Analysis

  • max time kernel
    150s
  • max time network
    145s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241023-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    01/12/2024, 23:58

General

  • Target

    Specter Screen Grabber.exe

  • Size

    11.0MB

  • MD5

    7918234c2953a1ef45480b1224371750

  • SHA1

    ae40e7be6833b2d2cc54eb5f325771def35cb370

  • SHA256

    2daa61ed02cf604312b1d91ba8c161bb31fdff082f849eb4e5c4000d90a40388

  • SHA512

    ed41b069e9fe99159141a294393e8823be8f56e5ea1e89ce0f113e8d7646b9aef4d9aa80941669ff2da95a4c7c1fb378f9a9f5ea58db519e09f7f37ba9615587

  • SSDEEP

    196608:GKWyhmducMnCUkFuRLuId3wpguRMV/DBU9AAwy2efaTqTpXoKIlQqe0Uz/Sr/lHW:GCEQcULPWguRM9FQwFWTpXoK+wSr/lCl

Malware Config

Extracted

Family

xworm

C2

24.ip.gl.ply.gg:2962

Attributes
  • install_file

    USB.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 8 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Themida packer 9 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 3 IoCs
  • Drops file in System32 directory 13 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 21 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:624
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        2⤵
          PID:876
      • C:\Windows\system32\lsass.exe
        C:\Windows\system32\lsass.exe
        1⤵
          PID:676
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
          1⤵
            PID:956
          • C:\Windows\System32\svchost.exe
            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
            1⤵
              PID:324
            • C:\Windows\System32\svchost.exe
              C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
              1⤵
                PID:408
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                1⤵
                  PID:476
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
                  1⤵
                    PID:1028
                  • C:\Windows\System32\svchost.exe
                    C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                    1⤵
                      PID:1108
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                      1⤵
                      • Drops file in System32 directory
                      PID:1180
                      • C:\Windows\system32\taskhostw.exe
                        taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                        2⤵
                          PID:2800
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                        1⤵
                          PID:1228
                        • C:\Windows\System32\svchost.exe
                          C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                          1⤵
                            PID:1252
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                            1⤵
                              PID:1260
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                              1⤵
                                PID:1312
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                                1⤵
                                  PID:1456
                                  • C:\Windows\system32\sihost.exe
                                    sihost.exe
                                    2⤵
                                      PID:2552
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                    1⤵
                                      PID:1508
                                    • C:\Windows\system32\svchost.exe
                                      C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                                      1⤵
                                        PID:1532
                                      • C:\Windows\system32\svchost.exe
                                        C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                                        1⤵
                                          PID:1548
                                        • C:\Windows\System32\svchost.exe
                                          C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                          1⤵
                                            PID:1592
                                          • C:\Windows\System32\svchost.exe
                                            C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                                            1⤵
                                              PID:1672
                                            • C:\Windows\System32\svchost.exe
                                              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                              1⤵
                                                PID:1732
                                              • C:\Windows\System32\svchost.exe
                                                C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm
                                                1⤵
                                                  PID:1860
                                                • C:\Windows\system32\svchost.exe
                                                  C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                  1⤵
                                                    PID:1880
                                                  • C:\Windows\system32\svchost.exe
                                                    C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache
                                                    1⤵
                                                      PID:1900
                                                    • C:\Windows\System32\svchost.exe
                                                      C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                      1⤵
                                                        PID:1908
                                                      • C:\Windows\system32\svchost.exe
                                                        C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                        1⤵
                                                          PID:1920
                                                        • C:\Windows\System32\svchost.exe
                                                          C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                          1⤵
                                                            PID:1984
                                                          • C:\Windows\System32\spoolsv.exe
                                                            C:\Windows\System32\spoolsv.exe
                                                            1⤵
                                                              PID:2076
                                                            • C:\Windows\System32\svchost.exe
                                                              C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                              1⤵
                                                                PID:2260
                                                              • C:\Windows\System32\svchost.exe
                                                                C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                                1⤵
                                                                  PID:2280
                                                                • C:\Windows\system32\svchost.exe
                                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                                  1⤵
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:2528
                                                                • C:\Windows\system32\svchost.exe
                                                                  C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                                  1⤵
                                                                    PID:2560
                                                                  • C:\Windows\system32\svchost.exe
                                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                                    1⤵
                                                                      PID:2568
                                                                    • C:\Windows\system32\svchost.exe
                                                                      C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                                      1⤵
                                                                        PID:2624
                                                                      • C:\Windows\system32\svchost.exe
                                                                        C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc
                                                                        1⤵
                                                                        • Drops file in System32 directory
                                                                        PID:2768
                                                                      • C:\Windows\system32\svchost.exe
                                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                                        1⤵
                                                                          PID:2816
                                                                        • C:\Windows\sysmon.exe
                                                                          C:\Windows\sysmon.exe
                                                                          1⤵
                                                                            PID:2840
                                                                          • C:\Windows\System32\svchost.exe
                                                                            C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                                            1⤵
                                                                              PID:2868
                                                                            • C:\Windows\system32\svchost.exe
                                                                              C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                                              1⤵
                                                                                PID:2884
                                                                              • C:\Windows\system32\svchost.exe
                                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker
                                                                                1⤵
                                                                                  PID:2980
                                                                                • C:\Windows\system32\wbem\unsecapp.exe
                                                                                  C:\Windows\system32\wbem\unsecapp.exe -Embedding
                                                                                  1⤵
                                                                                    PID:3080
                                                                                  • C:\Windows\system32\svchost.exe
                                                                                    C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
                                                                                    1⤵
                                                                                      PID:3556
                                                                                    • C:\Windows\Explorer.EXE
                                                                                      C:\Windows\Explorer.EXE
                                                                                      1⤵
                                                                                        PID:3644
                                                                                        • C:\Users\Admin\AppData\Local\Temp\Specter Screen Grabber.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\Specter Screen Grabber.exe"
                                                                                          2⤵
                                                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                          • Checks BIOS information in registry
                                                                                          • Checks computer location settings
                                                                                          • Checks whether UAC is enabled
                                                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                          • Suspicious use of WriteProcessMemory
                                                                                          PID:3172
                                                                                          • C:\Users\Admin\AppData\Local\Temp\Screen grapper.exe
                                                                                            "C:\Users\Admin\AppData\Local\Temp\Screen grapper.exe"
                                                                                            3⤵
                                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                            • Checks BIOS information in registry
                                                                                            • Executes dropped EXE
                                                                                            • Checks whether UAC is enabled
                                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                            PID:2964
                                                                                            • C:\Windows\System32\Conhost.exe
                                                                                              \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                              4⤵
                                                                                                PID:5084
                                                                                            • C:\Users\Admin\AppData\Local\Temp\Screen graper.exe
                                                                                              "C:\Users\Admin\AppData\Local\Temp\Screen graper.exe"
                                                                                              3⤵
                                                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                              • Checks BIOS information in registry
                                                                                              • Checks computer location settings
                                                                                              • Executes dropped EXE
                                                                                              • Checks whether UAC is enabled
                                                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              • Suspicious use of WriteProcessMemory
                                                                                              PID:980
                                                                                              • C:\Users\Admin\AppData\Local\Temp\nrrnld2l.rio.exe
                                                                                                "C:\Users\Admin\AppData\Local\Temp\nrrnld2l.rio.exe"
                                                                                                4⤵
                                                                                                • Executes dropped EXE
                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                • Suspicious use of WriteProcessMemory
                                                                                                PID:708
                                                                                              • C:\Windows\SYSTEM32\SCHTASKS.exe
                                                                                                "SCHTASKS.exe" /create /tn "MasonScreen graper.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\Screen graper.exe'" /sc onlogon /rl HIGHEST
                                                                                                4⤵
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:1464
                                                                                              • C:\Windows\SYSTEM32\SCHTASKS.exe
                                                                                                "SCHTASKS.exe" /create /tn "MasonScreen graper.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\Screen graper.exe'" /sc onlogon /rl HIGHEST
                                                                                                4⤵
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:1832
                                                                                                • C:\Windows\System32\Conhost.exe
                                                                                                  \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                  5⤵
                                                                                                    PID:3720
                                                                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Screen graper.exe'
                                                                                                  4⤵
                                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                  PID:3008
                                                                                                  • C:\Windows\System32\Conhost.exe
                                                                                                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                    5⤵
                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                    PID:232
                                                                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Screen graper.exe'
                                                                                                  4⤵
                                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  PID:4140
                                                                                                  • C:\Windows\System32\Conhost.exe
                                                                                                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                    5⤵
                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                    PID:400
                                                                                          • C:\Windows\system32\svchost.exe
                                                                                            C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                                                                            1⤵
                                                                                              PID:3748
                                                                                            • C:\Windows\System32\RuntimeBroker.exe
                                                                                              C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                              1⤵
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:4080
                                                                                            • C:\Windows\System32\RuntimeBroker.exe
                                                                                              C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                              1⤵
                                                                                                PID:4104
                                                                                              • C:\Windows\system32\DllHost.exe
                                                                                                C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                1⤵
                                                                                                  PID:4336
                                                                                                • C:\Windows\System32\RuntimeBroker.exe
                                                                                                  C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                  1⤵
                                                                                                    PID:4624
                                                                                                  • C:\Windows\System32\svchost.exe
                                                                                                    C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                                    1⤵
                                                                                                      PID:2916
                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                      C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                                                                      1⤵
                                                                                                      • Modifies data under HKEY_USERS
                                                                                                      PID:4572
                                                                                                    • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                                                                                      "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                                                                                      1⤵
                                                                                                      • Drops file in System32 directory
                                                                                                      • Modifies data under HKEY_USERS
                                                                                                      PID:1584
                                                                                                    • C:\Windows\system32\SppExtComObj.exe
                                                                                                      C:\Windows\system32\SppExtComObj.exe -Embedding
                                                                                                      1⤵
                                                                                                        PID:4872
                                                                                                      • C:\Windows\System32\svchost.exe
                                                                                                        C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                                        1⤵
                                                                                                          PID:3988
                                                                                                        • C:\Windows\system32\svchost.exe
                                                                                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                                          1⤵
                                                                                                          • Modifies data under HKEY_USERS
                                                                                                          PID:4720
                                                                                                        • C:\Windows\system32\DllHost.exe
                                                                                                          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                          1⤵
                                                                                                            PID:8
                                                                                                          • C:\Windows\system32\svchost.exe
                                                                                                            C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc
                                                                                                            1⤵
                                                                                                              PID:4728
                                                                                                            • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe
                                                                                                              "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe" -ServerName:InputApp.AppXk0k6mrh4r2q0ct33a9wgbez0x7v9cz5y.mca
                                                                                                              1⤵
                                                                                                                PID:3536
                                                                                                              • C:\Windows\System32\WaaSMedicAgent.exe
                                                                                                                C:\Windows\System32\WaaSMedicAgent.exe 34cda96121fc08612769bea509a8912b jeBx4p2HikmEgec6TMiamw.0.1.0.0.0
                                                                                                                1⤵
                                                                                                                • Sets service image path in registry
                                                                                                                PID:1244
                                                                                                                • C:\Windows\System32\Conhost.exe
                                                                                                                  \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                  2⤵
                                                                                                                    PID:1216
                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
                                                                                                                  1⤵
                                                                                                                  • Drops file in Windows directory
                                                                                                                  PID:1484
                                                                                                                • C:\Windows\system32\wbem\wmiprvse.exe
                                                                                                                  C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                                  1⤵
                                                                                                                  • Checks BIOS information in registry
                                                                                                                  • Enumerates system info in registry
                                                                                                                  PID:4904
                                                                                                                • C:\Windows\servicing\TrustedInstaller.exe
                                                                                                                  C:\Windows\servicing\TrustedInstaller.exe
                                                                                                                  1⤵
                                                                                                                    PID:1624
                                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc
                                                                                                                    1⤵
                                                                                                                      PID:4568
                                                                                                                    • C:\Windows\System32\mousocoreworker.exe
                                                                                                                      C:\Windows\System32\mousocoreworker.exe -Embedding
                                                                                                                      1⤵
                                                                                                                      • Checks processor information in registry
                                                                                                                      • Enumerates system info in registry
                                                                                                                      • Modifies data under HKEY_USERS
                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                      PID:4588
                                                                                                                    • C:\Windows\system32\wbem\wmiprvse.exe
                                                                                                                      C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                                      1⤵
                                                                                                                        PID:2088

                                                                                                                      Network

                                                                                                                      MITRE ATT&CK Enterprise v15

                                                                                                                      Replay Monitor

                                                                                                                      Loading Replay Monitor...

                                                                                                                      Downloads

                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                                                        Filesize

                                                                                                                        2KB

                                                                                                                        MD5

                                                                                                                        f811272c20ff6decbbd16ff364334427

                                                                                                                        SHA1

                                                                                                                        cb31be66c972daa61d45920fa2fa824c1dfb194d

                                                                                                                        SHA256

                                                                                                                        730aff8c9e430a9f9e5e44f1c376e57f42fa5adc744824df2f69855009473592

                                                                                                                        SHA512

                                                                                                                        5c68bf3a41c3607cad5abe94f2bb3816f3e69426fa7d43bf7c9787c4e9ce6660b1843a2e505a22a93d7008b76fc564078513fe9ef47051e5b6fc344ab9d0a528

                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                        Filesize

                                                                                                                        21KB

                                                                                                                        MD5

                                                                                                                        5727e3261fc7217aedd89a52e2d3819b

                                                                                                                        SHA1

                                                                                                                        1015343a45938847253b960df254b7d7d091c5d7

                                                                                                                        SHA256

                                                                                                                        c968585d5a6a9affc666994e97cf8c36015629564096185aaa5d8a34875d0f2d

                                                                                                                        SHA512

                                                                                                                        97a3d05a69760f8fafad84e2f4d25b0901ddff2c3f75dd9a27d142440eae4cef8fae6923dc1a1f313b332a82390f99c27350b07af0fc6d507b2c6d86d4a0449e

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Screen graper.exe

                                                                                                                        Filesize

                                                                                                                        3.4MB

                                                                                                                        MD5

                                                                                                                        ee1b1507fadd2b79c5b603b3bb723de7

                                                                                                                        SHA1

                                                                                                                        7680b3815f5d1d4cf87ff85d6675f5891ddef7ff

                                                                                                                        SHA256

                                                                                                                        8dce11701ff3011f5cd463176c0fd14b32ecc7cedb3faff0cb9670f0fb77b1d7

                                                                                                                        SHA512

                                                                                                                        4db689cde9977ae06cc54f2c9ac5d090d4929235640e6f8bc73dc5851d318c5030642e4e2e27809b12d8ebdfbea77f0b27e42b878114485518c4b326ad8cf310

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Screen grapper.exe

                                                                                                                        Filesize

                                                                                                                        4.3MB

                                                                                                                        MD5

                                                                                                                        ddb6425342a0f3f10ad15f320e528b94

                                                                                                                        SHA1

                                                                                                                        edf799990c52f7b56cb5fcf00dbaa38d0b88278d

                                                                                                                        SHA256

                                                                                                                        16750da2372c396cab7baa949b80cbe5bfce2900849d0006ccd1a423166b8537

                                                                                                                        SHA512

                                                                                                                        420ca74797ca220b3eadb0e1ed0abf3901e897aff4caec7025fd3050a6c8f2866045992d004227bed8d23a58a214be774768c5f786c87190f5198a98f6c19b52

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_wuzmdmu3.m2h.ps1

                                                                                                                        Filesize

                                                                                                                        60B

                                                                                                                        MD5

                                                                                                                        d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                        SHA1

                                                                                                                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                        SHA256

                                                                                                                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                        SHA512

                                                                                                                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\nrrnld2l.rio.exe

                                                                                                                        Filesize

                                                                                                                        161KB

                                                                                                                        MD5

                                                                                                                        94f1ab3a068f83b32639579ec9c5d025

                                                                                                                        SHA1

                                                                                                                        38f3d5bc5de46feb8de093d11329766b8e2054ae

                                                                                                                        SHA256

                                                                                                                        879cc20b41635709bb304e315aaa5ca4708b480a1bfc2f4935fcf2215188efb0

                                                                                                                        SHA512

                                                                                                                        44d5236a804d63302b21ca25ebc148a64605508d03c990a244c44ceb8630849da0510b7b2d0bee72e01ca6681e2d86d7e6aee8847674a26f0028d149b9abee0c

                                                                                                                      • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Maintenance Work

                                                                                                                        Filesize

                                                                                                                        3KB

                                                                                                                        MD5

                                                                                                                        4838ee953dab2c7a1bf57e0c6620a79d

                                                                                                                        SHA1

                                                                                                                        8c39cd200f9ffa77739ff686036d0449984f1323

                                                                                                                        SHA256

                                                                                                                        22c798e00c4793749eac39cfb6ea3dd75112fd4453a3706e839038a64504d45d

                                                                                                                        SHA512

                                                                                                                        066782b16e6e580e2861013c530d22d62c5ba0f217428cc0228ad45b855e979a86d2d04f553f3751cf7d063c6863cb7ea9c86807e7f89c7e0ae12481af65af76

                                                                                                                      • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Maintenance Work

                                                                                                                        Filesize

                                                                                                                        3KB

                                                                                                                        MD5

                                                                                                                        8e64ab95d5d2c4c1e7a757624cb1fffa

                                                                                                                        SHA1

                                                                                                                        9889f93ad60bacb07683b4a23c40aa32954646d8

                                                                                                                        SHA256

                                                                                                                        dff8902430dcae2fba05fc7f54157c4bc8a7445ed488c1d5727947a0c07075d6

                                                                                                                        SHA512

                                                                                                                        3ecc166686c1d7d61e91ec972244118980bf626a88123b87136695ac206e159933ad9f9feb3fd565713dd5d99038f427b845637c51a57497f0ac716de3a7973c

                                                                                                                      • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Wake To Work

                                                                                                                        Filesize

                                                                                                                        3KB

                                                                                                                        MD5

                                                                                                                        c6086d02f8ce044f5fa07a98303dc7eb

                                                                                                                        SHA1

                                                                                                                        6116247e9d098b276b476c9f4c434f55d469129c

                                                                                                                        SHA256

                                                                                                                        8901d9c9aea465da4ea7aa874610a90b8cf0a71eba0e321cf9675fceee0b54a0

                                                                                                                        SHA512

                                                                                                                        1876d8fc1a8ac83aadb725100ea7a1791bd62d4d0edc1b78802e0bffe458f309a66dc97e1b9da60dd52b8cb80bf471ccb5f8480e6192c9eb2a13eac36462d27a

                                                                                                                      • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Wake To Work

                                                                                                                        Filesize

                                                                                                                        3KB

                                                                                                                        MD5

                                                                                                                        39b9eb9d1a56bc1792c844c425bd1dec

                                                                                                                        SHA1

                                                                                                                        db5a91082fa14eeb6550cbc994d34ebd95341df9

                                                                                                                        SHA256

                                                                                                                        acade97e8a1d30477d0dc3fdfea70c2c617c369b56115ec708ed8a2cfdbc3692

                                                                                                                        SHA512

                                                                                                                        255b1c1c456b20e6e3415540ef8af58e723f965d1fa782da44a6bbc81b43d8a31c5681777ba885f91ed2dae480bc2a4023e01fe2986857b13323f0459520eb51

                                                                                                                      • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Work

                                                                                                                        Filesize

                                                                                                                        2KB

                                                                                                                        MD5

                                                                                                                        a9124c4c97cba8a07a8204fac1696c8e

                                                                                                                        SHA1

                                                                                                                        1f27d80280e03762c7b16781608786f5a98ff434

                                                                                                                        SHA256

                                                                                                                        8ad3d28aeff847bc5fb8035cbc7c71e88a4ee547821a8e1a3ea6661ee6014b21

                                                                                                                        SHA512

                                                                                                                        537caaa75ac1e257c6b247f9680c3b9e79156ea1bcb3f1326e969a774db33b3c906800813ca6f79369c799a62f4260c91c6dd9a6cace3af25b7dbea5a73e0392

                                                                                                                      • memory/324-84-0x000001D7075C0000-0x000001D7075EB000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        172KB

                                                                                                                      • memory/324-85-0x00007FF9B4830000-0x00007FF9B4840000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        64KB

                                                                                                                      • memory/408-97-0x00007FF9B4830000-0x00007FF9B4840000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        64KB

                                                                                                                      • memory/408-96-0x000001B713130000-0x000001B71315B000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        172KB

                                                                                                                      • memory/476-99-0x00000205D7F40000-0x00000205D7F6B000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        172KB

                                                                                                                      • memory/476-100-0x00007FF9B4830000-0x00007FF9B4840000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        64KB

                                                                                                                      • memory/624-73-0x00007FF9B4830000-0x00007FF9B4840000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        64KB

                                                                                                                      • memory/624-72-0x00000251F5C30000-0x00000251F5C5B000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        172KB

                                                                                                                      • memory/624-71-0x00000251F5BA0000-0x00000251F5BC5000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        148KB

                                                                                                                      • memory/676-76-0x000001D51F920000-0x000001D51F94B000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        172KB

                                                                                                                      • memory/676-77-0x00007FF9B4830000-0x00007FF9B4840000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        64KB

                                                                                                                      • memory/708-69-0x00007FF9F47B0000-0x00007FF9F49A8000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        2.0MB

                                                                                                                      • memory/708-70-0x00007FF9F2BA0000-0x00007FF9F2C5D000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        756KB

                                                                                                                      • memory/876-90-0x00000125AFC00000-0x00000125AFC2B000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        172KB

                                                                                                                      • memory/876-91-0x00007FF9B4830000-0x00007FF9B4840000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        64KB

                                                                                                                      • memory/956-81-0x00007FF9B4830000-0x00007FF9B4840000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        64KB

                                                                                                                      • memory/956-80-0x0000028338BD0000-0x0000028338BFB000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        172KB

                                                                                                                      • memory/980-55-0x0000000000EF0000-0x0000000001802000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        9.1MB

                                                                                                                      • memory/980-45-0x0000000000EF0000-0x0000000001802000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        9.1MB

                                                                                                                      • memory/980-48-0x0000000075BB0000-0x0000000075CA0000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        960KB

                                                                                                                      • memory/980-351-0x0000000003D20000-0x0000000003D36000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        88KB

                                                                                                                      • memory/980-490-0x0000000000EF0000-0x0000000001802000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        9.1MB

                                                                                                                      • memory/980-54-0x0000000000EF0000-0x0000000001802000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        9.1MB

                                                                                                                      • memory/980-502-0x0000000075BB0000-0x0000000075CA0000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        960KB

                                                                                                                      • memory/980-56-0x0000000006000000-0x0000000006092000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        584KB

                                                                                                                      • memory/980-57-0x0000000003D80000-0x0000000003DAC000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        176KB

                                                                                                                      • memory/1028-102-0x000002B97F940000-0x000002B97F96B000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        172KB

                                                                                                                      • memory/1028-103-0x00007FF9B4830000-0x00007FF9B4840000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        64KB

                                                                                                                      • memory/1108-106-0x00007FF9B4830000-0x00007FF9B4840000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        64KB

                                                                                                                      • memory/1108-105-0x00000293E1160000-0x00000293E118B000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        172KB

                                                                                                                      • memory/1180-108-0x000001C309DD0000-0x000001C309DFB000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        172KB

                                                                                                                      • memory/1180-109-0x00007FF9B4830000-0x00007FF9B4840000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        64KB

                                                                                                                      • memory/1228-118-0x000002619CA80000-0x000002619CAAB000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        172KB

                                                                                                                      • memory/1228-119-0x00007FF9B4830000-0x00007FF9B4840000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        64KB

                                                                                                                      • memory/1252-122-0x00007FF9B4830000-0x00007FF9B4840000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        64KB

                                                                                                                      • memory/1252-121-0x000001FB4C370000-0x000001FB4C39B000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        172KB

                                                                                                                      • memory/1260-124-0x00000154E4B90000-0x00000154E4BBB000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        172KB

                                                                                                                      • memory/1260-125-0x00007FF9B4830000-0x00007FF9B4840000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        64KB

                                                                                                                      • memory/1312-127-0x000002BCF1490000-0x000002BCF14BB000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        172KB

                                                                                                                      • memory/1312-128-0x00007FF9B4830000-0x00007FF9B4840000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        64KB

                                                                                                                      • memory/1456-130-0x0000024A0EBB0000-0x0000024A0EBDB000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        172KB

                                                                                                                      • memory/1456-131-0x00007FF9B4830000-0x00007FF9B4840000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        64KB

                                                                                                                      • memory/2964-342-0x00000000005C0000-0x0000000001448000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        14.5MB

                                                                                                                      • memory/2964-344-0x0000000010000000-0x000000001001C000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        112KB

                                                                                                                      • memory/2964-454-0x00000000005C0000-0x0000000001448000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        14.5MB

                                                                                                                      • memory/2964-40-0x00000000005C0000-0x0000000001448000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        14.5MB

                                                                                                                      • memory/2964-359-0x0000000006DE0000-0x0000000007137000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        3.3MB

                                                                                                                      • memory/2964-358-0x0000000006DB0000-0x0000000006DD2000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        136KB

                                                                                                                      • memory/2964-347-0x0000000005A50000-0x0000000005B02000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        712KB

                                                                                                                      • memory/2964-341-0x00000000005C0000-0x0000000001448000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        14.5MB

                                                                                                                      • memory/2964-345-0x00000000037C0000-0x00000000037DA000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        104KB

                                                                                                                      • memory/3008-390-0x0000000005B60000-0x0000000005BAC000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        304KB

                                                                                                                      • memory/3008-391-0x00000000060D0000-0x0000000006102000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        200KB

                                                                                                                      • memory/3008-431-0x00000000070A0000-0x0000000007136000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        600KB

                                                                                                                      • memory/3008-406-0x0000000006E90000-0x0000000006E9A000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        40KB

                                                                                                                      • memory/3008-405-0x0000000006E20000-0x0000000006E3A000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        104KB

                                                                                                                      • memory/3008-404-0x0000000007470000-0x0000000007AEA000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        6.5MB

                                                                                                                      • memory/3008-376-0x0000000004460000-0x0000000004496000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        216KB

                                                                                                                      • memory/3008-377-0x0000000004B70000-0x000000000523A000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        6.8MB

                                                                                                                      • memory/3008-403-0x0000000006D00000-0x0000000006DA3000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        652KB

                                                                                                                      • memory/3008-383-0x00000000053F0000-0x0000000005456000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        408KB

                                                                                                                      • memory/3008-384-0x00000000054D0000-0x0000000005536000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        408KB

                                                                                                                      • memory/3008-389-0x0000000005AB0000-0x0000000005ACE000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        120KB

                                                                                                                      • memory/3008-402-0x0000000006110000-0x000000000612E000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        120KB

                                                                                                                      • memory/3008-392-0x000000006F9C0000-0x000000006FA0C000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        304KB

                                                                                                                      • memory/3172-10-0x00000000004A0000-0x000000000151A000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        16.5MB

                                                                                                                      • memory/3172-27-0x0000000075BB0000-0x0000000075CA0000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        960KB

                                                                                                                      • memory/3172-47-0x0000000075BB0000-0x0000000075CA0000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        960KB

                                                                                                                      • memory/3172-26-0x00000000004A0000-0x000000000151A000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        16.5MB

                                                                                                                      • memory/3172-12-0x0000000005FF0000-0x000000000608C000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        624KB

                                                                                                                      • memory/3172-50-0x0000000075BB0000-0x0000000075CA0000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        960KB

                                                                                                                      • memory/3172-11-0x00000000004A0000-0x000000000151A000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        16.5MB

                                                                                                                      • memory/3172-44-0x0000000075BD0000-0x0000000075BD1000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        4KB

                                                                                                                      • memory/3172-7-0x0000000075BB0000-0x0000000075CA0000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        960KB

                                                                                                                      • memory/3172-49-0x00000000004A0000-0x000000000151A000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        16.5MB

                                                                                                                      • memory/3172-5-0x0000000075BB0000-0x0000000075CA0000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        960KB

                                                                                                                      • memory/3172-6-0x0000000075BB0000-0x0000000075CA0000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        960KB

                                                                                                                      • memory/3172-0-0x00000000004A0000-0x000000000151A000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        16.5MB

                                                                                                                      • memory/3172-3-0x0000000075BB0000-0x0000000075CA0000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        960KB

                                                                                                                      • memory/3172-4-0x0000000075BB0000-0x0000000075CA0000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        960KB

                                                                                                                      • memory/3172-1-0x0000000075BD0000-0x0000000075BD1000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        4KB

                                                                                                                      • memory/3172-2-0x0000000075BB0000-0x0000000075CA0000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        960KB

                                                                                                                      • memory/4140-503-0x000000006F9C0000-0x000000006FA0C000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        304KB