Analysis
-
max time kernel
88s -
max time network
106s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
29-03-2024 10:32
Static task
static1
Behavioral task
behavioral1
Sample
633f529507c1b10770ee864e3799d15cd187138a7998f313ab080ad646012573.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
633f529507c1b10770ee864e3799d15cd187138a7998f313ab080ad646012573.exe
Resource
win11-20240221-en
General
-
Target
633f529507c1b10770ee864e3799d15cd187138a7998f313ab080ad646012573.exe
-
Size
204KB
-
MD5
3f6f77f2a1a79b61b366714e81155d93
-
SHA1
df858f5ffa1193f6a2aff97cc8d420c904b95e17
-
SHA256
633f529507c1b10770ee864e3799d15cd187138a7998f313ab080ad646012573
-
SHA512
747b1fc16ff30eb9f4bea3f481d2b82199ab8a8d67ade39ae4820b6c360bc2a840915f6f99cc406f8bc1efc088fa800f9227f507d5cf49b096017e5983d4d4b4
-
SSDEEP
3072:Z3SDLqRgTHASJxi5iyAJ7oI4Z4tEmPgc2F/:Z3dRgTHAGo5BEoI4Z4tEvcC/
Malware Config
Extracted
smokeloader
pub1
Extracted
smokeloader
2022
http://trad-einmyus.com/index.php
http://tradein-myus.com/index.php
http://trade-inmyus.com/index.php
Extracted
redline
LogsDiller Cloud (TG: @logsdillabot)
5.42.65.0:29587
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4200-29-0x0000000000400000-0x0000000000450000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 8 netsh.exe -
Deletes itself 1 IoCs
Processes:
pid process 3304 -
Executes dropped EXE 4 IoCs
Processes:
26BE.exe5C08.exe8C22.exe978D.exepid process 4980 26BE.exe 4204 5C08.exe 648 8C22.exe 3836 978D.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
Processes:
flow ioc 1 raw.githubusercontent.com 13 drive.google.com 19 raw.githubusercontent.com 20 drive.google.com -
Suspicious use of SetThreadContext 1 IoCs
Processes:
26BE.exedescription pid process target process PID 4980 set thread context of 4200 4980 26BE.exe RegAsm.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4804 4980 WerFault.exe 26BE.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
633f529507c1b10770ee864e3799d15cd187138a7998f313ab080ad646012573.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 633f529507c1b10770ee864e3799d15cd187138a7998f313ab080ad646012573.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 633f529507c1b10770ee864e3799d15cd187138a7998f313ab080ad646012573.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 633f529507c1b10770ee864e3799d15cd187138a7998f313ab080ad646012573.exe -
Modifies registry class 6 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-4181651180-3163410697-3990547336-1000\{C72F8C14-3F32-4993-A0C4-8CB130B646F2} explorer.exe Key created \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000_Classes\Local Settings explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
633f529507c1b10770ee864e3799d15cd187138a7998f313ab080ad646012573.exepid process 4656 633f529507c1b10770ee864e3799d15cd187138a7998f313ab080ad646012573.exe 4656 633f529507c1b10770ee864e3799d15cd187138a7998f313ab080ad646012573.exe 3304 3304 3304 3304 3304 3304 3304 3304 3304 3304 3304 3304 3304 3304 3304 3304 3304 3304 3304 3304 3304 3304 3304 3304 3304 3304 3304 3304 3304 3304 3304 3304 3304 3304 3304 3304 3304 3304 3304 3304 3304 3304 3304 3304 3304 3304 3304 3304 3304 3304 3304 3304 3304 3304 3304 3304 3304 3304 3304 3304 3304 3304 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
633f529507c1b10770ee864e3799d15cd187138a7998f313ab080ad646012573.exepid process 4656 633f529507c1b10770ee864e3799d15cd187138a7998f313ab080ad646012573.exe -
Suspicious use of AdjustPrivilegeToken 30 IoCs
Processes:
26BE.exeRegAsm.exe8C22.exepowershell.exeexplorer.exedescription pid process Token: SeShutdownPrivilege 3304 Token: SeCreatePagefilePrivilege 3304 Token: SeShutdownPrivilege 3304 Token: SeCreatePagefilePrivilege 3304 Token: SeShutdownPrivilege 3304 Token: SeCreatePagefilePrivilege 3304 Token: SeDebugPrivilege 4980 26BE.exe Token: SeShutdownPrivilege 3304 Token: SeCreatePagefilePrivilege 3304 Token: SeShutdownPrivilege 3304 Token: SeCreatePagefilePrivilege 3304 Token: SeShutdownPrivilege 3304 Token: SeCreatePagefilePrivilege 3304 Token: SeDebugPrivilege 4200 RegAsm.exe Token: SeShutdownPrivilege 3304 Token: SeCreatePagefilePrivilege 3304 Token: SeDebugPrivilege 648 8C22.exe Token: SeDebugPrivilege 836 powershell.exe Token: SeShutdownPrivilege 3304 Token: SeCreatePagefilePrivilege 3304 Token: SeShutdownPrivilege 2872 explorer.exe Token: SeCreatePagefilePrivilege 2872 explorer.exe Token: SeShutdownPrivilege 2872 explorer.exe Token: SeCreatePagefilePrivilege 2872 explorer.exe Token: SeShutdownPrivilege 2872 explorer.exe Token: SeCreatePagefilePrivilege 2872 explorer.exe Token: SeShutdownPrivilege 2872 explorer.exe Token: SeCreatePagefilePrivilege 2872 explorer.exe Token: SeShutdownPrivilege 2872 explorer.exe Token: SeCreatePagefilePrivilege 2872 explorer.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
explorer.exepid process 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe -
Suspicious use of SendNotifyMessage 9 IoCs
Processes:
explorer.exepid process 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
cmd.exe26BE.execmd.exe978D.exedescription pid process target process PID 3304 wrote to memory of 1008 3304 cmd.exe PID 3304 wrote to memory of 1008 3304 cmd.exe PID 1008 wrote to memory of 1092 1008 cmd.exe reg.exe PID 1008 wrote to memory of 1092 1008 cmd.exe reg.exe PID 3304 wrote to memory of 4980 3304 26BE.exe PID 3304 wrote to memory of 4980 3304 26BE.exe PID 3304 wrote to memory of 4980 3304 26BE.exe PID 4980 wrote to memory of 4936 4980 26BE.exe RegAsm.exe PID 4980 wrote to memory of 4936 4980 26BE.exe RegAsm.exe PID 4980 wrote to memory of 4936 4980 26BE.exe RegAsm.exe PID 4980 wrote to memory of 4200 4980 26BE.exe RegAsm.exe PID 4980 wrote to memory of 4200 4980 26BE.exe RegAsm.exe PID 4980 wrote to memory of 4200 4980 26BE.exe RegAsm.exe PID 4980 wrote to memory of 4200 4980 26BE.exe RegAsm.exe PID 4980 wrote to memory of 4200 4980 26BE.exe RegAsm.exe PID 4980 wrote to memory of 4200 4980 26BE.exe RegAsm.exe PID 4980 wrote to memory of 4200 4980 26BE.exe RegAsm.exe PID 4980 wrote to memory of 4200 4980 26BE.exe RegAsm.exe PID 3304 wrote to memory of 4204 3304 5C08.exe PID 3304 wrote to memory of 4204 3304 5C08.exe PID 3304 wrote to memory of 4204 3304 5C08.exe PID 3304 wrote to memory of 2428 3304 cmd.exe PID 3304 wrote to memory of 2428 3304 cmd.exe PID 2428 wrote to memory of 1588 2428 cmd.exe reg.exe PID 2428 wrote to memory of 1588 2428 cmd.exe reg.exe PID 3304 wrote to memory of 648 3304 8C22.exe PID 3304 wrote to memory of 648 3304 8C22.exe PID 3304 wrote to memory of 3836 3304 978D.exe PID 3304 wrote to memory of 3836 3304 978D.exe PID 3304 wrote to memory of 3836 3304 978D.exe PID 3836 wrote to memory of 836 3836 978D.exe powershell.exe PID 3836 wrote to memory of 836 3836 978D.exe powershell.exe PID 3836 wrote to memory of 836 3836 978D.exe powershell.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\633f529507c1b10770ee864e3799d15cd187138a7998f313ab080ad646012573.exe"C:\Users\Admin\AppData\Local\Temp\633f529507c1b10770ee864e3799d15cd187138a7998f313ab080ad646012573.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\A180.bat" "1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 12⤵
-
C:\Users\Admin\AppData\Local\Temp\26BE.exeC:\Users\Admin\AppData\Local\Temp\26BE.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4980 -s 8482⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4980 -ip 49801⤵
-
C:\Users\Admin\AppData\Local\Temp\5C08.exeC:\Users\Admin\AppData\Local\Temp\5C08.exe1⤵
- Executes dropped EXE
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\5E0C.bat" "1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 12⤵
-
C:\Users\Admin\AppData\Local\Temp\8C22.exeC:\Users\Admin\AppData\Local\Temp\8C22.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe2⤵
-
C:\Users\Admin\AppData\Local\Temp\978D.exeC:\Users\Admin\AppData\Local\Temp\978D.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\978D.exe"C:\Users\Admin\AppData\Local\Temp\978D.exe"2⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca1⤵
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca1⤵
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Modify Registry
1Impair Defenses
1Disable or Modify System Firewall
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\PenWorkspace\DiscoverCacheData.datFilesize
1022B
MD5245e23ceb7b4021f5a8805008fe0c74c
SHA11b8a94606735d60802b37ef568ae33bfe82043ed
SHA25636f27281c6c0310624184eec14b8886c18a09b0bd2caf6420961c43ab2e1d730
SHA512b87cb2f5a4ab30ccda40452c09dbf6ef1b666495da4a4ad16a5d78ae09ba1108ccb1d03edfe4d3912a34ecb852762c0ee19f81090a5f857e89630860a487432a
-
C:\Users\Admin\AppData\Local\Packages\microsoftwindows.client.cbs_cw5n1h2txyewy\AC\Microsoft\CryptnetUrlCache\Content\EAF8AA29A62AB29E614331747385D816_F9E4DC0B9D5C777357D7DB8DEF51118AFilesize
312B
MD52260acab17518791f1c4caeca6d87bed
SHA1ba38cbbb69b750eda456c649004cd01af863c70b
SHA25689571247f878b30bdcd3db918f0ec2c42865fdde231b885087719c5ba470207c
SHA51267b94c8cd296fa7a735a8c359a35dbbe79d03e5314ec74ab21d7562ef6e58dd13cdee48e872516a98414b29473b29602df74d2ed762b67850f3c175b42429617
-
C:\Users\Admin\AppData\Local\Packages\microsoftwindows.client.cbs_cw5n1h2txyewy\AC\Microsoft\CryptnetUrlCache\MetaData\EAF8AA29A62AB29E614331747385D816_F9E4DC0B9D5C777357D7DB8DEF51118AFilesize
404B
MD52d67641edccba5f46d990e390b923236
SHA1321a111b62d98f2c122212b001e1c3a5b0a7a954
SHA2562debd3b656d71f7bace0e9bb3fcdecec44ec8f9f4f1ce76c0555d1ea7eccd758
SHA512196936d281b1ddb97ced8e504b50faea4a045ace2d7c33466cbdf2bf010bb9893b08eafde8c45c4ba0ae4d9f867dab7bb572f9ed44b01d7ee6d54be126de1c5b
-
C:\Users\Admin\AppData\Local\Packages\microsoftwindows.client.cbs_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\A2HK19T5\www.bing[1].xmlFilesize
2KB
MD568efe310488d3c5180471af3f1393de2
SHA1c4be926891d6d7a07f1c407dbd0834b33c7fa2d7
SHA256e08d77f00aa0d4fe21c128f96061c68bfdfd48759eefa40dd86a3b26c67ffa40
SHA512145091dfffb6fa9840ea3aa8cb888d54af84275dd1cf3d2a6727476a5a523073b565fa8ff91f0e4f273a4152db03bab92fdbdca96352da65111d63705475f0b5
-
C:\Users\Admin\AppData\Local\Temp\26BE.exeFilesize
392KB
MD589ec2c6bf09ed9a38bd11acb2a41cd1b
SHA1408549982b687ca8dd5efb0e8b704a374bd8909d
SHA256da1e155c46ca6b23409d059b6d85341c0b86c92d2c69dbda85eef3894313662d
SHA512c565dbb25dd35ae8dce2a4cf15640053aca8b99c5c78db23648e6618ef316362b77142c6524b47089a7ea05632adee091ec5e82ed95aeb86d2331b8c5f8cc56a
-
C:\Users\Admin\AppData\Local\Temp\5C08.exeFilesize
6.5MB
MD59e52aa572f0afc888c098db4c0f687ff
SHA1ef7c2bb222e69ad0e10c8686eb03dcbee7933c2b
SHA2564a40f9d491f09521f4b0c6076a0eb488f6d8e1cf4b67aa6569c2ccce13556443
SHA512d0991e682ae8c954721e905753b56c01f91b85313beb9996331793c3efa8acc13d574ef5ba44853ecc3e05822931ed655bad1924fa11b774a43e015f42185f62
-
C:\Users\Admin\AppData\Local\Temp\8C22.exeFilesize
30.6MB
MD5ff35671d54d612772b0c22c141a3056e
SHA1d005a27cd48556bf17eb9c2b43af49b67347cc0e
SHA2562f625ea35f82332c639049c4a849f39cd2b74acb013880d156a2f647497c2512
SHA5129a40a657f196036ef07c410db225f7a023f7299abc078cefd5d97489e7359ce9c640d72b98fedbf3f11ebaba1987b0acd5c7892b1ba5b5ae18709037df45790e
-
C:\Users\Admin\AppData\Local\Temp\978D.exeFilesize
4.1MB
MD5f3023cf0027501c0057cc293d3c792ef
SHA1fce12239da0220dde68c849b94d8c670af1b5e77
SHA2567a61ec57a9de30633d3d8d8ce8708cc5c68179c2d42dd49dff3412914b9e52d5
SHA5126dfb815413d92745c6845046be2f0ac6325d7ab7510e757916d9c116b144634785ee82d5fc07af7f46310d3bd5b09b8bc9c79aca9d0c0b09fd09f112099fba07
-
C:\Users\Admin\AppData\Local\Temp\A180.batFilesize
77B
MD555cc761bf3429324e5a0095cab002113
SHA12cc1ef4542a4e92d4158ab3978425d517fafd16d
SHA256d6cceb3c71b80403364bf142f2fa4624ee0be36a49bac25ed45a497cf1ce9c3a
SHA51233f9f5cad22d291077787c7df510806e4ac31f453d288712595af6debe579fabed6cdf4662e46e6fa94de135b161e739f55cfae05c36c87af85ed6a6ad1c9155
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_lgc5pa2s.j53.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logFilesize
2KB
MD5ac4917a885cf6050b1a483e4bc4d2ea5
SHA1b1c0a9f27bd21c6bbb8e9be70db8777b4a2a640f
SHA256e39062a62c3c7617feeeff95ea8a0be51104a0d36f46e44eea22556fda74d8d9
SHA512092c67a3ecae1d187cad72a8ea1ea37cb78a0cf79c2cd7fb88953e5990669a2e871267015762fd46d274badb88ac0c1d73b00f1df7394d89bed48a3a45c2ba3d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-InteractiveFilesize
19KB
MD52fe1cfba53f8d1490f8da6fd7abb327a
SHA144e7ecb41630a74614bb77d040c1cae664948132
SHA256ab3943ea5714e334bcc61b3d608eb140354da9439f7ea67642f946a3e7ac5d03
SHA51292d22c1d8cf3cc278f4621212307fc35ba79abf0851897b2e05fe19b955e39f74d28fa9e90e16ed74f34e8d8087890326d4e70e070310a88711dabe8745cbafd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-InteractiveFilesize
19KB
MD5eca9a6549a49854d2d8b6c612c8c7053
SHA10763229086d49bdd949f07897de8c6075db408cd
SHA25607529462b446cbf5a972b5d9f44465be8b61390cdb9fab8b846242d1d957f0b8
SHA512e353b6e2402d189159916bf10ef04aea9b872b1dcb6c8f8e0b7fb3c0529a94e37bc69d1c6c67756106fe73698025d4823788f98e44c30aa0ca901d52bfc8362a
-
memory/648-412-0x00007FF657B90000-0x00007FF659ADC000-memory.dmpFilesize
31.3MB
-
memory/648-288-0x00007FF657B90000-0x00007FF659ADC000-memory.dmpFilesize
31.3MB
-
memory/2196-409-0x0000000000CC0000-0x0000000000D0B000-memory.dmpFilesize
300KB
-
memory/2196-406-0x0000000000CC0000-0x0000000000D0B000-memory.dmpFilesize
300KB
-
memory/3108-431-0x0000000000400000-0x0000000000D1C000-memory.dmpFilesize
9.1MB
-
memory/3304-230-0x0000000001550000-0x0000000001551000-memory.dmpFilesize
4KB
-
memory/3304-4-0x0000000001520000-0x0000000001536000-memory.dmpFilesize
88KB
-
memory/4020-411-0x00000184F4520000-0x00000184F4540000-memory.dmpFilesize
128KB
-
memory/4200-37-0x0000000006610000-0x0000000006C28000-memory.dmpFilesize
6.1MB
-
memory/4200-41-0x0000000005810000-0x000000000584C000-memory.dmpFilesize
240KB
-
memory/4200-42-0x00000000059B0000-0x00000000059FC000-memory.dmpFilesize
304KB
-
memory/4200-43-0x00000000060C0000-0x0000000006126000-memory.dmpFilesize
408KB
-
memory/4200-44-0x0000000007220000-0x00000000073E2000-memory.dmpFilesize
1.8MB
-
memory/4200-45-0x0000000008030000-0x000000000855C000-memory.dmpFilesize
5.2MB
-
memory/4200-46-0x00000000076F0000-0x0000000007740000-memory.dmpFilesize
320KB
-
memory/4200-48-0x00000000748A0000-0x0000000075051000-memory.dmpFilesize
7.7MB
-
memory/4200-39-0x00000000057B0000-0x00000000057C2000-memory.dmpFilesize
72KB
-
memory/4200-38-0x00000000058A0000-0x00000000059AA000-memory.dmpFilesize
1.0MB
-
memory/4200-36-0x00000000748A0000-0x0000000075051000-memory.dmpFilesize
7.7MB
-
memory/4200-35-0x00000000055D0000-0x00000000055DA000-memory.dmpFilesize
40KB
-
memory/4200-34-0x0000000005690000-0x00000000056A0000-memory.dmpFilesize
64KB
-
memory/4200-33-0x0000000005530000-0x00000000055C2000-memory.dmpFilesize
584KB
-
memory/4200-31-0x0000000005A40000-0x0000000005FE6000-memory.dmpFilesize
5.6MB
-
memory/4200-29-0x0000000000400000-0x0000000000450000-memory.dmpFilesize
320KB
-
memory/4204-78-0x0000000003C30000-0x0000000003D30000-memory.dmpFilesize
1024KB
-
memory/4204-97-0x0000000003C30000-0x0000000003D30000-memory.dmpFilesize
1024KB
-
memory/4204-71-0x0000000000F20000-0x0000000000F60000-memory.dmpFilesize
256KB
-
memory/4204-73-0x0000000000F20000-0x0000000000F60000-memory.dmpFilesize
256KB
-
memory/4204-70-0x0000000000F20000-0x0000000000F60000-memory.dmpFilesize
256KB
-
memory/4204-72-0x0000000000F20000-0x0000000000F60000-memory.dmpFilesize
256KB
-
memory/4204-74-0x0000000000F20000-0x0000000000F60000-memory.dmpFilesize
256KB
-
memory/4204-75-0x0000000000F20000-0x0000000000F60000-memory.dmpFilesize
256KB
-
memory/4204-76-0x0000000003C30000-0x0000000003D30000-memory.dmpFilesize
1024KB
-
memory/4204-77-0x0000000003C30000-0x0000000003D30000-memory.dmpFilesize
1024KB
-
memory/4204-79-0x0000000003C30000-0x0000000003D30000-memory.dmpFilesize
1024KB
-
memory/4204-68-0x0000000000F10000-0x0000000000F11000-memory.dmpFilesize
4KB
-
memory/4204-81-0x0000000003C30000-0x0000000003D30000-memory.dmpFilesize
1024KB
-
memory/4204-82-0x0000000003C30000-0x0000000003D30000-memory.dmpFilesize
1024KB
-
memory/4204-83-0x0000000003C30000-0x0000000003D30000-memory.dmpFilesize
1024KB
-
memory/4204-85-0x0000000003C30000-0x0000000003D30000-memory.dmpFilesize
1024KB
-
memory/4204-84-0x0000000003C30000-0x0000000003D30000-memory.dmpFilesize
1024KB
-
memory/4204-80-0x0000000003C30000-0x0000000003D30000-memory.dmpFilesize
1024KB
-
memory/4204-86-0x0000000003C30000-0x0000000003D30000-memory.dmpFilesize
1024KB
-
memory/4204-87-0x0000000003C30000-0x0000000003D30000-memory.dmpFilesize
1024KB
-
memory/4204-88-0x0000000003C30000-0x0000000003D30000-memory.dmpFilesize
1024KB
-
memory/4204-89-0x0000000003C30000-0x0000000003D30000-memory.dmpFilesize
1024KB
-
memory/4204-90-0x0000000003C30000-0x0000000003D30000-memory.dmpFilesize
1024KB
-
memory/4204-91-0x0000000003C30000-0x0000000003D30000-memory.dmpFilesize
1024KB
-
memory/4204-92-0x0000000003C30000-0x0000000003D30000-memory.dmpFilesize
1024KB
-
memory/4204-94-0x0000000003C30000-0x0000000003D30000-memory.dmpFilesize
1024KB
-
memory/4204-95-0x0000000003C30000-0x0000000003D30000-memory.dmpFilesize
1024KB
-
memory/4204-96-0x0000000003C30000-0x0000000003D30000-memory.dmpFilesize
1024KB
-
memory/4204-98-0x0000000003C30000-0x0000000003D30000-memory.dmpFilesize
1024KB
-
memory/4204-69-0x0000000000F70000-0x0000000001C55000-memory.dmpFilesize
12.9MB
-
memory/4204-100-0x0000000003C30000-0x0000000003D30000-memory.dmpFilesize
1024KB
-
memory/4204-99-0x0000000003C30000-0x0000000003D30000-memory.dmpFilesize
1024KB
-
memory/4204-93-0x0000000003C30000-0x0000000003D30000-memory.dmpFilesize
1024KB
-
memory/4204-101-0x0000000003C30000-0x0000000003D30000-memory.dmpFilesize
1024KB
-
memory/4204-102-0x0000000003C30000-0x0000000003D30000-memory.dmpFilesize
1024KB
-
memory/4204-103-0x0000000003C30000-0x0000000003D30000-memory.dmpFilesize
1024KB
-
memory/4204-104-0x0000000003C30000-0x0000000003D30000-memory.dmpFilesize
1024KB
-
memory/4204-106-0x0000000003C30000-0x0000000003D30000-memory.dmpFilesize
1024KB
-
memory/4204-107-0x0000000003C30000-0x0000000003D30000-memory.dmpFilesize
1024KB
-
memory/4204-108-0x0000000003C30000-0x0000000003D30000-memory.dmpFilesize
1024KB
-
memory/4204-105-0x0000000003C30000-0x0000000003D30000-memory.dmpFilesize
1024KB
-
memory/4204-67-0x0000000000F00000-0x0000000000F01000-memory.dmpFilesize
4KB
-
memory/4204-66-0x0000000000EF0000-0x0000000000EF1000-memory.dmpFilesize
4KB
-
memory/4204-65-0x0000000000770000-0x0000000000771000-memory.dmpFilesize
4KB
-
memory/4204-64-0x0000000000F70000-0x0000000001C55000-memory.dmpFilesize
12.9MB
-
memory/4204-63-0x0000000000740000-0x0000000000741000-memory.dmpFilesize
4KB
-
memory/4204-62-0x0000000000720000-0x0000000000721000-memory.dmpFilesize
4KB
-
memory/4204-57-0x0000000000F70000-0x0000000001C55000-memory.dmpFilesize
12.9MB
-
memory/4548-319-0x0000029B66F00000-0x0000029B67000000-memory.dmpFilesize
1024KB
-
memory/4548-320-0x0000029B66980000-0x0000029B669A0000-memory.dmpFilesize
128KB
-
memory/4656-5-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/4656-3-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/4656-2-0x0000000000720000-0x000000000072B000-memory.dmpFilesize
44KB
-
memory/4656-1-0x0000000000740000-0x0000000000840000-memory.dmpFilesize
1024KB
-
memory/4980-40-0x00000000748A0000-0x0000000075051000-memory.dmpFilesize
7.7MB
-
memory/4980-32-0x0000000003460000-0x0000000005460000-memory.dmpFilesize
32.0MB
-
memory/4980-26-0x0000000005910000-0x0000000005911000-memory.dmpFilesize
4KB
-
memory/4980-25-0x0000000005B70000-0x0000000005B80000-memory.dmpFilesize
64KB
-
memory/4980-24-0x00000000748A0000-0x0000000075051000-memory.dmpFilesize
7.7MB
-
memory/4980-23-0x0000000000EF0000-0x0000000000F54000-memory.dmpFilesize
400KB