Malware Analysis Report

2024-11-16 13:34

Sample ID 240526-szvlmabc5t
Target XClient.exe
SHA256 b0bb67c7a37e19b4df26ec109b0a8aa3508a401682a4d1c3ba6d8676d2ffa45d
Tags
xworm execution persistence rat trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

b0bb67c7a37e19b4df26ec109b0a8aa3508a401682a4d1c3ba6d8676d2ffa45d

Threat Level: Known bad

The file XClient.exe was found to be: Known bad.

Malicious Activity Summary

xworm execution persistence rat trojan

Detect Xworm Payload

Xworm family

Xworm

Command and Scripting Interpreter: PowerShell

Executes dropped EXE

Loads dropped DLL

Drops startup file

Adds Run key to start application

Looks up external IP address via web service

Drops file in Windows directory

Enumerates physical storage devices

Unsigned PE

Suspicious use of SetWindowsHookEx

Modifies registry class

Suspicious behavior: AddClipboardFormatListener

Suspicious use of WriteProcessMemory

Enumerates system info in registry

Suspicious use of AdjustPrivilegeToken

Suspicious behavior: EnumeratesProcesses

Modifies Internet Explorer settings

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-05-26 15:34

Signatures

Detect Xworm Payload

Description Indicator Process Target
N/A N/A N/A N/A

Xworm family

xworm

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-26 15:34

Reported

2024-05-26 15:36

Platform

win7-20240221-en

Max time kernel

146s

Max time network

146s

Command Line

"C:\Users\Admin\AppData\Local\Temp\XClient.exe"

Signatures

Detect Xworm Payload

Description Indicator Process Target
N/A N/A N/A N/A

Xworm

trojan rat xworm

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Chrome.lnk C:\Users\Admin\AppData\Local\Temp\XClient.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Chrome.lnk C:\Users\Admin\AppData\Local\Temp\XClient.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\72B24DA9-5EF3-4DB1-878D-784C27B22643\dismhost.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Windows\System32\cleanmgr.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\72B24DA9-5EF3-4DB1-878D-784C27B22643\dismhost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\72B24DA9-5EF3-4DB1-878D-784C27B22643\dismhost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\72B24DA9-5EF3-4DB1-878D-784C27B22643\dismhost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\72B24DA9-5EF3-4DB1-878D-784C27B22643\dismhost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\72B24DA9-5EF3-4DB1-878D-784C27B22643\dismhost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\72B24DA9-5EF3-4DB1-878D-784C27B22643\dismhost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\72B24DA9-5EF3-4DB1-878D-784C27B22643\dismhost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\72B24DA9-5EF3-4DB1-878D-784C27B22643\dismhost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\72B24DA9-5EF3-4DB1-878D-784C27B22643\dismhost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\72B24DA9-5EF3-4DB1-878D-784C27B22643\dismhost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\72B24DA9-5EF3-4DB1-878D-784C27B22643\dismhost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\72B24DA9-5EF3-4DB1-878D-784C27B22643\dismhost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\72B24DA9-5EF3-4DB1-878D-784C27B22643\dismhost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\72B24DA9-5EF3-4DB1-878D-784C27B22643\dismhost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\72B24DA9-5EF3-4DB1-878D-784C27B22643\dismhost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\72B24DA9-5EF3-4DB1-878D-784C27B22643\dismhost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\72B24DA9-5EF3-4DB1-878D-784C27B22643\dismhost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\72B24DA9-5EF3-4DB1-878D-784C27B22643\dismhost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\72B24DA9-5EF3-4DB1-878D-784C27B22643\dismhost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\72B24DA9-5EF3-4DB1-878D-784C27B22643\dismhost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\72B24DA9-5EF3-4DB1-878D-784C27B22643\dismhost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\72B24DA9-5EF3-4DB1-878D-784C27B22643\dismhost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\72B24DA9-5EF3-4DB1-878D-784C27B22643\dismhost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\72B24DA9-5EF3-4DB1-878D-784C27B22643\dismhost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\72B24DA9-5EF3-4DB1-878D-784C27B22643\dismhost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\72B24DA9-5EF3-4DB1-878D-784C27B22643\dismhost.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\Chrome = "C:\\ProgramData\\Chrome.exe" C:\Users\Admin\AppData\Local\Temp\XClient.exe N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A ip-api.com N/A N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\Logs\DISM\dism.log C:\Windows\System32\cleanmgr.exe N/A
File opened for modification C:\Windows\Logs\DISM\dism.log C:\Users\Admin\AppData\Local\Temp\72B24DA9-5EF3-4DB1-878D-784C27B22643\dismhost.exe N/A

Enumerates physical storage devices

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\ = "&Open" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ThreadingModel = "Apartment" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\ = "&Open" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32 C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\ShellEx C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\ = "&Open" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon\ = "\"%1\"" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\ShellEx C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\ = "&Edit" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\ = "&Print" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A

Suspicious behavior: AddClipboardFormatListener

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\XClient.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\XClient.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1136 wrote to memory of 2876 N/A C:\Users\Admin\AppData\Local\Temp\XClient.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1136 wrote to memory of 2876 N/A C:\Users\Admin\AppData\Local\Temp\XClient.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1136 wrote to memory of 2876 N/A C:\Users\Admin\AppData\Local\Temp\XClient.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1136 wrote to memory of 2572 N/A C:\Users\Admin\AppData\Local\Temp\XClient.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1136 wrote to memory of 2572 N/A C:\Users\Admin\AppData\Local\Temp\XClient.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1136 wrote to memory of 2572 N/A C:\Users\Admin\AppData\Local\Temp\XClient.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1136 wrote to memory of 2128 N/A C:\Users\Admin\AppData\Local\Temp\XClient.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1136 wrote to memory of 2128 N/A C:\Users\Admin\AppData\Local\Temp\XClient.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1136 wrote to memory of 2128 N/A C:\Users\Admin\AppData\Local\Temp\XClient.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1136 wrote to memory of 2360 N/A C:\Users\Admin\AppData\Local\Temp\XClient.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1136 wrote to memory of 2360 N/A C:\Users\Admin\AppData\Local\Temp\XClient.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1136 wrote to memory of 2360 N/A C:\Users\Admin\AppData\Local\Temp\XClient.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2484 wrote to memory of 2924 N/A C:\Windows\System32\cleanmgr.exe C:\Users\Admin\AppData\Local\Temp\72B24DA9-5EF3-4DB1-878D-784C27B22643\dismhost.exe
PID 2484 wrote to memory of 2924 N/A C:\Windows\System32\cleanmgr.exe C:\Users\Admin\AppData\Local\Temp\72B24DA9-5EF3-4DB1-878D-784C27B22643\dismhost.exe
PID 2484 wrote to memory of 2924 N/A C:\Windows\System32\cleanmgr.exe C:\Users\Admin\AppData\Local\Temp\72B24DA9-5EF3-4DB1-878D-784C27B22643\dismhost.exe

Processes

C:\Users\Admin\AppData\Local\Temp\XClient.exe

"C:\Users\Admin\AppData\Local\Temp\XClient.exe"

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\Chrome.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Chrome.exe'

C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe

"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"

C:\Windows\system32\cmd.exe

cmd /c ""C:\Users\Admin\Desktop\ExportRepair.bat" "

C:\Windows\explorer.exe

"C:\Windows\explorer.exe"

C:\Windows\System32\control.exe

"C:\Windows\System32\control.exe" SYSTEM

C:\Windows\SysWOW64\DllHost.exe

C:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}

C:\Windows\system32\systempropertiesadvanced.exe

"C:\Windows\system32\systempropertiesadvanced.exe"

C:\Windows\System32\cleanmgr.exe

"C:\Windows\System32\cleanmgr.exe" /D C

C:\Users\Admin\AppData\Local\Temp\72B24DA9-5EF3-4DB1-878D-784C27B22643\dismhost.exe

C:\Users\Admin\AppData\Local\Temp\72B24DA9-5EF3-4DB1-878D-784C27B22643\dismhost.exe {BE69B669-02C1-47D8-B492-B8FEB37C214E}

C:\Windows\System32\cleanmgr.exe

"C:\Windows\System32\cleanmgr.exe" /D C

C:\Windows\System32\cleanmgr.exe

"C:\Windows\System32\cleanmgr.exe" /D C

C:\Windows\System32\cleanmgr.exe

"C:\Windows\System32\cleanmgr.exe" /D C

C:\Windows\System32\cleanmgr.exe

"C:\Windows\System32\cleanmgr.exe" /D C

C:\Windows\System32\cleanmgr.exe

"C:\Windows\System32\cleanmgr.exe" /D C

C:\Windows\System32\cleanmgr.exe

"C:\Windows\System32\cleanmgr.exe" /D C

C:\Windows\System32\cleanmgr.exe

"C:\Windows\System32\cleanmgr.exe" /D C

C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE

"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde /n

Network

Country Destination Domain Proto
US 8.8.8.8:53 ip-api.com udp
US 208.95.112.1:80 ip-api.com tcp
US 8.8.8.8:53 character-estimate.gl.at.ply.gg udp
US 147.185.221.19:61192 character-estimate.gl.at.ply.gg tcp
US 147.185.221.19:61192 character-estimate.gl.at.ply.gg tcp
US 147.185.221.19:61192 character-estimate.gl.at.ply.gg tcp
US 147.185.221.19:61192 character-estimate.gl.at.ply.gg tcp
US 147.185.221.19:61192 character-estimate.gl.at.ply.gg tcp
US 147.185.221.19:61192 character-estimate.gl.at.ply.gg tcp
US 147.185.221.19:61192 character-estimate.gl.at.ply.gg tcp
US 147.185.221.19:61192 character-estimate.gl.at.ply.gg tcp
US 147.185.221.19:61192 character-estimate.gl.at.ply.gg tcp
US 147.185.221.19:61192 character-estimate.gl.at.ply.gg tcp

Files

memory/1136-0-0x000007FEF53F3000-0x000007FEF53F4000-memory.dmp

memory/1136-1-0x0000000000BF0000-0x0000000000C0E000-memory.dmp

memory/1136-2-0x000007FEF53F0000-0x000007FEF5DDC000-memory.dmp

memory/2876-7-0x000000001B270000-0x000000001B552000-memory.dmp

memory/2876-8-0x0000000002510000-0x0000000002518000-memory.dmp

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

MD5 69087dc4725d5e0f2caf2d9605c9fec2
SHA1 70ec217b4ab02c63e86d84fd81c1b641a0ef756e
SHA256 fb9501eb13d76431b09077f5663e2a072f3d7d505a459bccbf49557f72cf7940
SHA512 9a510ea62cbaf05a961cff493ba5a1b7f16275a5463f7fc2360aa4cc2c7eabbc9bd163dd907ac8f15925bf2d69cc1e9dfe6028f5b69d93f5e879bc3b10793816

memory/2572-14-0x000000001B200000-0x000000001B4E2000-memory.dmp

memory/2572-15-0x00000000027A0000-0x00000000027A8000-memory.dmp

memory/2360-26-0x000000001B320000-0x000000001B602000-memory.dmp

memory/2360-27-0x0000000002460000-0x0000000002468000-memory.dmp

C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

MD5 87e4bc1a89efd72c3ba76c8461f04401
SHA1 18a100961ae1fd596967c628df3ab878b8cab6e7
SHA256 675fcf9eda5e4d6c7ec6682aaff16a51f86ad3df876a7f2e3e78bcf1ca6889d4
SHA512 50fc4ed57f2e54f353d52137e99458794e9681098ec4a5e2351c736778d283ff7048e25220fa76d0cf0a88360ba050c3162115df5bdfdb7ff1ff9835cee07309

memory/1136-56-0x000007FEF53F3000-0x000007FEF53F4000-memory.dmp

memory/1136-57-0x000007FEF53F0000-0x000007FEF5DDC000-memory.dmp

\Users\Admin\AppData\Local\Temp\72B24DA9-5EF3-4DB1-878D-784C27B22643\DismHost.exe

MD5 9a821d8d62f4c60232b856e98cba7e4f
SHA1 4ec5dcbd43ad3b0178b26a57b8a2f41e33a48df5
SHA256 a5b3bf53bcd3c0296498383837e8f9eb7d610c535521315a96aa740cf769f525
SHA512 1b5273a52973dac77ad0ef7aa1dda929a782d762ab8489eb90dff1062dd4cc01e4f7f4157266a2abcf8941e91cf4aa5603de1dd8ee871524748e0989ebaa37d3

C:\Users\Admin\AppData\Local\Temp\72B24DA9-5EF3-4DB1-878D-784C27B22643\DismCorePS.dll

MD5 5488e381238ff19687fdd7ab2f44cfcc
SHA1 b90fa27ef6a7fc6d543ba33d5c934180e17297d3
SHA256 abaada27d682b0d7270827c0271ac04505800b11d04b764562e4baa2cbc306a0
SHA512 933e99749c68b3e9fe290fe4a1d8c90732ba13092d8cd9cac64f8e6583c8dcfbf25a4bea122966bc5d7d92e3a21210365a03b52274d25d704de52631e1fb0412

C:\Users\Admin\AppData\Local\Temp\72B24DA9-5EF3-4DB1-878D-784C27B22643\wdscore.dll

MD5 7b38d7916a7cd058c16a0a6ca5077901
SHA1 f79d955a6eac2f0368c79f7ba8061e9c58ba99b2
SHA256 3f6dd990e2da5d3bd6d65a72cbfb0fe79eb30b118a8ad71b6c9bb5581a622dce
SHA512 2d22fe535f464f635d42e5b016741b9caf173da372e4563a565fa1e294581f44330c61e08edfe4c08a341ebd708e2ad08614161c0ee54e8dea99452b87d1e710

C:\Users\Admin\AppData\Local\Temp\72B24DA9-5EF3-4DB1-878D-784C27B22643\dismprov.dll

MD5 8ca117cb9338c0351236939717cb7084
SHA1 baa145810d50fdb204c8482fda5cacaaf58cdad0
SHA256 f351c3597c98ea9fe5271024fc2ccf895cc6a247fb3b02c1cdb68891dac29e54
SHA512 35b4be68666d22f82d949ad9f0ce986779355e7d2d8fd99c0e2102cd364aba4a95b5805269261a9205c1130bdd1f5101d16146d9334c27796c7f41f2c3166c35

C:\Users\Admin\AppData\Local\Temp\72B24DA9-5EF3-4DB1-878D-784C27B22643\OSProvider.dll

MD5 e7caed467f80b29f4e63ba493614dbb1
SHA1 65a159bcdb68c7514e4f5b65413678c673d2d0c9
SHA256 2c325e2647eb622983948cc26c509c832e1094639bb7af0fb712583947ad019c
SHA512 34952d8a619eb46d8b7ec6463e1e99f1c641ce61c471997dd959911ae21d64e688d9aa8a78405faa49a652675caf40d8e9e5a07de30257f26da4c65f04e2181e

C:\Users\Admin\AppData\Local\Temp\72B24DA9-5EF3-4DB1-878D-784C27B22643\LogProvider.dll

MD5 62de64dc805fd98af3ada9d93209f6a9
SHA1 392ba504973d626aaf5c5b41b184670c58ec65a7
SHA256 83c0f61cc8fc01c789c07dd25f58862e0710088e6887716b1be9ee9f149adefc
SHA512 7db48f240df566be9a4b836807f97e8169d58edfa699de69be35b3977e442da3fea4f8b38d359d50f4d5afcf8547c8f66329e5ec855efbc5402ce88458d67e28

C:\Windows\Logs\DISM\dism.log

MD5 3af9c3be116537569d7a2db83d8a8001
SHA1 65660ab4b35080d7cb19ad6e4d5d8b070f242bb0
SHA256 263bbb8964dbc33b8b1234d59d40192ec3fc949866873907c1253db63fcddf05
SHA512 49f92c37a0ff93a3c6b91167e7d70b32a797dc8b86ff176647de76bd245854b7836b1c35cdaa75de4aedd28b03b0c103a90e08b03ddc846cead8e00c0f9e8778

C:\Users\Admin\AppData\Local\Temp\72B24DA9-5EF3-4DB1-878D-784C27B22643\CbsProvider.dll

MD5 efcb002abc3529d71b61e6fb6434566c
SHA1 a25aca0fc9a1139f44329b28dc13c526965d311f
SHA256 b641d944428f5b8ffb2fefd4da31c6a15ba84d01130f2712d7b1e71c518805bd
SHA512 10ee2b20f031ca5a131a9590599f13d3f0029352376705a2d7d2134fcd6535a3b54356d1b4d0b3fb53ac5ca4f034f9afb129a4f601159938680197ea39ea0687

\Users\Admin\AppData\Local\Temp\72B24DA9-5EF3-4DB1-878D-784C27B22643\WimProvider.dll

MD5 fc00a05639494779002682a9b965ef9c
SHA1 521c93491aab9ab8523a2792c3add7cc49a2a09d
SHA256 1a63e46f970c815b8612eeac07f79e909b6d8180d34549a338766b4623461bd3
SHA512 cc6b8aeb20e1c71ca616dac7d989d0d41d3441f19851768bb9398bc930460378418fbec509dfe1b0e4c58943b260baf80a65e3964f8c9c5ccf9dce61f2d2d58e

C:\Users\Admin\AppData\Local\Temp\72B24DA9-5EF3-4DB1-878D-784C27B22643\en-US\WimProvider.dll.mui

MD5 d1f01a0d5d8761924a03e8ee3d3c068c
SHA1 997f202bc2b91f97a998e8c9b2579c459f7cae58
SHA256 547c11f2859fdc63afbdbfd80d9b9748730161ff6db2618ccd33b0ba543c63a6
SHA512 1ba92eb28047917309989b17947c000333d820adc87100ce52e3ec8f6b9020d4953107fb527c5cddcbec864646e1abf830bf9826ce57ccbf85a381cf7f4cde65

\Users\Admin\AppData\Local\Temp\72B24DA9-5EF3-4DB1-878D-784C27B22643\UnattendProvider.dll

MD5 8d3855b133e21143e8b4bfadb9fb14a3
SHA1 25d729e8455a1f19d0dc59c0962908a146a62935
SHA256 3b3118cb4a65cb27a182d044c7b9cfc17581d3fabab094d174b5e54df4ddf5e4
SHA512 4e67bcc6f6bd396350d550f5564dd9b1d939d8b6a48706280ee5c1b7205579355dfeb5425f99656455d958f6b61ceee3986488d27de824ed5b9ce14e43aea5f5

C:\Users\Admin\AppData\Local\Temp\72B24DA9-5EF3-4DB1-878D-784C27B22643\en-US\UnattendProvider.dll.mui

MD5 2ee061d35f60f177c63a1f6710c7b5a4
SHA1 5205fcef37d9c3d1aff279aa66ed41b6376110f7
SHA256 e53de2552a86c8f2aae033963b51bd2ff938dc176d1be3156db35ad89eac1e82
SHA512 904ff78eed06688afe5c71d40ed832142879aee6a509b1de50274216de60549ecc40a4b89b70533904db2bb70156e79d9ab8c20cc851a559b1a59c35036f0592

\Users\Admin\AppData\Local\Temp\72B24DA9-5EF3-4DB1-878D-784C27B22643\TransmogProvider.dll

MD5 739968678548ba15f6b9372e8760c012
SHA1 691b09af08b64b01c3db7ffe2aa625c9be375686
SHA256 4ce7afb5c5a44c4c9d0119d7306134e3412467bddcbf5b7da2786e5d64528d11
SHA512 8075d3ce9e462777b143fad03f25ddb6cc8b5e2512aa475850eba39a5ef3be3364e7704620b8c444449bbe143b6ffa307428b93bc5e7e0b5738cf36aaf0c969b

C:\Users\Admin\AppData\Local\Temp\72B24DA9-5EF3-4DB1-878D-784C27B22643\en-US\TransmogProvider.dll.mui

MD5 99b5c7999e839ffd6c8ca930ceffee53
SHA1 fd9bafc43010a3c58fa0d09da98842e314de0b28
SHA256 b3e31abbb5626a81598e7adae0f3c9ad34057f96f88ee85b4e8829698385adba
SHA512 a53a4eb2a4c55ce50d7b0a855f9ff82784462f96556457cea72c25afefd4e4ca6725ef279c9cbba85c6d620c70a3f1f511cab495982415fe24dbf07a46651855

\Users\Admin\AppData\Local\Temp\72B24DA9-5EF3-4DB1-878D-784C27B22643\SmiProvider.dll

MD5 fe447d1cd38cecac2331fa932078d9a0
SHA1 ebd99d5eb3403f547821ce51c193afc86ecf4bcf
SHA256 05fe0897be3f79773c06b7ba4c152eec810fd895bf566d837829ec04c4f4338d
SHA512 801e47c6c62a2d17ed7dd430a489507faf6074471f191f66862fd732924ad9a4bd1efe603354ed06d16c4d5c31a044126c4cc2dbbd8ffece2ed7632358ee7779

C:\Users\Admin\AppData\Local\Temp\72B24DA9-5EF3-4DB1-878D-784C27B22643\en-US\SmiProvider.dll.mui

MD5 f842303ef440381939fc34df425f8392
SHA1 92debf4ae2d86a123002a104d0e9ad4981ab6d59
SHA256 b06daf95235bd8b87af3dd06cc0566d7b893fbeaa1d5b39b66566b567c24c51f
SHA512 d72ccd42da7506cbfbe5db1af03f6d95f8a9c43e11e9f7f24abadd5e98907ad1f976c626a53ed96ad4b5aa24534f019a1ac7ec8ace9a785035dabc72ffc6e18b

C:\Users\Admin\AppData\Local\Temp\72B24DA9-5EF3-4DB1-878D-784C27B22643\en-US\OSProvider.dll.mui

MD5 f0588e200554aed003667c04819cce32
SHA1 dacbdc53bd297cd818ea954f5a47de6e84212108
SHA256 40fe7b6631d11b5519f051ff0a0ade1cb0de524fb4904114067e71b729c38eba
SHA512 99d9372a452a1b908f55d204a2b85addaa11fe49bb0b9c0d36a131c1cad254e9fb8a3b952572111d68a78fdbf41782dbe78d8cb20165676aada496113e4899eb

\Users\Admin\AppData\Local\Temp\72B24DA9-5EF3-4DB1-878D-784C27B22643\MsiProvider.dll

MD5 45ff4fa5ca5432bfccded4433fe2a85b
SHA1 858c42499dd9d2198a6489dd310dc5cbff1e8d6e
SHA256 8a85869b2d61bad50d816daf08df080f8039dbeb1208009a73daa7be83d032bd
SHA512 abbe0f673d18cc9a922cfd677e5b88714a3049ad8937f836b5a8b9bddac5ddbad4dc143360efc018dcd3a3440aa3e516b1a97f7cd2fa9a55cb73739dedef1589

C:\Users\Admin\AppData\Local\Temp\72B24DA9-5EF3-4DB1-878D-784C27B22643\en-US\MsiProvider.dll.mui

MD5 17fac8ab2dfbaba2b049ec43204c1c2f
SHA1 d484ea7c6f749debf92b132765d2fd56f228db73
SHA256 f4d277aaa8d0bed0afcd1b703ee4c28c86313075e291b6addbdfd6202eb3777e
SHA512 ff7969adbc53fd2f5dccd3842b46a2517904d524020e69bb21271cd8ddc0cfddfd3f791741589b17b740d5d013cf14ed28b5af50d37d960c955adfd6b99e50cc

C:\Users\Admin\AppData\Local\Temp\72B24DA9-5EF3-4DB1-878D-784C27B22643\en-US\LogProvider.dll.mui

MD5 f909216cf932aeb4f2f9f02e8c56a815
SHA1 c5cafe5f8dad60d3a1d7c75aa2cf575e35a634f2
SHA256 f5c89ba078697cdb705383684af49e07cdd094db962f0649cad23008ae9d6ce2
SHA512 5dca19d54f738486085f11b5a2522073894a97d67e67be0eadbe9dc8944e632ae39b24499d7ff16e88d18166031697a238ead877f12cbb7447acca49c32a184a

\Users\Admin\AppData\Local\Temp\72B24DA9-5EF3-4DB1-878D-784C27B22643\IntlProvider.dll

MD5 bbb9e4fa2561f6a6e5ccf25da069ac1b
SHA1 2d353ec70c7a13ac5749d2205ac732213505082a
SHA256 b92cf901027901d7066e9ee7ac8f3b48a99cfb3a3ddd8d759cb77295148943c1
SHA512 01f4e6d51a0acb394693191b78cefa28759903036636a1d64f90c60dc59c948c78dd38df6fb2be149245622eadf8b2627c6767bf2aa2e0e56e6b52f0b91cc79e

C:\Users\Admin\AppData\Local\Temp\72B24DA9-5EF3-4DB1-878D-784C27B22643\en-US\IntlProvider.dll.mui

MD5 0bffb5e4345198dbf18aa0bc8f0d6da1
SHA1 e2789081b7cf150b63bad62bac03b252283e9fe5
SHA256 b7bcc0e99719f24c30e12269e33a8bf09978c55593900d51d5f8588e51730739
SHA512 590e8016075871846efff8b539e4779a1a628de318c161292c7231ca964a310e0722e44816041786c8620bff5c29ff34c5f35733ee4eac74f3abfae6d3af854a

\Users\Admin\AppData\Local\Temp\72B24DA9-5EF3-4DB1-878D-784C27B22643\FolderProvider.dll

MD5 c9d74156913061be6c51d8fc3acf8e93
SHA1 4a4c6473a478256e4c78b423e918191118e01093
SHA256 af0a38b4e95a50427b215eebc185bb621187e066b8b7373fb960eac0551bec37
SHA512 c12f75a6451881878a7a9ed5de61d157ea36f53aa41abf7660e1cc411b2ddd70ff048a307b1440cfdf1b269aeff77da8cc163ad19e9e3a294a5128f170f37047

C:\Users\Admin\AppData\Local\Temp\72B24DA9-5EF3-4DB1-878D-784C27B22643\en-US\FolderProvider.dll.mui

MD5 cab37f952682118bac4a3f824c80b6ac
SHA1 6e35b4289927e26e3c50c16cbf87eb3ac6f3b793
SHA256 14bec7c4bb6cf1ee9049ef8820ec88bf78f2af75615f7a3fb265ef4b45c30e4d
SHA512 de9089adaa85f37201526b8619f697be98a7d05353b21b6d835f4d56803732380316359ba8b3c8ca7c14a9bf7cf31a7eff3c866a8f303ef737eb63573e01aa19

\Users\Admin\AppData\Local\Temp\72B24DA9-5EF3-4DB1-878D-784C27B22643\DmiProvider.dll

MD5 fc2db5842190c6e78a40cd7da483b27c
SHA1 e94ee17cd06fb55d04bef2bdfcf5736f336e0fa0
SHA256 e6c93305d886bff678bd83b715bb5c5cbb376b90b973d9dd6844fac808de5c82
SHA512 d5d32b894a485447d55499a2f1e02a8b33fb74081f225b8e2872995491a37353cf8022f46feeb3ca363b2e172ab89e29ab9a453692d1a964ca08d40230574bf6

C:\Users\Admin\AppData\Local\Temp\72B24DA9-5EF3-4DB1-878D-784C27B22643\en-US\DmiProvider.dll.mui

MD5 ee8c06cd11b34a37579d118ac5d6fa1d
SHA1 c62f7fb0c6f42321b33ea675c0dfd304b2eb4a15
SHA256 6991fb4bfd6800385a32ac759dd21016421cb13dca81f04ddcaf6bf12a928ccc
SHA512 091cfa7d9b80e92df13ba829372dfb211214f4221e52fbf3f558ebb7f18736ad9ad867ea0d0ddf8938def1b4db64a12d0df37c2eaf41727b997f4905dd41fed1

C:\Users\Admin\AppData\Local\Temp\72B24DA9-5EF3-4DB1-878D-784C27B22643\en-US\dismprov.dll.mui

MD5 9bc5d6eb3e2d31bbdbffe127a1b3cdbf
SHA1 b253025c442aefe338b4c7ebea2f7d808abc9618
SHA256 55e9ae098def76e7388d7d069746dbd136ae243357ece23b77f2365f0b2ff76f
SHA512 f9968554737d181d4b7d0366f40f0c9a2039b59796986964413fa08f031f5529411b2741eb8ea3d8c312112b2038e6a58d891d090a42672c3d1c782b859f2e08

\Users\Admin\AppData\Local\Temp\72B24DA9-5EF3-4DB1-878D-784C27B22643\DismCore.dll

MD5 f2b0771a7cd27f20689e0ab787b7eb7c
SHA1 eb56e313cd23cb77524ef0db1309aebb0b36f7ef
SHA256 7c675710ae52d5e8344465f1179ec4e03c882d5e5b16fc0ba9564b1ea121638f
SHA512 5ebd4685e5b949d37c52bb1f2fe92accfa48dd4ef585c898f3982eb52f618064fc95c2f98532ca3e7007d0ef71c1fe91887ce3dc0a563f09bc2c5f59f3a3082a

C:\Users\Admin\AppData\Local\Temp\72B24DA9-5EF3-4DB1-878D-784C27B22643\en-US\DismCore.dll.mui

MD5 f18044dec5b59c82c7f71ecffe2e89ab
SHA1 731d44676a8f5b3b7ad1d402dfdbb7f08bdc40c6
SHA256 a650578a4630e1a49280dc273d1d0bbdca81664a2199e5ab44ec7c5c54c0a35e
SHA512 53c23acddab099508b1e01dcc0d5dc9d4da67bc1765087f4a46b9ac842de065a55bac4c6682da07f5a1d29a3d0c1d92a4310e6b0f838740d919f8285911fa714

\Users\Admin\AppData\Local\Temp\72B24DA9-5EF3-4DB1-878D-784C27B22643\CompatProvider.dll

MD5 6a4bd682396f29fd7df5ab389509b950
SHA1 46f502bec487bd6112f333d1ada1ec98a416d35f
SHA256 328e5fbb6f3088fd759d855e656cd4c477b59f6a43a247954d1fd9050815e6cb
SHA512 35ced350482c94d22c85cd1b98890d01baed0da1c35a114d2cd6373d08969be764282f7a9d8ff0dd1dff3fae42e4ea20d3194c352364901b23ca2f375bd02751

C:\Users\Admin\AppData\Local\Temp\72B24DA9-5EF3-4DB1-878D-784C27B22643\en-US\CompatProvider.dll.mui

MD5 9085b83968e705a3be5cd7588545a955
SHA1 f0a477b353ca3e20fa65dd86cb260777ff27e1dd
SHA256 fe0719cf624e08b5d6695ee3887358141d11316489c4ea97d2f61a4d2b9060cd
SHA512 b7f12f7ac1e6942f24f4bf35444f623cc93f8a047ebc754b9599d5df16cab4d3745729d11b4a3abfdc06a671e55ac52cac937badd808825906f52885f16f2c1c

C:\Users\Admin\AppData\Local\Temp\72B24DA9-5EF3-4DB1-878D-784C27B22643\en-US\CbsProvider.dll.mui

MD5 724ee7133b1822f7ff80891d773fde51
SHA1 d10dff002b02c78e624bf83ae8a6f25d73761827
SHA256 d13f068f42074b3104987bfed49fbf3a054be6093908ed5dea8901887dddb367
SHA512 1dfd236537d6592a19b07b5e1624310c67adff9e776e6d2566b9e7db732588988f9ae7352df6c3b53c058807d8ed55fafc2004a2d6dc2f3f6c9e16445699f17b

memory/2568-228-0x000000005FFF0000-0x0000000060000000-memory.dmp