Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
30-06-2024 01:56
Static task
static1
Behavioral task
behavioral1
Sample
cb22cebed97d6363239f63cf28816b8a8c06977c6d8625a43a61f0afa8823b26.exe
Resource
win7-20240508-en
General
-
Target
cb22cebed97d6363239f63cf28816b8a8c06977c6d8625a43a61f0afa8823b26.exe
-
Size
748KB
-
MD5
457143901d9ca2f0bc836c1dd1faefe3
-
SHA1
11e554dcfca0dd51c5bfe92d35b9c13b21b81691
-
SHA256
cb22cebed97d6363239f63cf28816b8a8c06977c6d8625a43a61f0afa8823b26
-
SHA512
0bd04e37e8f3bb869783661972b83ec8fb6b06727eff27374d2855e714b31cd51b15ada8e46d8b09eda9367dd002f65436785b7962f80f5812396aff3c03c0d0
-
SSDEEP
12288:Ykpcy+P2t8ysP8ZURBmtxjlk/u6ntgJ2E3P0DtaxoisMLHsXxteTX:Ykpcy5tVZqBmTji/PQP0Zaxd5LHxT
Malware Config
Extracted
xworm
head-experimental.gl.at.ply.gg:46178
best-bird.gl.at.ply.gg:27196
super-nearest.gl.at.ply.gg:17835
-
install_file
USB.exe
Extracted
quasar
3.1.5
Slave
stop-largely.gl.at.ply.gg:27116
$Sxr-kl1r656AGsPQksTmi8
-
encryption_key
ql4fQ8TV9ZFP9vRX2myA
-
install_name
$sxr~Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
$77STARTUP~MSF
-
subdirectory
$sxr~SubDir
Extracted
asyncrat
Default
finally-grande.gl.at.ply.gg:25844
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Detect Xworm Payload 6 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\Part1.exe family_xworm behavioral1/memory/2156-9-0x00000000002A0000-0x00000000002B8000-memory.dmp family_xworm C:\Users\Admin\AppData\Local\Temp\Part 1.exe family_xworm behavioral1/memory/2720-28-0x0000000000C00000-0x0000000000C18000-memory.dmp family_xworm C:\Users\Admin\AppData\Local\Temp\Part 4.exe family_xworm behavioral1/memory/2736-39-0x00000000000E0000-0x00000000000FA000-memory.dmp family_xworm -
Quasar payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\Part 2.exe family_quasar behavioral1/memory/2640-46-0x0000000000D10000-0x0000000000D7C000-memory.dmp family_quasar -
Async RAT payload 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\Part 3.exe family_asyncrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid process 1300 powershell.exe 2448 powershell.exe 1092 powershell.exe 1840 powershell.exe 288 powershell.exe 1768 powershell.exe -
Executes dropped EXE 9 IoCs
Processes:
Part1.exePart2.exePart 1.exePart 2.exePart 3.exePart 4.exeWindows PowerShell.exePart 2.exePart 2.exepid process 2156 Part1.exe 2740 Part2.exe 2720 Part 1.exe 2640 Part 2.exe 2688 Part 3.exe 2736 Part 4.exe 2540 Windows PowerShell.exe 2636 Part 2.exe 808 Part 2.exe -
Loads dropped DLL 2 IoCs
Processes:
cmd.execmd.exepid process 2724 cmd.exe 2240 cmd.exe -
Looks up external IP address via web service 8 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 2 ip-api.com 8 ip-api.com 9 ip-api.com 10 ip-api.com 18 api.ipify.org 28 ip-api.com 35 api.ipify.org 45 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 2 IoCs
-
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 1496 schtasks.exe 1276 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Windows PowerShell.exepid process 2540 Windows PowerShell.exe 2540 Windows PowerShell.exe 2540 Windows PowerShell.exe 2540 Windows PowerShell.exe 2540 Windows PowerShell.exe 2540 Windows PowerShell.exe 2540 Windows PowerShell.exe 2540 Windows PowerShell.exe 2540 Windows PowerShell.exe 2540 Windows PowerShell.exe 2540 Windows PowerShell.exe 2540 Windows PowerShell.exe 2540 Windows PowerShell.exe 2540 Windows PowerShell.exe 2540 Windows PowerShell.exe 2540 Windows PowerShell.exe 2540 Windows PowerShell.exe 2540 Windows PowerShell.exe 2540 Windows PowerShell.exe 2540 Windows PowerShell.exe 2540 Windows PowerShell.exe 2540 Windows PowerShell.exe 2540 Windows PowerShell.exe 2540 Windows PowerShell.exe 2540 Windows PowerShell.exe 2540 Windows PowerShell.exe 2540 Windows PowerShell.exe 2540 Windows PowerShell.exe 2540 Windows PowerShell.exe 2540 Windows PowerShell.exe 2540 Windows PowerShell.exe 2540 Windows PowerShell.exe 2540 Windows PowerShell.exe 2540 Windows PowerShell.exe 2540 Windows PowerShell.exe 2540 Windows PowerShell.exe 2540 Windows PowerShell.exe 2540 Windows PowerShell.exe 2540 Windows PowerShell.exe 2540 Windows PowerShell.exe 2540 Windows PowerShell.exe 2540 Windows PowerShell.exe 2540 Windows PowerShell.exe 2540 Windows PowerShell.exe 2540 Windows PowerShell.exe 2540 Windows PowerShell.exe 2540 Windows PowerShell.exe 2540 Windows PowerShell.exe 2540 Windows PowerShell.exe 2540 Windows PowerShell.exe 2540 Windows PowerShell.exe 2540 Windows PowerShell.exe 2540 Windows PowerShell.exe 2540 Windows PowerShell.exe 2540 Windows PowerShell.exe 2540 Windows PowerShell.exe 2540 Windows PowerShell.exe 2540 Windows PowerShell.exe 2540 Windows PowerShell.exe 2540 Windows PowerShell.exe 2540 Windows PowerShell.exe 2540 Windows PowerShell.exe 2540 Windows PowerShell.exe 2540 Windows PowerShell.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
Processes:
Windows PowerShell.exePart 2.exePart 3.exePart 1.exePart1.exePart 4.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exePart 2.exePart 2.exedescription pid process Token: SeDebugPrivilege 2540 Windows PowerShell.exe Token: SeDebugPrivilege 2640 Part 2.exe Token: SeDebugPrivilege 2688 Part 3.exe Token: SeDebugPrivilege 2720 Part 1.exe Token: SeDebugPrivilege 2156 Part1.exe Token: SeDebugPrivilege 2736 Part 4.exe Token: SeDebugPrivilege 1300 powershell.exe Token: SeDebugPrivilege 2448 powershell.exe Token: SeDebugPrivilege 2720 Part 1.exe Token: SeDebugPrivilege 1092 powershell.exe Token: SeDebugPrivilege 1840 powershell.exe Token: SeDebugPrivilege 288 powershell.exe Token: SeDebugPrivilege 1768 powershell.exe Token: SeDebugPrivilege 2156 Part1.exe Token: SeDebugPrivilege 2736 Part 4.exe Token: SeDebugPrivilege 2636 Part 2.exe Token: SeDebugPrivilege 808 Part 2.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
Part 1.exePart1.exePart 4.exepid process 2720 Part 1.exe 2156 Part1.exe 2736 Part 4.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
cb22cebed97d6363239f63cf28816b8a8c06977c6d8625a43a61f0afa8823b26.exePart2.exePart 1.exePart1.exePart 4.exePart 2.execmd.exedescription pid process target process PID 2392 wrote to memory of 2156 2392 cb22cebed97d6363239f63cf28816b8a8c06977c6d8625a43a61f0afa8823b26.exe Part1.exe PID 2392 wrote to memory of 2156 2392 cb22cebed97d6363239f63cf28816b8a8c06977c6d8625a43a61f0afa8823b26.exe Part1.exe PID 2392 wrote to memory of 2156 2392 cb22cebed97d6363239f63cf28816b8a8c06977c6d8625a43a61f0afa8823b26.exe Part1.exe PID 2392 wrote to memory of 2740 2392 cb22cebed97d6363239f63cf28816b8a8c06977c6d8625a43a61f0afa8823b26.exe Part2.exe PID 2392 wrote to memory of 2740 2392 cb22cebed97d6363239f63cf28816b8a8c06977c6d8625a43a61f0afa8823b26.exe Part2.exe PID 2392 wrote to memory of 2740 2392 cb22cebed97d6363239f63cf28816b8a8c06977c6d8625a43a61f0afa8823b26.exe Part2.exe PID 2740 wrote to memory of 2720 2740 Part2.exe Part 1.exe PID 2740 wrote to memory of 2720 2740 Part2.exe Part 1.exe PID 2740 wrote to memory of 2720 2740 Part2.exe Part 1.exe PID 2740 wrote to memory of 2640 2740 Part2.exe Part 2.exe PID 2740 wrote to memory of 2640 2740 Part2.exe Part 2.exe PID 2740 wrote to memory of 2640 2740 Part2.exe Part 2.exe PID 2740 wrote to memory of 2640 2740 Part2.exe Part 2.exe PID 2740 wrote to memory of 2640 2740 Part2.exe Part 2.exe PID 2740 wrote to memory of 2640 2740 Part2.exe Part 2.exe PID 2740 wrote to memory of 2640 2740 Part2.exe Part 2.exe PID 2740 wrote to memory of 2688 2740 Part2.exe Part 3.exe PID 2740 wrote to memory of 2688 2740 Part2.exe Part 3.exe PID 2740 wrote to memory of 2688 2740 Part2.exe Part 3.exe PID 2740 wrote to memory of 2736 2740 Part2.exe Part 4.exe PID 2740 wrote to memory of 2736 2740 Part2.exe Part 4.exe PID 2740 wrote to memory of 2736 2740 Part2.exe Part 4.exe PID 2740 wrote to memory of 2540 2740 Part2.exe Windows PowerShell.exe PID 2740 wrote to memory of 2540 2740 Part2.exe Windows PowerShell.exe PID 2740 wrote to memory of 2540 2740 Part2.exe Windows PowerShell.exe PID 2740 wrote to memory of 2540 2740 Part2.exe Windows PowerShell.exe PID 2720 wrote to memory of 1300 2720 Part 1.exe powershell.exe PID 2720 wrote to memory of 1300 2720 Part 1.exe powershell.exe PID 2720 wrote to memory of 1300 2720 Part 1.exe powershell.exe PID 2720 wrote to memory of 2448 2720 Part 1.exe powershell.exe PID 2720 wrote to memory of 2448 2720 Part 1.exe powershell.exe PID 2720 wrote to memory of 2448 2720 Part 1.exe powershell.exe PID 2156 wrote to memory of 1092 2156 Part1.exe powershell.exe PID 2156 wrote to memory of 1092 2156 Part1.exe powershell.exe PID 2156 wrote to memory of 1092 2156 Part1.exe powershell.exe PID 2736 wrote to memory of 1840 2736 Part 4.exe powershell.exe PID 2736 wrote to memory of 1840 2736 Part 4.exe powershell.exe PID 2736 wrote to memory of 1840 2736 Part 4.exe powershell.exe PID 2156 wrote to memory of 288 2156 Part1.exe powershell.exe PID 2156 wrote to memory of 288 2156 Part1.exe powershell.exe PID 2156 wrote to memory of 288 2156 Part1.exe powershell.exe PID 2736 wrote to memory of 1768 2736 Part 4.exe powershell.exe PID 2736 wrote to memory of 1768 2736 Part 4.exe powershell.exe PID 2736 wrote to memory of 1768 2736 Part 4.exe powershell.exe PID 2640 wrote to memory of 1496 2640 Part 2.exe schtasks.exe PID 2640 wrote to memory of 1496 2640 Part 2.exe schtasks.exe PID 2640 wrote to memory of 1496 2640 Part 2.exe schtasks.exe PID 2640 wrote to memory of 1496 2640 Part 2.exe schtasks.exe PID 2640 wrote to memory of 2724 2640 Part 2.exe cmd.exe PID 2640 wrote to memory of 2724 2640 Part 2.exe cmd.exe PID 2640 wrote to memory of 2724 2640 Part 2.exe cmd.exe PID 2640 wrote to memory of 2724 2640 Part 2.exe cmd.exe PID 2724 wrote to memory of 2680 2724 cmd.exe chcp.com PID 2724 wrote to memory of 2680 2724 cmd.exe chcp.com PID 2724 wrote to memory of 2680 2724 cmd.exe chcp.com PID 2724 wrote to memory of 2680 2724 cmd.exe chcp.com PID 2724 wrote to memory of 2784 2724 cmd.exe PING.EXE PID 2724 wrote to memory of 2784 2724 cmd.exe PING.EXE PID 2724 wrote to memory of 2784 2724 cmd.exe PING.EXE PID 2724 wrote to memory of 2784 2724 cmd.exe PING.EXE PID 2724 wrote to memory of 2636 2724 cmd.exe Part 2.exe PID 2724 wrote to memory of 2636 2724 cmd.exe Part 2.exe PID 2724 wrote to memory of 2636 2724 cmd.exe Part 2.exe PID 2724 wrote to memory of 2636 2724 cmd.exe Part 2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb22cebed97d6363239f63cf28816b8a8c06977c6d8625a43a61f0afa8823b26.exe"C:\Users\Admin\AppData\Local\Temp\cb22cebed97d6363239f63cf28816b8a8c06977c6d8625a43a61f0afa8823b26.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Part1.exe"C:\Users\Admin\AppData\Local\Temp\Part1.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Part1.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Part1.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\Part2.exe"C:\Users\Admin\AppData\Local\Temp\Part2.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Part 1.exe"C:\Users\Admin\AppData\Local\Temp\Part 1.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Part 1.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Part 1.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\Part 2.exe"C:\Users\Admin\AppData\Local\Temp\Part 2.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "$77STARTUP~MSF" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\Part 2.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\bGKSTMlSXHue.bat" "4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650015⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost5⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\Part 2.exe"C:\Users\Admin\AppData\Local\Temp\Part 2.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "$77STARTUP~MSF" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\Part 2.exe" /rl HIGHEST /f6⤵
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\SImgBZhsf8FA.bat" "6⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 650017⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost7⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\Part 2.exe"C:\Users\Admin\AppData\Local\Temp\Part 2.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\Part 3.exe"C:\Users\Admin\AppData\Local\Temp\Part 3.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\Part 4.exe"C:\Users\Admin\AppData\Local\Temp\Part 4.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Part 4.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Part 4.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\Windows PowerShell.exe"C:\Users\Admin\AppData\Local\Temp\Windows PowerShell.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Part 1.exeFilesize
67KB
MD5092a0c6fe885844fd74947e64e7fc11e
SHA1bfe46f64f36f2e927d862a1a787f146ed2c01219
SHA25691431cb73305e0f1fdc698907301b6d312a350f667c50765615672e7f10a68f2
SHA512022589bd17b46e5486971a59b2517956bb15815266e48dc73a7ae9ac9efd42a348af09df471562eb71ffc94ce1e1845d54ca2994663d1496a385bce50ae595f0
-
C:\Users\Admin\AppData\Local\Temp\Part 2.exeFilesize
409KB
MD5e10c7425705b2bd3214fa96247ee21c4
SHA17603536b97ab6337fa023bafcf80579c2b4059e6
SHA256021068ac225e479b124c33d9e7582c17fdea6e625b165b79e2c818479d8094e4
SHA51247e031992d637fef2a67e4fb08d2d82eaba03eba6b80f3e0e0997153acf0d979d0294276c4a10a97daa50130540230865c56191e6fe8df07dbea11c50fa48a2d
-
C:\Users\Admin\AppData\Local\Temp\Part 3.exeFilesize
63KB
MD527fe9341167a34f606b800303ac54b1f
SHA186373d218b48361bff1c23ddd08b6ab1803a51d0
SHA25629e13a91af9b0ac77e9b7f8b0c26e5702f46bd8aea0333ca2d191d1d09c70c5d
SHA51205b83ad544862d9c0cfc2651b2842624cff59fc4f454e0b1a2b36a705b558fad5a834f9f1af9f2626c57f1e3cd9aa400e290eaafb6efeb680422992bcbbde5b0
-
C:\Users\Admin\AppData\Local\Temp\Part 4.exeFilesize
79KB
MD51f1b23752df3d29e7604ba52aea85862
SHA1bb582c6cf022098b171c4c9c7318a51de29ebcf4
SHA2564834d31394f19d42e8d2a035b4c3c9c36441340ea19fe766396848ecfb608960
SHA512d52722ab73bb15d4a5b0033351f98f168192f382677e6d474f6cf506cf8dc2f5e421e45279b6cac0f074857f41a865d87b5d989450bfcb8eba925b7baa12fbde
-
C:\Users\Admin\AppData\Local\Temp\Part1.exeFilesize
74KB
MD5e35a7249966beef31a45272c53e06727
SHA1cc54648f9c9423f7a625e96256c608791b1ab275
SHA256ecb87965ad5fdc76a30721226b1cb8a6263bbbce476a0446ff730b6399022998
SHA5121dc30dc4a690aa87211db37b8fbc152e2e9e2b2554927296ff62bd4d2a7ab542777faaa4752399719cfe816cf3886b3bb4a90539f3f197dedd52298f2a315114
-
C:\Users\Admin\AppData\Local\Temp\Part2.exeFilesize
661KB
MD5c47c0d681b491091209c54147c33da81
SHA158cb51be41aa576ce56d4c16c9c443e70e648f62
SHA256429c5dd3f4af9dcaa0ebaefda12281af7c84b3e3aa05d1034ddf89d2bdefb720
SHA512f3a6f9af783910dd94622bb0408385228dfe322487d9d89c140e2e49b8abbc3b9c9f3cb580635166d1ddf6f5b7feeac51380044cf100476d6994adc7cac6cc5c
-
C:\Users\Admin\AppData\Local\Temp\Windows PowerShell.exeFilesize
27KB
MD54daae2de5a31125d02b057c1ff18d58f
SHA1e1d603edfcc150a4718e2916ae3dda3aa9548dc8
SHA25625510f3aa1b879ea92a3cba9583d73e447b8765bae6dfcc4954bb72df5beaa7f
SHA5127cda96a69f9cddab307f3f08e1f38a4d059f0cc7f7119d4a48891efdb01cf101ebcc06cb2ce0702ea2d689d27ee45faddc0a13cd72503c609c4e544919549a2a
-
memory/2156-9-0x00000000002A0000-0x00000000002B8000-memory.dmpFilesize
96KB
-
memory/2156-44-0x000007FEF5750000-0x000007FEF613C000-memory.dmpFilesize
9.9MB
-
memory/2392-1-0x0000000001290000-0x0000000001352000-memory.dmpFilesize
776KB
-
memory/2392-0-0x000007FEF5753000-0x000007FEF5754000-memory.dmpFilesize
4KB
-
memory/2540-47-0x00000000002D0000-0x00000000002E0000-memory.dmpFilesize
64KB
-
memory/2540-45-0x0000000000090000-0x000000000009E000-memory.dmpFilesize
56KB
-
memory/2640-46-0x0000000000D10000-0x0000000000D7C000-memory.dmpFilesize
432KB
-
memory/2688-37-0x0000000000230000-0x0000000000246000-memory.dmpFilesize
88KB
-
memory/2720-28-0x0000000000C00000-0x0000000000C18000-memory.dmpFilesize
96KB
-
memory/2736-39-0x00000000000E0000-0x00000000000FA000-memory.dmpFilesize
104KB
-
memory/2740-13-0x0000000000060000-0x000000000010C000-memory.dmpFilesize
688KB