Analysis

  • max time kernel
    827s
  • max time network
    829s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240709-en
  • resource tags

    arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    13-07-2024 22:42

Errors

Reason
Machine shutdown

General

  • Target

    WaveInstaller.exe

  • Size

    76KB

  • MD5

    1b95a7fc10c0b54c7d807d1f7ee2b778

  • SHA1

    75d3a2f1d104b8f4950f59da9e829d61943e3e44

  • SHA256

    d2373e86e03b935c7c24993f2a567a7e9f3b477c460a4c061da4000de493fbd8

  • SHA512

    b225f9052457b5de3728f1f2bf5cf17905de780823ccaa0139e0f559212a05bb177297d950783084cae87f4da217c94d8ad66124f0a3c6946bd5662a43395d4e

  • SSDEEP

    1536:kpn26tWBE8jMMx4yBmEbTb1XyM6lk120w6hO2GRKVJjiS:kpn2FMniTb1IH0w6hOFRKnr

Malware Config

Extracted

Family

xworm

C2

email-champions.gl.at.ply.gg:50458

Attributes
  • Install_directory

    %Temp%

  • install_file

    svchost.exe

  • telegram

    https://api.telegram.org/bot6814850214:AAGtrnkhUh3vMq-wH7W5cvNuSWLdcy7mtis/sendMessage?chat_id=7094837950

Extracted

Family

xworm

Version

5.0

C2

127.0.0.1:7777

Mutex

OpzaMu4iTgsJXCov

Attributes
  • install_file

    USB.exe

aes.plain
aes.plain

Extracted

Family

gurcu

C2

https://api.telegram.org/bot6814850214:AAGtrnkhUh3vMq-wH7W5cvNuSWLdcy7mtis/sendMessage?chat_id=7094837950

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Contains code to disable Windows Defender 1 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Detect Xworm Payload 7 IoCs
  • Gurcu, WhiteSnake

    Gurcu is a malware stealer written in C#.

  • UAC bypass 3 TTPs 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • AgentTesla payload 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Disables Task Manager via registry modification
  • Executes dropped EXE 19 IoCs
  • Loads dropped DLL 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • VMProtect packed file 2 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Blocklisted process makes network request 4 IoCs
  • Enumerates connected drives 3 TTPs 47 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 13 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 9 IoCs
  • Modifies data under HKEY_USERS 18 IoCs
  • Modifies registry class 64 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 53 IoCs
  • Suspicious use of SendNotifyMessage 31 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\WaveInstaller.exe
    "C:\Users\Admin\AppData\Local\Temp\WaveInstaller.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4620
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\WaveInstaller.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2036
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'WaveInstaller.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1584
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\svchost.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2896
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3576
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:1516
    • C:\Windows\SYSTEM32\CMD.EXE
      "CMD.EXE"
      2⤵
        PID:5556
        • C:\Windows\system32\systemreset.exe
          systemreset --factoryreset
          3⤵
          • Loads dropped DLL
          • Enumerates connected drives
          • Drops file in System32 directory
          • Drops file in Windows directory
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          PID:2832
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc
      1⤵
        PID:2440
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DisplayEnhancementService
        1⤵
          PID:2472
        • C:\Users\Admin\AppData\Local\Temp\svchost.exe
          C:\Users\Admin\AppData\Local\Temp\svchost.exe
          1⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:1500
        • C:\Users\Admin\AppData\Local\Temp\svchost.exe
          C:\Users\Admin\AppData\Local\Temp\svchost.exe
          1⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:2824
        • C:\Users\Admin\AppData\Local\Temp\svchost.exe
          C:\Users\Admin\AppData\Local\Temp\svchost.exe
          1⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:3576
        • C:\Users\Admin\AppData\Local\Temp\svchost.exe
          C:\Users\Admin\AppData\Local\Temp\svchost.exe
          1⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:4592
        • C:\Users\Admin\AppData\Local\Temp\svchost.exe
          C:\Users\Admin\AppData\Local\Temp\svchost.exe
          1⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:4276
        • C:\Users\Admin\AppData\Local\Temp\svchost.exe
          C:\Users\Admin\AppData\Local\Temp\svchost.exe
          1⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:240
        • C:\Program Files\VideoLAN\VLC\vlc.exe
          "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\LimitWatch.wav"
          1⤵
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of SetWindowsHookEx
          PID:2000
        • C:\Windows\System32\rundll32.exe
          C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
          1⤵
            PID:956
          • C:\Program Files\7-Zip\7zG.exe
            "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\XWorm 5.6 By Necrowolf\" -ad -an -ai#7zMap2704:102:7zEvent24881
            1⤵
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            PID:3164
          • C:\Users\Admin\AppData\Local\Temp\svchost.exe
            C:\Users\Admin\AppData\Local\Temp\svchost.exe
            1⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:1168
          • C:\Users\Admin\Desktop\XWorm 5.6 By Necrowolf\XWorm V5.6.exe
            "C:\Users\Admin\Desktop\XWorm 5.6 By Necrowolf\XWorm V5.6.exe"
            1⤵
            • Executes dropped EXE
            • Enumerates system info in registry
            PID:2328
          • C:\Windows\System32\msiexec.exe
            "C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\Desktop\playit-windows-x86_64-signed.msi"
            1⤵
            • Blocklisted process makes network request
            • Enumerates connected drives
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            PID:2020
          • C:\Users\Admin\AppData\Local\Temp\svchost.exe
            C:\Users\Admin\AppData\Local\Temp\svchost.exe
            1⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:2916
          • C:\Windows\system32\msiexec.exe
            C:\Windows\system32\msiexec.exe /V
            1⤵
            • Enumerates connected drives
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Modifies data under HKEY_USERS
            • Modifies registry class
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4180
            • C:\Windows\system32\srtasks.exe
              C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
              2⤵
                PID:2212
            • C:\Windows\system32\vssvc.exe
              C:\Windows\system32\vssvc.exe
              1⤵
              • Checks SCSI registry key(s)
              • Suspicious use of AdjustPrivilegeToken
              PID:2160
            • C:\Program Files\playit_gg\bin\playit.exe
              "C:\Program Files\playit_gg\bin\playit.exe"
              1⤵
              • Executes dropped EXE
              PID:3360
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default
              1⤵
              • Enumerates system info in registry
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of WriteProcessMemory
              PID:3336
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffb0c293cb8,0x7ffb0c293cc8,0x7ffb0c293cd8
                2⤵
                  PID:396
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1908,17090720725132234243,11690627238186448976,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1916 /prefetch:2
                  2⤵
                    PID:3068
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1908,17090720725132234243,11690627238186448976,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2308 /prefetch:3
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:3624
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1908,17090720725132234243,11690627238186448976,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2532 /prefetch:8
                    2⤵
                      PID:1936
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,17090720725132234243,11690627238186448976,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1.25 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:1
                      2⤵
                        PID:3552
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,17090720725132234243,11690627238186448976,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1.25 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:1
                        2⤵
                          PID:4944
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,17090720725132234243,11690627238186448976,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1.25 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4920 /prefetch:1
                          2⤵
                            PID:3312
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,17090720725132234243,11690627238186448976,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1.25 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4616 /prefetch:1
                            2⤵
                              PID:2492
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,17090720725132234243,11690627238186448976,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1.25 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:1
                              2⤵
                                PID:2020
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,17090720725132234243,11690627238186448976,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1.25 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:1
                                2⤵
                                  PID:4120
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,17090720725132234243,11690627238186448976,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1.25 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3536 /prefetch:1
                                  2⤵
                                    PID:4944
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1908,17090720725132234243,11690627238186448976,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4896 /prefetch:8
                                    2⤵
                                      PID:1916
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1908,17090720725132234243,11690627238186448976,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5648 /prefetch:8
                                      2⤵
                                        PID:1144
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,17090720725132234243,11690627238186448976,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1.25 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5692 /prefetch:1
                                        2⤵
                                          PID:1624
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,17090720725132234243,11690627238186448976,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1.25 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:1
                                          2⤵
                                            PID:2624
                                        • C:\Windows\System32\CompPkgSrv.exe
                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                          1⤵
                                            PID:2624
                                          • C:\Windows\System32\CompPkgSrv.exe
                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                            1⤵
                                              PID:1368
                                            • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                              C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                              1⤵
                                              • Executes dropped EXE
                                              PID:5332
                                            • C:\Users\Admin\Desktop\XWorm 5.6 By Necrowolf\XWorm V5.6.exe
                                              "C:\Users\Admin\Desktop\XWorm 5.6 By Necrowolf\XWorm V5.6.exe"
                                              1⤵
                                              • Executes dropped EXE
                                              • Enumerates system info in registry
                                              • Modifies registry class
                                              • Suspicious behavior: GetForegroundWindowSpam
                                              • Suspicious use of FindShellTrayWindow
                                              • Suspicious use of SendNotifyMessage
                                              • Suspicious use of SetWindowsHookEx
                                              PID:6068
                                              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe
                                                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\cjhh45cc\cjhh45cc.cmdline"
                                                2⤵
                                                  PID:4256
                                                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESAD2C.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc7C8C901DD1C1464CA2ED339A8AC29A8B.TMP"
                                                    3⤵
                                                      PID:4264
                                                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe
                                                    "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\sh3sqpur\sh3sqpur.cmdline"
                                                    2⤵
                                                      PID:2588
                                                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES31C.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc4BB98C20A6B84635ABBACBACB05D2E87.TMP"
                                                        3⤵
                                                          PID:3192
                                                    • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                      C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                      1⤵
                                                      • Executes dropped EXE
                                                      PID:5608
                                                    • C:\Windows\system32\wbem\WmiApSrv.exe
                                                      C:\Windows\system32\wbem\WmiApSrv.exe
                                                      1⤵
                                                        PID:5672
                                                      • C:\Windows\system32\AUDIODG.EXE
                                                        C:\Windows\system32\AUDIODG.EXE 0x00000000000004D8 0x00000000000004DC
                                                        1⤵
                                                          PID:1704
                                                        • C:\Users\Admin\Desktop\XClient.exe
                                                          "C:\Users\Admin\Desktop\XClient.exe"
                                                          1⤵
                                                          • UAC bypass
                                                          • Executes dropped EXE
                                                          • Suspicious use of SetWindowsHookEx
                                                          • System policy modification
                                                          PID:4472
                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\Desktop\XClient.exe'
                                                            2⤵
                                                            • Command and Scripting Interpreter: PowerShell
                                                            PID:1008
                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'
                                                            2⤵
                                                            • Command and Scripting Interpreter: PowerShell
                                                            PID:2120
                                                        • C:\Users\Admin\Desktop\XClient.exe
                                                          "C:\Users\Admin\Desktop\XClient.exe"
                                                          1⤵
                                                          • Executes dropped EXE
                                                          PID:4016
                                                        • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                          C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                          1⤵
                                                          • Executes dropped EXE
                                                          PID:3624
                                                        • C:\Windows\system32\taskmgr.exe
                                                          "C:\Windows\system32\taskmgr.exe" /0
                                                          1⤵
                                                            PID:5608
                                                          • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                            C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                            1⤵
                                                            • Executes dropped EXE
                                                            PID:6136
                                                          • C:\Windows\system32\wbem\WmiApSrv.exe
                                                            C:\Windows\system32\wbem\WmiApSrv.exe
                                                            1⤵
                                                              PID:5004
                                                            • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                              C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                              1⤵
                                                              • Executes dropped EXE
                                                              PID:276
                                                            • C:\Windows\System32\vdsldr.exe
                                                              C:\Windows\System32\vdsldr.exe -Embedding
                                                              1⤵
                                                                PID:3380
                                                              • C:\Windows\System32\vds.exe
                                                                C:\Windows\System32\vds.exe
                                                                1⤵
                                                                • Checks SCSI registry key(s)
                                                                PID:5672
                                                              • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                                C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                                1⤵
                                                                • Executes dropped EXE
                                                                PID:5880
                                                              • C:\Windows\System32\vdsldr.exe
                                                                C:\Windows\System32\vdsldr.exe -Embedding
                                                                1⤵
                                                                  PID:1548
                                                                • C:\Windows\system32\vssvc.exe
                                                                  C:\Windows\system32\vssvc.exe
                                                                  1⤵
                                                                    PID:3724
                                                                  • C:\Windows\system32\LogonUI.exe
                                                                    "LogonUI.exe" /flags:0x4 /state0:0xa3985055 /state1:0x41c64e6d
                                                                    1⤵
                                                                    • Modifies data under HKEY_USERS
                                                                    • Suspicious use of SetWindowsHookEx
                                                                    PID:5860

                                                                  Network

                                                                  MITRE ATT&CK Enterprise v15

                                                                  Replay Monitor

                                                                  Loading Replay Monitor...

                                                                  Downloads

                                                                  • C:\$SysReset\Logs\ResetConfig.ini

                                                                    Filesize

                                                                    186B

                                                                    MD5

                                                                    47069918e9e83eb02bff5ce5498c9bbd

                                                                    SHA1

                                                                    17ffee2e0ddfec27bba8c1a3550d57c7f92960d5

                                                                    SHA256

                                                                    e7688a4bb28fbb7b562886e29da34887d6189a52041de39b538d5c2caf3c932e

                                                                    SHA512

                                                                    7a0d2ed36988aa921e0e09779bb8defe38133c8f6add2159cceeee59f5083d391fea2f7bee961b5bba4767e75eea8a2670e7900290c17ce7cc80fae7e037a4c1

                                                                  • C:\$SysReset\Logs\setupact.log

                                                                    Filesize

                                                                    118KB

                                                                    MD5

                                                                    4aacdcd43917f723e8743b1cfba57f91

                                                                    SHA1

                                                                    e5c9a8af743ae3478a5ae15f5ca227a91ac53881

                                                                    SHA256

                                                                    c9fb735672e6fc21ab2d52e97a4e8fc245b7c6eac9fb1a4f291d94218410daff

                                                                    SHA512

                                                                    ad2653dd2fd05758c52811a988797a1a77ddf09c1106450de8bc5e71eb37c89222dca5f92d06977ad9f87924b46680a93f0ae0a148a5708cca664d12156d82a9

                                                                  • C:\$SysReset\Logs\setuperr.log

                                                                    Filesize

                                                                    980B

                                                                    MD5

                                                                    cb0978861f75d11254f555ced43f06ca

                                                                    SHA1

                                                                    984a7a6d04c723c43ebc72c31daa0f645e0e40f4

                                                                    SHA256

                                                                    fc289be3de8ebc52c1d1f06d3f728c78d4e14f1138f83e10991849fe84739ac8

                                                                    SHA512

                                                                    ee468f2510a95416f18589ba6c8322282d6b2a962a17c78d0ce56e0efa8672e9e68f234dca7905d3ee8b565f0cf1c5cf0eb8344521a00c27fc42978e9b05400b

                                                                  • C:\Config.Msi\e5ec216.rbs

                                                                    Filesize

                                                                    9KB

                                                                    MD5

                                                                    48b6e9b5d6f6394f8d7a5c59fe0c8c9c

                                                                    SHA1

                                                                    d9935a2952d54d3d8689df968b671101a321de98

                                                                    SHA256

                                                                    65398ec896cb1c3043ff329f49549771b219d1f379ef7bcff67afac41a4ff3b0

                                                                    SHA512

                                                                    350df99052b8f9cfd6a6c259aa80a1dd48aed6b9247f206fdd800dd2d9b08e19f4cac04f0cd0912010f1f9937fc2360f311a4bca27182e2e254f021d27e16920

                                                                  • C:\Program Files\playit_gg\bin\playit.exe

                                                                    Filesize

                                                                    4.4MB

                                                                    MD5

                                                                    b52b1b1b92b4c4e96a9352becdc372b5

                                                                    SHA1

                                                                    0ae0aa823e4daa2f644c574f64281fd4f3a36d31

                                                                    SHA256

                                                                    7dcc38a9820ccb0de9c5652fda9976d9f649f4239ac5e746a419f3076b324dd7

                                                                    SHA512

                                                                    9e0ef219b2a8afffbaf21100c00a491a218e5a38690b7c033ce6c049544a85f12414b0f3be4099ed55cc69b05c4f0f6fac28392e91a70e4b4ccd255a4101b4fe

                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C42BC945025A34066DAB76EF3F80A05

                                                                    Filesize

                                                                    60KB

                                                                    MD5

                                                                    c712fb83c8fe9b8322282ed9f559ee9d

                                                                    SHA1

                                                                    63977902ca41d79951708d020c87bea8e883764a

                                                                    SHA256

                                                                    1bbe51c724b41db39f670320aa3782b757bab73a213a25064c26e0f75f522da7

                                                                    SHA512

                                                                    24988c164a4af2cd9a682366a39a61bdb522e8bc8712a277e9cac8e14304754a85edac1134eb350993446ba77943c4b3347fbd4c4a2fae9fa6d4f8ac13b4150f

                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\FE17BEC2A573BC9AE36869D0274FFA19_6DA81F04C5F9EAD2CD0268808FCE61E1

                                                                    Filesize

                                                                    727B

                                                                    MD5

                                                                    7a3b8457313a521e0d44f91765a4e041

                                                                    SHA1

                                                                    4ea8ecb5e7b4c11f4c491caf6cee7ced5ec4c267

                                                                    SHA256

                                                                    2b08ecf53bb8b6c430659926148f896102dc80b5f38b0ec5efe122199659651c

                                                                    SHA512

                                                                    7349fd1b8c490d540a8bb25f40587f9874ff5d9b1f9bdb2ea69db9218ebdbdccea5e4d6645fbd1098d051b008b1ebfd12a619c3a4d6fb54940705ab14933e159

                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C42BC945025A34066DAB76EF3F80A05

                                                                    Filesize

                                                                    314B

                                                                    MD5

                                                                    cc0ca9ee2b710959f0b72f2351eb9a15

                                                                    SHA1

                                                                    146ba05f449133fab1a5a6a8c521690d779d4d24

                                                                    SHA256

                                                                    29774ccc860f0a940d0379dc78acaeffe754f3ab03d4d03fe78da926e23fa075

                                                                    SHA512

                                                                    7fe8b5940cd73c1d3f37a45298bb9a1352e01c917237e60773dfee0387817df961e5e3cb0c750b947ff6afb75d502ca6f2059f79eda5ada33f484e497acc618f

                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FE17BEC2A573BC9AE36869D0274FFA19_6DA81F04C5F9EAD2CD0268808FCE61E1

                                                                    Filesize

                                                                    478B

                                                                    MD5

                                                                    a2e2d9fe85bb44683d948344bf5e783a

                                                                    SHA1

                                                                    145bce53523b4977fbd50b475ffed918343d1fd3

                                                                    SHA256

                                                                    18152df2185b0b687be8541e2cbec8b65b90ae1f5bf18bcaaa3c8b75a053c6b4

                                                                    SHA512

                                                                    dab6e6474e57aaa800db65e967f375df39679ffe1bd947ed589663d835a4b95227efbeb11f56b8da8a936bcf3754f7d7ba002f3b2d21b410aed37a8ce340aedc

                                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\XWorm V5.6.exe.log

                                                                    Filesize

                                                                    1KB

                                                                    MD5

                                                                    234b15e07d25b132557c3680f3941160

                                                                    SHA1

                                                                    7b7fb4f9930d496602dd5f8848451ee38a53f93d

                                                                    SHA256

                                                                    0c72a8cd327215c6539efab3a1bcc2089f94716ccc8f87ffd13d5edec7a01e8e

                                                                    SHA512

                                                                    7599af4d36a6c1a295093660d99351f06212dbe17949bb1ddac91b7f34c7568e2a489c3c6620213d0465608001ab08d69c6b32fadf431cc9aee6bf64f53c8b7f

                                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                    Filesize

                                                                    2KB

                                                                    MD5

                                                                    627073ee3ca9676911bee35548eff2b8

                                                                    SHA1

                                                                    4c4b68c65e2cab9864b51167d710aa29ebdcff2e

                                                                    SHA256

                                                                    85b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c

                                                                    SHA512

                                                                    3c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb

                                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\svchost.exe.log

                                                                    Filesize

                                                                    654B

                                                                    MD5

                                                                    2cbbb74b7da1f720b48ed31085cbd5b8

                                                                    SHA1

                                                                    79caa9a3ea8abe1b9c4326c3633da64a5f724964

                                                                    SHA256

                                                                    e31b18f21621d9983bfdf1ea3e53884a9d58b8ffd79e0e5790da6f3a81a8b9d3

                                                                    SHA512

                                                                    ecf02d5240e0c1c005d3ab393aa7eff62bd498c2db5905157e2bf6d29e1b663228a9583950842629d1a4caef404c8941a0c7799b1a3bd1eb890a09fdb7efcff9

                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                    Filesize

                                                                    152B

                                                                    MD5

                                                                    562b59fd3a3527ef4e850775b15d0836

                                                                    SHA1

                                                                    ffd14d901f78138fc2eece97c5e258b251bc6752

                                                                    SHA256

                                                                    0a64863cb40f9d3b13a7b768b62e8b4707dfee1d3e86a07e999acb87bd7d3430

                                                                    SHA512

                                                                    ef9fd3d83ab85b18cf0e0d17e2c7d71936f783e3ae38005e5c78742560332f88be7c4c936d4dc4179e93fde0240d2882d71ef7038289c8cbddbfc4790c0603c2

                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                    Filesize

                                                                    152B

                                                                    MD5

                                                                    c1ff2a88b65e524450bf7c721960d7db

                                                                    SHA1

                                                                    382c798fcd7782c424d93262d79e625fcb5f84aa

                                                                    SHA256

                                                                    2d12365f3666f6e398456f0c441317bc8ad3e7b089feacc14756e2ae87379409

                                                                    SHA512

                                                                    f19c08edf1416435a7628064d85f89c643c248d0979ece629b882f600956f0d8cd93efbe253fa3ec61ad205233a8804807600f845e53e5ed8949290b80fe42d3

                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                    Filesize

                                                                    840B

                                                                    MD5

                                                                    4f28a56c92fcc4e61a75688d3802d07b

                                                                    SHA1

                                                                    5fc596ebeb15f339d4be54c428852bcf4f71c660

                                                                    SHA256

                                                                    b325be40812e5236dbabf17a3501b24bac07e6039bedf2dbb6680b27a3e9fa87

                                                                    SHA512

                                                                    e7ec38cb09ace5b77b53870f9a7c41c0768d8cd5e8292638e21f3c01523e553eaaca53e85f8ce1e4c9440c82fb2e722a771f3b46910316a3ef401280e387e8ff

                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                    Filesize

                                                                    1KB

                                                                    MD5

                                                                    f717c4811752465481e0330676bac11f

                                                                    SHA1

                                                                    a9392cb3b2c2da4b136e3aa41cf00f7240ef4058

                                                                    SHA256

                                                                    9b3802353a8d9dfd90639dfaa38ca5238f51ce34e38444b8af18cedac8d7cc00

                                                                    SHA512

                                                                    62c928e7bae9db601c13a9f248f0983f5838448fc190eb1390d02f621f65d804242eb95794aa596d0b945582f01a15858ea2ebf5bc61e9ac1fe415afff1e64f3

                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                    Filesize

                                                                    1KB

                                                                    MD5

                                                                    2afc2351083bcc4000421af20f2b7851

                                                                    SHA1

                                                                    d2f1959e91918498da9df0beaa02abe766ed6e6a

                                                                    SHA256

                                                                    52d1902cb7073c2855b69198d3c7fdd578ef7ebcde81f3e9b9779b83477edf6f

                                                                    SHA512

                                                                    420f50529c4dfb7e71eb123a8a9613648f054721c36a0a1af4beae0dd2658a274b6b4231b034527fd862d3511a1ccd685325f074492f0eed923cc4e03123ffb9

                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                    Filesize

                                                                    5KB

                                                                    MD5

                                                                    8e154b3735d50a90b8a01ad703249b2d

                                                                    SHA1

                                                                    b85b2c843e6e82e010ac7dcdb49239d1b8bf57f4

                                                                    SHA256

                                                                    8f7ea424974420a63828652c4e1aed96ee3121a0fc00498e860d10b624155492

                                                                    SHA512

                                                                    de033bf2818c82cf18612b724637c3b6b084e5c9d984cde74c9ff8ffdf30bad50a2bd19a8aea41ad5d2ec7a2e925a3cd9bd89e8b7d615c92bf00e65459b8731f

                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                    Filesize

                                                                    6KB

                                                                    MD5

                                                                    54f2e4e7c0540bc060ee8614ffc4ff95

                                                                    SHA1

                                                                    53882ba1de8325ce6bd6c20eb528061db2fdc13a

                                                                    SHA256

                                                                    e75be4332088eff73e59bf7e102aeabdc6a81bbe9de32bbe9df2a3f28f225554

                                                                    SHA512

                                                                    d96fe5888f7944f7f28f270cc6497434cad088ebec8684533c5aa27ace2c3a87c9bfa11dfbeb7922a3efd72b82534e517dedf1417178d5e0236a21027a962973

                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                    Filesize

                                                                    6KB

                                                                    MD5

                                                                    f85d29bf75e34b012a7d46f8e15d6a93

                                                                    SHA1

                                                                    17a08e5dd6876639f3d87db963fd49a46837746a

                                                                    SHA256

                                                                    1609a16e91070babfff42dd3975c66167d3b0fb5d133a2bd09d54a4c116bb93d

                                                                    SHA512

                                                                    66cf68b9011122ffea681f9284c3cb999321b4fe88fd00c3209526624c74c8deeeaee912ad17ba9888dfbec80211907f2aa0507301fac6052c19fe45de767bd1

                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                    Filesize

                                                                    6KB

                                                                    MD5

                                                                    f2e9275fda7e9dc170956e29cfb47def

                                                                    SHA1

                                                                    4eb3d8e57a7aa1dcb80b32c4cd633bb336a97d7e

                                                                    SHA256

                                                                    6173d1a2d6fc110b646353f98a563f75c7fa2327588bd691ac6e99d550bd6b92

                                                                    SHA512

                                                                    364d86bb817e9c5ad1916114d7df73344f7c0a09d864fa6cb6ec7eea40b279186534ee753ab5bd4fe7ee608d842f821f3d51de9d58e551e27637c7e9f995fb4b

                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                    Filesize

                                                                    699B

                                                                    MD5

                                                                    ae619f4e463e6a571f23fbb400acbb05

                                                                    SHA1

                                                                    5e97676a676c4f2869964f1d909fbe51ed4d813d

                                                                    SHA256

                                                                    8ab09f5799e3f079494db71ed154a60c8b77255a7d2eacbdb45661987d9d771e

                                                                    SHA512

                                                                    feaf3e7fb7f7fc202503359033010af0e0b48f006e3751b7483971387c184b75cca47e25021a39e160df42122771225238ff9731407ce1264385f8078d072bf4

                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe5fb7ef.TMP

                                                                    Filesize

                                                                    532B

                                                                    MD5

                                                                    3492bae84b9b316904407ee99010ca30

                                                                    SHA1

                                                                    4ddb9a72513d8ade85b473a2f2e43409b0640e69

                                                                    SHA256

                                                                    7c2673adc4fca84f832622ff990e63c262b22f9e49d7e99a8f8bb581fd843626

                                                                    SHA512

                                                                    f392b117d2072ecebd99720e0dcdade6e235472392e46407517d521922ac8cffc876f5df7a2fec32ce4d588bd11f32dd046541333eff335c36a56840b0f92656

                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                    Filesize

                                                                    16B

                                                                    MD5

                                                                    46295cac801e5d4857d09837238a6394

                                                                    SHA1

                                                                    44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                    SHA256

                                                                    0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                    SHA512

                                                                    8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                    Filesize

                                                                    16B

                                                                    MD5

                                                                    206702161f94c5cd39fadd03f4014d98

                                                                    SHA1

                                                                    bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                                                    SHA256

                                                                    1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                                                    SHA512

                                                                    0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                    Filesize

                                                                    11KB

                                                                    MD5

                                                                    29bdcf2584f3afdc2e494745fa591ce8

                                                                    SHA1

                                                                    f6da62bf498ce992e3746884cbd45dc21d6cbed2

                                                                    SHA256

                                                                    fc9bdd2b5884a9253f33e620223cedd4a5ee543e85ec13c1b72c909e24eabd6e

                                                                    SHA512

                                                                    b8e2bf368a0916766daa04d2078b8ab1af30da7523b329bd6786c42e14ee65931c83f8a31683501ef63a9458c81b3dd1070a23d7d39564f16eaf50f9710f7bcc

                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                    Filesize

                                                                    12KB

                                                                    MD5

                                                                    5da37b19d5f7850fd8f555dc526126ab

                                                                    SHA1

                                                                    5322eeac7d3bc881b3b649a01fd7123276a20378

                                                                    SHA256

                                                                    d07dc3d181781dcc46d720161450623790464f8d0aad425b31696a1448271c3b

                                                                    SHA512

                                                                    c98a270a197b3eeba3c0c09d6859b6ba23137cc6f77d74c495e2bf5829c1811969132a677da642de47db38c8637dd120b985d83437cb85c3eeab09db7c8347b6

                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                    Filesize

                                                                    944B

                                                                    MD5

                                                                    e3840d9bcedfe7017e49ee5d05bd1c46

                                                                    SHA1

                                                                    272620fb2605bd196df471d62db4b2d280a363c6

                                                                    SHA256

                                                                    3ac83e70415b9701ee71a4560232d7998e00c3db020fde669eb01b8821d2746f

                                                                    SHA512

                                                                    76adc88ab3930acc6b8b7668e2de797b8c00edcfc41660ee4485259c72a8adf162db62c2621ead5a9950f12bfe8a76ccab79d02fda11860afb0e217812cac376

                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                    Filesize

                                                                    944B

                                                                    MD5

                                                                    80b42fe4c6cf64624e6c31e5d7f2d3b3

                                                                    SHA1

                                                                    1f93e7dd83b86cb900810b7e3e43797868bf7d93

                                                                    SHA256

                                                                    ee20a5b38a6674366efda276dbbf0b43eb54efd282acfc1033042f6b53a80d4d

                                                                    SHA512

                                                                    83c1c744c15a8b427a1d3af677ec3bfd0353875a60fe886c41570981e17467ebbb59619b960ca8c5c3ab1430946b0633ea200b7e7d84ab6dca88b60c50055573

                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                    Filesize

                                                                    944B

                                                                    MD5

                                                                    4093e5ab3812960039eba1a814c2ffb0

                                                                    SHA1

                                                                    b5e4a98a80be72fccd3cc910e93113d2febef298

                                                                    SHA256

                                                                    c0794e2b7036ce5612446a8b15e0c8387773bbc921f63cf8849f8a1f4ef3878c

                                                                    SHA512

                                                                    f3555b45aa1a1dd5214716dc81a05905c4ecd5a3e1276d35e08c65623ab1d14d469b3b576a5d9638264c1222d73889d2cc1ee43fb579d9ca3fcddd9f557cac7b

                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                    Filesize

                                                                    944B

                                                                    MD5

                                                                    e07eea85a8893f23fb814cf4b3ed974c

                                                                    SHA1

                                                                    8a8125b2890bbddbfc3531d0ee4393dbbf5936fe

                                                                    SHA256

                                                                    83387ce468d717a7b4ba238af2273da873b731a13cc35604f775a31fa0ac70ea

                                                                    SHA512

                                                                    9d4808d8a261005391388b85da79e4c5396bdded6e7e5ce3a3a23e7359d1aa1fb983b4324f97e0afec6e8ed9d898322ca258dd7cda654456dd7e84c9cbd509df

                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                    Filesize

                                                                    944B

                                                                    MD5

                                                                    e47c3fa11e796c492a8388c946bf1636

                                                                    SHA1

                                                                    4a090378f0db26c6f019c9203f5b27f12fa865c7

                                                                    SHA256

                                                                    4bb861850395dcc3bec4691e8b9f0fa733b8a2d568d460a9201d65250b12fee1

                                                                    SHA512

                                                                    8d4af4eba3019cd060561f42cff11374eafe59da5e5ad677e41d0b9198b87d6d13706e760d13c70574ed1384993a1597f886d21fe6ecd0186379a1e93db30695

                                                                  • C:\Users\Admin\AppData\Local\Temp\RES31C.tmp

                                                                    Filesize

                                                                    1KB

                                                                    MD5

                                                                    70a7f8249074217d626c2d0a1504da53

                                                                    SHA1

                                                                    e7812d0176615f1a128680b94563da78db1d68a6

                                                                    SHA256

                                                                    0cb34a21527deb7d5f7b24437c063f378de1bbe15b8545e29ff22263abd20d8a

                                                                    SHA512

                                                                    4b2a80d2cbfa559a9e50d4d7dd7b60ba7d2822230c8d6cc8ce3b883413ee43bd349ac5f6c5ab8d6db2d0c638566c2aa69521c67ff5a2ac511971cfd487edeae4

                                                                  • C:\Users\Admin\AppData\Local\Temp\RESAD2C.tmp

                                                                    Filesize

                                                                    1KB

                                                                    MD5

                                                                    80f826fd7e4c424cf92b5e2764fd03dd

                                                                    SHA1

                                                                    c8cdb3b1cfc7d8cf9603664139b8b4083bde6db1

                                                                    SHA256

                                                                    491faa3454fa62f169f4f9de6826d9c7dd72540aa2dd25eb9caee1faedb7eac0

                                                                    SHA512

                                                                    37536aeae65fcfc82d48ecfc6eac9fa8fdac6b963d5308f0855b0bc422a1fd5c344a5614509bd340bddbc1772e096d138b84a4c5c7bd2176ab2532ab4f59b107

                                                                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ehgf14yn.pb3.ps1

                                                                    Filesize

                                                                    60B

                                                                    MD5

                                                                    d17fe0a3f47be24a6453e9ef58c94641

                                                                    SHA1

                                                                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                    SHA256

                                                                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                    SHA512

                                                                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                  • C:\Users\Admin\AppData\Local\Temp\cjhh45cc\cjhh45cc.0.vb

                                                                    Filesize

                                                                    78KB

                                                                    MD5

                                                                    488237f2f4cd7374bc292497dc4e147a

                                                                    SHA1

                                                                    4f579738a43aac8e433b924e38d65e66e82e25d4

                                                                    SHA256

                                                                    77499407f86ed90057668b56474d4196ade85ba3f537decfeb0f804e4f927c3d

                                                                    SHA512

                                                                    7dd1afa91c80ed70f04ef71590e81efd9689b996701f779a1976f0e1f2e74f3e07465f28fd952d4ec8db43d9a61c64b877ea98e2cf5b12bfea4a6e4c35d5e99d

                                                                  • C:\Users\Admin\AppData\Local\Temp\cjhh45cc\cjhh45cc.cmdline

                                                                    Filesize

                                                                    313B

                                                                    MD5

                                                                    f3f06ceeeae5afe32c8078a24f3d110d

                                                                    SHA1

                                                                    009e5231626abf85d5cc4581e3ad5a38b0c8273a

                                                                    SHA256

                                                                    a77368cb807ac7b27b9b34e046c6c1741c5ebec9422977d204600750c5c3b373

                                                                    SHA512

                                                                    34af3d9894c2b1cf584ad9c7e9a3b063a94e593e52baf711d146edb31612c3d1ade09796ea50d544882148fabec9c6d8609e3fd938eecca957fb65a7b3c1c440

                                                                  • C:\Users\Admin\AppData\Local\Temp\sh3sqpur\sh3sqpur.0.vb

                                                                    Filesize

                                                                    78KB

                                                                    MD5

                                                                    c0132b5801af3c0ea6b6cdf07dc9268c

                                                                    SHA1

                                                                    6704143a4b5858cadb130d42d3b23f56e342d6ec

                                                                    SHA256

                                                                    af00b6f8d2d5506d2ec6cefdc4430edc1697762729277efdc2603c75785b6e9f

                                                                    SHA512

                                                                    a460ca14d7e24585d2f2ee0d8364b0e9b48c51e5c29ccfaa52b54ceb546d01fd93af256d5b4b2f1d1e499bd7f6773a84181bc158199bbaa8020239737ed2f6df

                                                                  • C:\Users\Admin\AppData\Local\Temp\sh3sqpur\sh3sqpur.cmdline

                                                                    Filesize

                                                                    290B

                                                                    MD5

                                                                    443d6f67dfeb5edfab2503cfc09ac3af

                                                                    SHA1

                                                                    bdf328f35e556c19d267eca8ddcffca8f1d3fda4

                                                                    SHA256

                                                                    6e67c0c51c6398924ae3204463ce956675a6a31d76a3ebbaf783867b73077f37

                                                                    SHA512

                                                                    70a5bc38f266c91073276ddddc91e68d7910fe4ea3238c919ecf45a268332e3967ecd76832572b2100c6166b61e1ec87abd127933be812b6c05ceab8382200bd

                                                                  • C:\Users\Admin\AppData\Local\Temp\svchost.exe

                                                                    Filesize

                                                                    76KB

                                                                    MD5

                                                                    1b95a7fc10c0b54c7d807d1f7ee2b778

                                                                    SHA1

                                                                    75d3a2f1d104b8f4950f59da9e829d61943e3e44

                                                                    SHA256

                                                                    d2373e86e03b935c7c24993f2a567a7e9f3b477c460a4c061da4000de493fbd8

                                                                    SHA512

                                                                    b225f9052457b5de3728f1f2bf5cf17905de780823ccaa0139e0f559212a05bb177297d950783084cae87f4da217c94d8ad66124f0a3c6946bd5662a43395d4e

                                                                  • C:\Users\Admin\AppData\Local\Temp\vbc7C8C901DD1C1464CA2ED339A8AC29A8B.TMP

                                                                    Filesize

                                                                    1KB

                                                                    MD5

                                                                    d40c58bd46211e4ffcbfbdfac7c2bb69

                                                                    SHA1

                                                                    c5cf88224acc284a4e81bd612369f0e39f3ac604

                                                                    SHA256

                                                                    01902f1903d080c6632ae2209136e8e713e9fd408db4621ae21246b65bfea2ca

                                                                    SHA512

                                                                    48b14748e86b7d92a3ea18f29caf1d7b4b2e1de75377012378d146575048a2531d2e5aaeae1abf2d322d06146177cdbf0c2940ac023efae007b9f235f18e2c68

                                                                  • C:\Users\Admin\Desktop\XClient.exe

                                                                    Filesize

                                                                    37KB

                                                                    MD5

                                                                    000547a0cf648bad479024e9e8825991

                                                                    SHA1

                                                                    adae3a925165847f2e4ae3fa94aafb2d97fbf6dd

                                                                    SHA256

                                                                    d8be10c95f9cd5182767de9b8e1b7ac7bc58f0eb3b5fb59588e8bcc4890632bf

                                                                    SHA512

                                                                    5d09c193d86c26f732c64b2c75823828296433ade3aa5d251397e3e5c97325d2fb0c04b2432113966619a3ae8a408e6bfb66a0e3c2e58cb6bb9ab77fd833a4b8

                                                                  • C:\Users\Admin\Desktop\XWorm 5.6 By Necrowolf.zip

                                                                    Filesize

                                                                    29.0MB

                                                                    MD5

                                                                    c0241c872960312fd3071cff209fbc5e

                                                                    SHA1

                                                                    131e432ea6128bbfb6bc1092012d4afd8e2aae27

                                                                    SHA256

                                                                    20027c560483941c10d60098ea22ee973b647ad934377be62c88ee4acb2fc465

                                                                    SHA512

                                                                    085c3324c4994eab79205f3522b31634b1963a7bb02a52a9820bd1e80a2ee150d24c370fa619f8f421b1fdb8b185bcffb21c42ea6f7f1352f2202b6f224afac6

                                                                  • C:\Users\Admin\Desktop\XWorm 5.6 By Necrowolf\GeoIP.dat

                                                                    Filesize

                                                                    1.2MB

                                                                    MD5

                                                                    8ef41798df108ce9bd41382c9721b1c9

                                                                    SHA1

                                                                    1e6227635a12039f4d380531b032bf773f0e6de0

                                                                    SHA256

                                                                    bc07ff22d4ee0b6fafcc12482ecf2981c172a672194c647cedf9b4d215ad9740

                                                                    SHA512

                                                                    4c62af04d4a141b94eb3e1b0dbf3669cb53fe9b942072ed7bea6a848d87d8994cff5a5f639ab70f424eb79a4b7adabdde4da6d2f02f995bd8d55db23ce99f01b

                                                                  • C:\Users\Admin\Desktop\XWorm 5.6 By Necrowolf\Guna.UI2.dll

                                                                    Filesize

                                                                    1.9MB

                                                                    MD5

                                                                    bcc0fe2b28edd2da651388f84599059b

                                                                    SHA1

                                                                    44d7756708aafa08730ca9dbdc01091790940a4f

                                                                    SHA256

                                                                    c6264665a882e73eb2262a74fea2c29b1921a9af33180126325fb67a851310ef

                                                                    SHA512

                                                                    3bfc3d27c095dde988f779021d0479c8c1de80a404454813c6cae663e3fe63dc636bffa7de1094e18594c9d608fa7420a0651509544722f2a00288f0b7719cc8

                                                                  • C:\Users\Admin\Desktop\XWorm 5.6 By Necrowolf\Icons\icon (15).ico

                                                                    Filesize

                                                                    361KB

                                                                    MD5

                                                                    e3143e8c70427a56dac73a808cba0c79

                                                                    SHA1

                                                                    63556c7ad9e778d5bd9092f834b5cc751e419d16

                                                                    SHA256

                                                                    b2f57a23ecc789c1bbf6037ac0825bf98babc7bf0c5d438af5e2767a27a79188

                                                                    SHA512

                                                                    74e0f4b55625df86a87b9315e4007be8e05bbecca4346a6ea06ef5b1528acb5a8bb636ef3e599a3820dbddcf69563a0a22e2c1062c965544fd75ec96fd9803fc

                                                                  • C:\Users\Admin\Desktop\XWorm 5.6 By Necrowolf\SimpleObfuscator.dll

                                                                    Filesize

                                                                    1.4MB

                                                                    MD5

                                                                    9043d712208178c33ba8e942834ce457

                                                                    SHA1

                                                                    e0fa5c730bf127a33348f5d2a5673260ae3719d1

                                                                    SHA256

                                                                    b7a6eea19188b987dad97b32d774107e9a1beb4f461a654a00197d73f7fad54c

                                                                    SHA512

                                                                    dd6fa02ab70c58cde75fd4d4714e0ed0df5d3b18f737c68c93dba40c30376cc93957f8eef69fea86041489546ce4239b35a3b5d639472fd54b80f2f7260c8f65

                                                                  • C:\Users\Admin\Desktop\XWorm 5.6 By Necrowolf\Sounds\Intro.wav

                                                                    Filesize

                                                                    238KB

                                                                    MD5

                                                                    ad3b4fae17bcabc254df49f5e76b87a6

                                                                    SHA1

                                                                    1683ff029eebaffdc7a4827827da7bb361c8747e

                                                                    SHA256

                                                                    e3e5029bf5f29fa32d2f6cdda35697cd8e6035d5c78615f64d0b305d1bd926cf

                                                                    SHA512

                                                                    3d6ecc9040b5079402229c214cb5f9354315131a630c43d1da95248edc1b97627fb9ba032d006380a67409619763fb91976295f8d22ca91894c88f38bb610cd3

                                                                  • C:\Users\Admin\Desktop\XWorm 5.6 By Necrowolf\XClient.exe

                                                                    Filesize

                                                                    39KB

                                                                    MD5

                                                                    2bb594cc8e2a2b6e616bf90c1f546374

                                                                    SHA1

                                                                    91626c0a705d7ad6e159beefff9348fc523086fc

                                                                    SHA256

                                                                    5af02305c972451bee59cf3e524b04d400ca173f443b0cbb79d20e272a986ebe

                                                                    SHA512

                                                                    33b7a84a38b5da388ba2edc34d289cc16bd169df9dda7a3110ab85ffaeb09c70a9d5ed9e0a338f04badf0721bf74d4af915be4692db7b6ac84b10ab1be02f04a

                                                                  • C:\Users\Admin\Desktop\XWorm 5.6 By Necrowolf\XWorm V5.6.exe

                                                                    Filesize

                                                                    17.9MB

                                                                    MD5

                                                                    49f6c848fc3b1f32ed96b08bca221e53

                                                                    SHA1

                                                                    0c1da68ae22f31f61ded840a42515793e1432a24

                                                                    SHA256

                                                                    7926286cb142cc3d2511cde859dc78ea4d9a26b5007c80bc33879fc3e5800c0c

                                                                    SHA512

                                                                    1cb5fea83ccecf175ec1ed6e381bf09f915115458869f05ebdbfbd2a92b6ec41f0a5d004e0bf74a80ccc68491554bb7df95d10242f22ce1429a2bcff124b5ba1

                                                                  • C:\Users\Admin\Desktop\playit-windows-x86_64-signed.msi

                                                                    Filesize

                                                                    2.3MB

                                                                    MD5

                                                                    93b91c8721ca2951ecceb0fc0e739cc8

                                                                    SHA1

                                                                    f5ac76bae778acde000f72d5630d1a8983948705

                                                                    SHA256

                                                                    727679568706156f635be9b786c61b8fecaf55894b902a014aa6a2a691fc3108

                                                                    SHA512

                                                                    3887537ef47bf8adf0d5b137a7bfe52610eb1e6f3c37d6d3e778290cd88fe4f6643e50387b2a154cd370b71def316340c62046263054ade27ff5a3df1865ab65

                                                                  • C:\Windows\Logs\PBR\ResetSession.xml

                                                                    Filesize

                                                                    8KB

                                                                    MD5

                                                                    7001e4360565076295ab1df39769fd44

                                                                    SHA1

                                                                    b00fd6b746d10f1be319b0745b680e258427d969

                                                                    SHA256

                                                                    46a0b0b43d9510e3b82d920c888e7e3f24b31a7399d6a58c10e5bdd4dab44b86

                                                                    SHA512

                                                                    5b501215f7739af14387d37607c5ea23cfb19d115bbeba473589d2080ea7f997c1ae1679a72e2e5e2b032dd9747a5e37c066e135d92688403f93c4fa9e935bef

                                                                  • C:\Windows\Logs\PBR\SessionID.xml

                                                                    Filesize

                                                                    106B

                                                                    MD5

                                                                    6bbad43247e6cc9f218d2b27ba205b36

                                                                    SHA1

                                                                    d956122f99e9ba11e4d359a1131d4892902f41da

                                                                    SHA256

                                                                    fa3f1dd5f9b15c7815fdde58108e653e95aafcdc9297ed17277fbf3b2abce18a

                                                                    SHA512

                                                                    2121f1b6a1a9399784db184d0c10e9671b0c1b2ab8a3eb8f5490592b991432a9e933921de371eda61d29bf82c82f35a25aa25b20c16c161f9b4ec5bdc0671910

                                                                  • C:\Windows\Logs\PBR\Timestamp.xml

                                                                    Filesize

                                                                    42B

                                                                    MD5

                                                                    00640b42e9a28a963ca485c4990b084b

                                                                    SHA1

                                                                    8f526c066dbae24d7cefd46ce3ceeba3258e1ae4

                                                                    SHA256

                                                                    a8def4f1a9cbdf9bcd9e24c8761844fc0177de786aeec4513da3e9697ef5c6a2

                                                                    SHA512

                                                                    df3e36529d9731d0176bc904efe17d7f659ef033c14932c93decd043e6b5887706da3ae17187f93cec6b85ae6a8673f3ab65d7f4aac549fa72bf73e5e18685a0

                                                                  • C:\Windows\Logs\PBR\WinRE\bootstat.dat

                                                                    Filesize

                                                                    66KB

                                                                    MD5

                                                                    668d82b83f8c52c0e5368a44b7eaa5a4

                                                                    SHA1

                                                                    069ec5b3f9ae609baafe6e59651dd361a9c6b33f

                                                                    SHA256

                                                                    106beb7dabcde632548e4e752c3c6222936ba8ddc2cf7e4864296070bd0553e1

                                                                    SHA512

                                                                    e475a3b75a9fbd00c80da10debf287cbfa06a7d583cbc886e42db81f9e0b32f2dc6c3676181d430699bfb2ffe0c71f5e40bd80836d5c2794840d7d1ab0d9b98d

                                                                  • C:\Windows\Panther\UnattendGC\diagerr.xml

                                                                    Filesize

                                                                    9KB

                                                                    MD5

                                                                    4fb335ec33ea01e924cbc4666efeff87

                                                                    SHA1

                                                                    e3a3f60d353e43a03ea94bff4b4cf6a03ea4fe89

                                                                    SHA256

                                                                    ea3d35211500020a12c1ec9542d39730e7933b0f86f01fc20077ffa33de812be

                                                                    SHA512

                                                                    868b4dc706156ced40ccb9bd1d2c3f199338c2391fd28710ce19a8127afffb114cfb2bef1d89d2a9411325ea8c71271bdcbca37f2136dd2674cab4f20787f2dc

                                                                  • C:\Windows\Panther\UnattendGC\diagwrn.xml

                                                                    Filesize

                                                                    11KB

                                                                    MD5

                                                                    c2bd361af81944e8312e40f9184be816

                                                                    SHA1

                                                                    aa596a796a6f18ace99faddbbe50b5be6da44055

                                                                    SHA256

                                                                    34c3a7aa58f70864d901c27f8c770d56a10e70c6761d87e3a8da0e042245c986

                                                                    SHA512

                                                                    083159226b2c5ab207d01998b4e882548c76e6d45c8130fe611fa98c55dd59320d4389eb626afb185e11f1d8169f6e4a2bc9ef2738aebdc208cff9cb14b86108

                                                                  • C:\Windows\System32\Recovery\ReAgent.xml

                                                                    Filesize

                                                                    1KB

                                                                    MD5

                                                                    926d4155f67f7286f4b3e92b4a002b95

                                                                    SHA1

                                                                    6758a003745cf5d0feb817204df57c375c85323a

                                                                    SHA256

                                                                    e254df8f41efe3bdefb5debaf0428c23056bcbc01249b70b1e089ecf9ac4ec0e

                                                                    SHA512

                                                                    3e9595e49ad2fd8a9c36cdbf3465dc31a79e7babeadb0f5e1b11c34214aaea421f098c0a0f7376637afeb55515353339b904ffd16aa03401304670f8d375db0e

                                                                  • C:\Windows\System32\Recovery\ReAgent.xml

                                                                    Filesize

                                                                    1KB

                                                                    MD5

                                                                    33bc55734b06c4a09b1bfa353e6b2f66

                                                                    SHA1

                                                                    438b65654fe262d2d4f165199fe11b562a5db5ee

                                                                    SHA256

                                                                    ff2248d731fd6a2073971c89e3c394d4488bae559d7d574e7ee44a4cfe2226bd

                                                                    SHA512

                                                                    0862aa479b2f3c555fd28d8ad69d1bfae166aeed6b50d752aba1cfbd4ff195cfb76f928f9e0cedc800f75ee01fbd9735718b7c49306cf35ef3930d9f5818edc0

                                                                  • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

                                                                    Filesize

                                                                    12.8MB

                                                                    MD5

                                                                    5a88eb4155644e85139ecb197d49e2ec

                                                                    SHA1

                                                                    efabf8040a48c9de2e7f9c7c12cf03b913665397

                                                                    SHA256

                                                                    2581cb51c2eb72064e70774f1f1f682fc6c6cfedbfe380397267709b732a1e2e

                                                                    SHA512

                                                                    eba576512a9ee50e6d1b6db102ccce4d5504815ba19198d59d6cadacb155389eb007eca5d5fc90bc6233562764ba76a87ba476791199f10c7b9d8defe5cbe029

                                                                  • \??\Volume{973b34ea-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{26c6ed10-d366-4880-81e8-28168bdd5ba3}_OnDiskSnapshotProp

                                                                    Filesize

                                                                    6KB

                                                                    MD5

                                                                    8ee08288f3c67b4ae9e102fbd3757cad

                                                                    SHA1

                                                                    b9cb097e0061f05e26dfe164b8a0633369271338

                                                                    SHA256

                                                                    774c452f502f4067b18bc148cad6f83f89ebb5161eb70ee477f8898221d250bb

                                                                    SHA512

                                                                    4884b4f0f3b7f28316e41eed925e4889209310624df2aa4897336efe7d6fca893f65e9e32cd3e192da1049a1325402b855db209212b2cd3e1849beeee3bb45d6

                                                                  • memory/2000-88-0x00007FFB08560000-0x00007FFB08816000-memory.dmp

                                                                    Filesize

                                                                    2.7MB

                                                                  • memory/2000-87-0x00007FFB24510000-0x00007FFB24544000-memory.dmp

                                                                    Filesize

                                                                    208KB

                                                                  • memory/2000-86-0x00007FF667970000-0x00007FF667A68000-memory.dmp

                                                                    Filesize

                                                                    992KB

                                                                  • memory/2000-89-0x00007FFB02150000-0x00007FFB03200000-memory.dmp

                                                                    Filesize

                                                                    16.7MB

                                                                  • memory/2036-11-0x00007FFB0F1E0000-0x00007FFB0FCA2000-memory.dmp

                                                                    Filesize

                                                                    10.8MB

                                                                  • memory/2036-18-0x00007FFB0F1E0000-0x00007FFB0FCA2000-memory.dmp

                                                                    Filesize

                                                                    10.8MB

                                                                  • memory/2036-15-0x00007FFB0F1E0000-0x00007FFB0FCA2000-memory.dmp

                                                                    Filesize

                                                                    10.8MB

                                                                  • memory/2036-14-0x00007FFB0F1E0000-0x00007FFB0FCA2000-memory.dmp

                                                                    Filesize

                                                                    10.8MB

                                                                  • memory/2036-13-0x00007FFB0F1E0000-0x00007FFB0FCA2000-memory.dmp

                                                                    Filesize

                                                                    10.8MB

                                                                  • memory/2036-12-0x000001F4686D0000-0x000001F4686F2000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/2328-348-0x0000026042ED0000-0x00000260430C4000-memory.dmp

                                                                    Filesize

                                                                    2.0MB

                                                                  • memory/2328-346-0x0000026025CA0000-0x0000026027BAE000-memory.dmp

                                                                    Filesize

                                                                    31.1MB

                                                                  • memory/4472-816-0x00000000007F0000-0x0000000000800000-memory.dmp

                                                                    Filesize

                                                                    64KB

                                                                  • memory/4472-847-0x00000000011D0000-0x00000000011DE000-memory.dmp

                                                                    Filesize

                                                                    56KB

                                                                  • memory/4472-845-0x000000001B490000-0x000000001B49C000-memory.dmp

                                                                    Filesize

                                                                    48KB

                                                                  • memory/4472-846-0x000000001D0B0000-0x000000001D0B8000-memory.dmp

                                                                    Filesize

                                                                    32KB

                                                                  • memory/4620-55-0x000000001D780000-0x000000001D830000-memory.dmp

                                                                    Filesize

                                                                    704KB

                                                                  • memory/4620-56-0x000000001EEC0000-0x000000001F3E8000-memory.dmp

                                                                    Filesize

                                                                    5.2MB

                                                                  • memory/4620-849-0x000000001B0E0000-0x000000001B0EA000-memory.dmp

                                                                    Filesize

                                                                    40KB

                                                                  • memory/4620-850-0x000000001B0F0000-0x000000001B0FA000-memory.dmp

                                                                    Filesize

                                                                    40KB

                                                                  • memory/4620-1122-0x00007FFB0F1E0000-0x00007FFB0FCA2000-memory.dmp

                                                                    Filesize

                                                                    10.8MB

                                                                  • memory/4620-1-0x0000000000DE0000-0x0000000000DFA000-memory.dmp

                                                                    Filesize

                                                                    104KB

                                                                  • memory/4620-2-0x00007FFB0F1E0000-0x00007FFB0FCA2000-memory.dmp

                                                                    Filesize

                                                                    10.8MB

                                                                  • memory/4620-0-0x00007FFB0F1E3000-0x00007FFB0F1E5000-memory.dmp

                                                                    Filesize

                                                                    8KB

                                                                  • memory/4620-53-0x00007FFB0F1E3000-0x00007FFB0F1E5000-memory.dmp

                                                                    Filesize

                                                                    8KB

                                                                  • memory/4620-57-0x00007FFB0F1E0000-0x00007FFB0FCA2000-memory.dmp

                                                                    Filesize

                                                                    10.8MB

                                                                  • memory/4620-848-0x000000001C560000-0x000000001C5EE000-memory.dmp

                                                                    Filesize

                                                                    568KB

                                                                  • memory/6068-844-0x000001CD7BA10000-0x000001CD7BAC2000-memory.dmp

                                                                    Filesize

                                                                    712KB

                                                                  • memory/6068-841-0x000001CD7A350000-0x000001CD7A3D2000-memory.dmp

                                                                    Filesize

                                                                    520KB

                                                                  • memory/6068-778-0x000001CD7C270000-0x000001CD7C3D8000-memory.dmp

                                                                    Filesize

                                                                    1.4MB

                                                                  • memory/6068-842-0x000001CD7A2F0000-0x000001CD7A31C000-memory.dmp

                                                                    Filesize

                                                                    176KB

                                                                  • memory/6068-843-0x000001CD7BD00000-0x000001CD7BFE2000-memory.dmp

                                                                    Filesize

                                                                    2.9MB