Analysis
-
max time kernel
91s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
06-02-2023 20:27
Static task
static1
Behavioral task
behavioral1
Sample
105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe
Resource
win7-20221111-en
General
-
Target
105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe
-
Size
2.3MB
-
MD5
b162ab57ef8877c9ab873932e3025039
-
SHA1
f7f290cf666bc4e8877a5ef09b8ed1ab8291638f
-
SHA256
105b3e33e393c9d0ccdaae95ffcbb9eff9a946f79683ca932a11d0fc674c64e2
-
SHA512
13927b2df2e9aeaf601def099b7f006383937f2984344571150a45aad034a85cd13832874c8382a76a8725600cb8439820fb8d691af90f7bf8ce859b8fe1e51d
-
SSDEEP
24576:EMRpqU3LsGw9tDW06PHAHHeO4ElrkWUZlDd09H7YgngNXN4dXh5nfr2Sd5+ZiTt+:lu95k+X/nT2SdQat/cM7Zcm2
Malware Config
Extracted
quasar
1.4.0
Pure____1
sabifati.linkpc.net:4784
deli.mywire.org:4784
3a359e52-00bd-4e3d-8201-985b53b0c176
-
encryption_key
78BC50021362B61652204981B13FE17E053A03F1
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Roaming\\Google\\chrome.exe\"," 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe -
Quasar payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3972-163-0x0000000000400000-0x0000000000484000-memory.dmp family_quasar -
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
Processes:
svchost.exedescription pid process target process PID 4244 created 3556 4244 svchost.exe AdvancedRun.exe PID 4244 created 1320 4244 svchost.exe AdvancedRun.exe -
Nirsoft 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe Nirsoft C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe Nirsoft -
Stops running service(s) 3 TTPs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe -
Executes dropped EXE 4 IoCs
Processes:
AdvancedRun.exeAdvancedRun.exeRegAsm.exeRegAsm.exepid process 3556 AdvancedRun.exe 1320 AdvancedRun.exe 4020 RegAsm.exe 3972 RegAsm.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 46 api.ipify.org 47 api.ipify.org -
Drops file in System32 directory 2 IoCs
Processes:
powershell.exedescription ioc process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exedescription pid process target process PID 4300 set thread context of 3972 4300 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe RegAsm.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 1564 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exeipconfig.exepid process 4840 ipconfig.exe 4496 ipconfig.exe -
Modifies data under HKEY_USERS 41 IoCs
Processes:
powershell.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exeAdvancedRun.exeAdvancedRun.exepowershell.exe105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exepid process 3512 powershell.exe 3512 powershell.exe 4940 powershell.exe 4940 powershell.exe 5060 powershell.exe 5060 powershell.exe 4452 powershell.exe 4452 powershell.exe 3556 AdvancedRun.exe 3556 AdvancedRun.exe 3556 AdvancedRun.exe 3556 AdvancedRun.exe 1320 AdvancedRun.exe 1320 AdvancedRun.exe 1320 AdvancedRun.exe 1320 AdvancedRun.exe 1148 powershell.exe 1148 powershell.exe 4300 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe 4300 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe 4300 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe 4300 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe 4300 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe 4300 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
Processes:
105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exepowershell.exepowershell.exepowershell.exepowershell.exeAdvancedRun.exesvchost.exeAdvancedRun.exepowershell.exeRegAsm.exedescription pid process Token: SeDebugPrivilege 4300 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe Token: SeDebugPrivilege 3512 powershell.exe Token: SeDebugPrivilege 4940 powershell.exe Token: SeDebugPrivilege 5060 powershell.exe Token: SeDebugPrivilege 4452 powershell.exe Token: SeDebugPrivilege 3556 AdvancedRun.exe Token: SeImpersonatePrivilege 3556 AdvancedRun.exe Token: SeTcbPrivilege 4244 svchost.exe Token: SeTcbPrivilege 4244 svchost.exe Token: SeDebugPrivilege 1320 AdvancedRun.exe Token: SeImpersonatePrivilege 1320 AdvancedRun.exe Token: SeDebugPrivilege 1148 powershell.exe Token: SeDebugPrivilege 3972 RegAsm.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
RegAsm.exepid process 3972 RegAsm.exe -
Suspicious use of WriteProcessMemory 39 IoCs
Processes:
105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exepowershell.exepowershell.exesvchost.exedescription pid process target process PID 4300 wrote to memory of 3512 4300 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe powershell.exe PID 4300 wrote to memory of 3512 4300 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe powershell.exe PID 4300 wrote to memory of 3512 4300 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe powershell.exe PID 3512 wrote to memory of 4840 3512 powershell.exe ipconfig.exe PID 3512 wrote to memory of 4840 3512 powershell.exe ipconfig.exe PID 3512 wrote to memory of 4840 3512 powershell.exe ipconfig.exe PID 4300 wrote to memory of 4940 4300 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe powershell.exe PID 4300 wrote to memory of 4940 4300 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe powershell.exe PID 4300 wrote to memory of 4940 4300 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe powershell.exe PID 4300 wrote to memory of 5060 4300 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe powershell.exe PID 4300 wrote to memory of 5060 4300 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe powershell.exe PID 4300 wrote to memory of 5060 4300 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe powershell.exe PID 5060 wrote to memory of 4496 5060 powershell.exe ipconfig.exe PID 5060 wrote to memory of 4496 5060 powershell.exe ipconfig.exe PID 5060 wrote to memory of 4496 5060 powershell.exe ipconfig.exe PID 4300 wrote to memory of 4452 4300 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe powershell.exe PID 4300 wrote to memory of 4452 4300 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe powershell.exe PID 4300 wrote to memory of 4452 4300 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe powershell.exe PID 4300 wrote to memory of 3556 4300 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe AdvancedRun.exe PID 4300 wrote to memory of 3556 4300 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe AdvancedRun.exe PID 4300 wrote to memory of 3556 4300 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe AdvancedRun.exe PID 4244 wrote to memory of 1564 4244 svchost.exe sc.exe PID 4244 wrote to memory of 1564 4244 svchost.exe sc.exe PID 4300 wrote to memory of 1320 4300 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe AdvancedRun.exe PID 4300 wrote to memory of 1320 4300 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe AdvancedRun.exe PID 4300 wrote to memory of 1320 4300 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe AdvancedRun.exe PID 4244 wrote to memory of 1148 4244 svchost.exe powershell.exe PID 4244 wrote to memory of 1148 4244 svchost.exe powershell.exe PID 4300 wrote to memory of 4020 4300 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe RegAsm.exe PID 4300 wrote to memory of 4020 4300 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe RegAsm.exe PID 4300 wrote to memory of 4020 4300 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe RegAsm.exe PID 4300 wrote to memory of 3972 4300 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe RegAsm.exe PID 4300 wrote to memory of 3972 4300 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe RegAsm.exe PID 4300 wrote to memory of 3972 4300 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe RegAsm.exe PID 4300 wrote to memory of 3972 4300 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe RegAsm.exe PID 4300 wrote to memory of 3972 4300 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe RegAsm.exe PID 4300 wrote to memory of 3972 4300 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe RegAsm.exe PID 4300 wrote to memory of 3972 4300 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe RegAsm.exe PID 4300 wrote to memory of 3972 4300 105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe RegAsm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe"C:\Users\Admin\AppData\Local\Temp\105B3E33E393C9D0CCDAAE95FFCBB9EFF9A946F79683C.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc aQBwAGMAbwBuAGYAaQBnACAALwByAGUAbABlAGEAcwBlAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\system32\ipconfig.exe" /release3⤵
- Gathers network information
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBzACAAMgA1AA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc aQBwAGMAbwBuAGYAaQBnACAALwByAGUAbgBlAHcA2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\system32\ipconfig.exe" /renew3⤵
- Gathers network information
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQAuADUA2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe" /EXEFilename "C:\Windows\System32\sc.exe" /WindowState 0 /CommandLine "stop WinDefend" /StartDirectory "" /RunAs 8 /Run2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\sc.exe"C:\Windows\System32\sc.exe" stop WinDefend3⤵
- Launches sc.exe
-
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe" /EXEFilename "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" /WindowState 0 /CommandLine "rmdir 'C:\ProgramData\Microsoft\Windows Defender' -Recurse" /StartDirectory "" /RunAs 8 /Run2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" rmdir 'C:\ProgramData\Microsoft\Windows Defender' -Recurse3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\RegAsm.exeC:\Users\Admin\AppData\Local\Temp\RegAsm.exe2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\RegAsm.exeC:\Users\Admin\AppData\Local\Temp\RegAsm.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s seclogon1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logFilesize
1KB
MD533b19d75aa77114216dbc23f43b195e3
SHA136a6c3975e619e0c5232aa4f5b7dc1fec9525535
SHA256b23ced31b855e5a39c94afa1f9d55b023b8c40d4dc62143e0539c6916c12c9d2
SHA512676fa2fd34878b75e5899197fe6826bb5604541aa468804bc9835bd3acabed2e6759878a8f1358955413818a51456816e90f149133828575a416c2a74fc7d821
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheFilesize
53KB
MD506ad34f9739c5159b4d92d702545bd49
SHA19152a0d4f153f3f40f7e606be75f81b582ee0c17
SHA256474813b625f00710f29fa3b488235a6a22201851efb336bddf60d7d24a66bfba
SHA512c272cd28ae164d465b779163ba9eca6a28261376414c6bbdfbd9f2128adb7f7ff1420e536b4d6000d0301ded2ec9036bc5c657588458bff41f176bdce8d74f92
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
11KB
MD55d63e96594a2c7bd167eb408180bf6d6
SHA1f168aeb7afd4fab4b8d1f8b32b88e4c4803d68ae
SHA256529f95ce89214b6ba7ecaecd86a1c7f9edf15964eedc0c3579aaa69dca4346aa
SHA51287e1e3b416844ce8e979a73ad73931e3da0925fdd8555ddb89680db2b121923da7c5eb04861b5d597803317c0d1e283e055ccfcdf026691c63d9e76eda9194d9
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
16KB
MD566512790a5f0e2f04f287c3d6c5eb479
SHA10a234afc3b4bdbd1e85df3f778cc86ea94980fe9
SHA2568c214b37c1e28ea3e9da9f856c02d6587de97aa361f03dce2ffe8187cb1350a7
SHA512dfd283eb9263194f346e9ab67910947abc170642da29b35f9abe9d8e67e67c1d1baf01322ddf2c4fd88e23f3c64fa0af967b825f1d322433f206a9261a649f1f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
11KB
MD576d544b5f248f8c39b63e0ef5c9f42a2
SHA15c312b4829c7b74788239007e936d50d7cb4030c
SHA2568cd0b5dac88886c360025b45358f6df62bd32ce3ac7ab69768f976b1c0930694
SHA5127894e0d653ee16892a3154670a9f225a43fda5b0e48f92ee3a5b682d553666be1eb470b279f5416026736735ded8f78300c2eb361e2c357997f35eab9c04e183
-
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exeFilesize
88KB
MD517fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exeFilesize
88KB
MD517fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
C:\Users\Admin\AppData\Local\Temp\RegAsm.exeFilesize
63KB
MD50d5df43af2916f47d00c1573797c1a13
SHA1230ab5559e806574d26b4c20847c368ed55483b0
SHA256c066aee7aa3aa83f763ebc5541daa266ed6c648fbffcde0d836a13b221bb2adc
SHA512f96cf9e1890746b12daf839a6d0f16f062b72c1b8a40439f96583f242980f10f867720232a6fa0f7d4d7ac0a7a6143981a5a130d6417ea98b181447134c7cfe2
-
C:\Users\Admin\AppData\Local\Temp\RegAsm.exeFilesize
63KB
MD50d5df43af2916f47d00c1573797c1a13
SHA1230ab5559e806574d26b4c20847c368ed55483b0
SHA256c066aee7aa3aa83f763ebc5541daa266ed6c648fbffcde0d836a13b221bb2adc
SHA512f96cf9e1890746b12daf839a6d0f16f062b72c1b8a40439f96583f242980f10f867720232a6fa0f7d4d7ac0a7a6143981a5a130d6417ea98b181447134c7cfe2
-
C:\Users\Admin\AppData\Local\Temp\RegAsm.exeFilesize
63KB
MD50d5df43af2916f47d00c1573797c1a13
SHA1230ab5559e806574d26b4c20847c368ed55483b0
SHA256c066aee7aa3aa83f763ebc5541daa266ed6c648fbffcde0d836a13b221bb2adc
SHA512f96cf9e1890746b12daf839a6d0f16f062b72c1b8a40439f96583f242980f10f867720232a6fa0f7d4d7ac0a7a6143981a5a130d6417ea98b181447134c7cfe2
-
memory/1148-169-0x00007FFEB04F0000-0x00007FFEB0FB1000-memory.dmpFilesize
10.8MB
-
memory/1148-167-0x00007FFEB04F0000-0x00007FFEB0FB1000-memory.dmpFilesize
10.8MB
-
memory/1148-158-0x000002E6A7A60000-0x000002E6A7A82000-memory.dmpFilesize
136KB
-
memory/1148-157-0x0000000000000000-mapping.dmp
-
memory/1320-155-0x0000000000000000-mapping.dmp
-
memory/1564-154-0x0000000000000000-mapping.dmp
-
memory/3512-134-0x0000000004FB0000-0x0000000004FE6000-memory.dmpFilesize
216KB
-
memory/3512-135-0x0000000005620000-0x0000000005C48000-memory.dmpFilesize
6.2MB
-
memory/3512-136-0x00000000055C0000-0x00000000055E2000-memory.dmpFilesize
136KB
-
memory/3512-139-0x0000000006490000-0x00000000064AE000-memory.dmpFilesize
120KB
-
memory/3512-133-0x0000000000000000-mapping.dmp
-
memory/3512-138-0x0000000005F60000-0x0000000005FC6000-memory.dmpFilesize
408KB
-
memory/3512-137-0x0000000005DC0000-0x0000000005E26000-memory.dmpFilesize
408KB
-
memory/3556-152-0x0000000000000000-mapping.dmp
-
memory/3972-163-0x0000000000400000-0x0000000000484000-memory.dmpFilesize
528KB
-
memory/3972-172-0x0000000006050000-0x0000000006102000-memory.dmpFilesize
712KB
-
memory/3972-171-0x0000000005DE0000-0x0000000005E30000-memory.dmpFilesize
320KB
-
memory/3972-170-0x0000000006400000-0x0000000006A18000-memory.dmpFilesize
6.1MB
-
memory/3972-168-0x00000000052E0000-0x00000000052EA000-memory.dmpFilesize
40KB
-
memory/3972-166-0x0000000005830000-0x0000000005DD4000-memory.dmpFilesize
5.6MB
-
memory/3972-162-0x0000000000000000-mapping.dmp
-
memory/4020-160-0x0000000000000000-mapping.dmp
-
memory/4300-132-0x00000000006B0000-0x00000000008FE000-memory.dmpFilesize
2.3MB
-
memory/4300-159-0x00000000011C0000-0x0000000001252000-memory.dmpFilesize
584KB
-
memory/4452-149-0x0000000000000000-mapping.dmp
-
memory/4496-148-0x0000000000000000-mapping.dmp
-
memory/4840-140-0x0000000000000000-mapping.dmp
-
memory/4940-145-0x0000000006E00000-0x0000000006E1A000-memory.dmpFilesize
104KB
-
memory/4940-144-0x0000000008230000-0x00000000088AA000-memory.dmpFilesize
6.5MB
-
memory/4940-141-0x0000000000000000-mapping.dmp
-
memory/5060-146-0x0000000000000000-mapping.dmp