C:\Users\Admin\AppData\Local\Temp\RegAsm.exeFilesize
63KB
MD50d5df43af2916f47d00c1573797c1a13
SHA1230ab5559e806574d26b4c20847c368ed55483b0
SHA256c066aee7aa3aa83f763ebc5541daa266ed6c648fbffcde0d836a13b221bb2adc
SHA512f96cf9e1890746b12daf839a6d0f16f062b72c1b8a40439f96583f242980f10f867720232a6fa0f7d4d7ac0a7a6143981a5a130d6417ea98b181447134c7cfe2
-
memory/1440-148-0x0000000000000000-mapping.dmp
-
memory/1636-140-0x0000000000000000-mapping.dmp
-
memory/2192-170-0x0000000006800000-0x0000000006E18000-memory.dmpFilesize
6MB
-
memory/2192-169-0x0000000005540000-0x000000000554A000-memory.dmpFilesize
40KB
-
memory/2192-168-0x0000000005C30000-0x00000000061D4000-memory.dmpFilesize
5MB
-
memory/2192-171-0x0000000005AA0000-0x0000000005AF0000-memory.dmpFilesize
320KB
-
memory/2192-172-0x00000000062C0000-0x0000000006372000-memory.dmpFilesize
712KB
-
memory/2192-165-0x0000000000400000-0x0000000000484000-memory.dmpFilesize
528KB
-
memory/2192-163-0x0000000000000000-mapping.dmp
-
memory/2536-155-0x0000000000000000-mapping.dmp
-
memory/2828-145-0x00000000066A0000-0x00000000066BA000-memory.dmpFilesize
104KB
-
memory/2828-144-0x0000000007AB0000-0x000000000812A000-memory.dmpFilesize
6MB
-
memory/2828-141-0x0000000000000000-mapping.dmp
-
memory/2864-164-0x00007FFB80140000-0x00007FFB80C01000-memory.dmpFilesize
10MB
-
memory/2864-159-0x00007FFB80140000-0x00007FFB80C01000-memory.dmpFilesize
10MB
-
memory/2864-157-0x0000000000000000-mapping.dmp
-
memory/2864-158-0x000002B94C340000-0x000002B94C362000-memory.dmpFilesize
136KB
-
memory/2868-152-0x0000000000000000-mapping.dmp
-
memory/4208-154-0x0000000000000000-mapping.dmp
-
memory/4236-161-0x0000000000000000-mapping.dmp
-
memory/4664-133-0x0000000000000000-mapping.dmp
-
memory/4664-139-0x0000000006650000-0x000000000666E000-memory.dmpFilesize
120KB
-
memory/4664-134-0x0000000002D20000-0x0000000002D56000-memory.dmpFilesize
216KB
-
memory/4664-137-0x0000000005850000-0x00000000058B6000-memory.dmpFilesize
408KB
-
memory/4664-135-0x00000000058E0000-0x0000000005F08000-memory.dmpFilesize
6MB
-
memory/4664-136-0x00000000057B0000-0x00000000057D2000-memory.dmpFilesize
136KB
-
memory/4664-138-0x0000000005FC0000-0x0000000006026000-memory.dmpFilesize
408KB
-
memory/4876-160-0x0000000000D00000-0x0000000000D92000-memory.dmpFilesize
584KB
-
memory/4876-132-0x0000000000560000-0x00000000007AE000-memory.dmpFilesize
2MB
-
memory/4984-146-0x0000000000000000-mapping.dmp
-
memory/5044-149-0x0000000000000000-mapping.dmp