Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-01-2025 15:23

General

  • Target

    XWorm RAT V2.1.exe

  • Size

    335KB

  • MD5

    2e01c152b22c13fb946c204b6875a2d8

  • SHA1

    20f7a049f779623a11b4fbfb300c1f7a380fb33b

  • SHA256

    3db6003aed5663530344f627592d7071efcece6ab608d114cd219d5b19f389a5

  • SHA512

    80dc80d22ecb90d3c58c40e112de882548a1d933937d851993af4e6a92746900283770bd09d88047bd79fa053600113d1f9bb42a6af5beefe00b3ee15d4e7310

  • SSDEEP

    6144:MEbVUO1x/5bTgVziHzZnSKrCbYMJAbB8+q:lr/5/gVziHlBrCbYx83

Malware Config

Extracted

Family

xworm

Mutex

yNحكـX8ٍبAGLWِF6Jo2DiObلٍLZا3ا

Attributes
  • Install_directory

    %Port%

  • install_file

    MicrosoftEdgeUpdateTaskMachineUAC.exe

aes.plain

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Indicator Removal: Clear Windows Event Logs 1 TTPs 1 IoCs

    Clear Windows Event Logs to hide the activity of an intrusion.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 17 IoCs
  • Drops file in Windows directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Checks SCSI registry key(s) 3 TTPs 30 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 11 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 7 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 20 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:608
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        2⤵
          PID:60
          • C:\Windows\system32\WerFault.exe
            C:\Windows\system32\WerFault.exe -u -p 60 -s 3888
            3⤵
            • Checks processor information in registry
            • Enumerates system info in registry
            • Suspicious behavior: EnumeratesProcesses
            PID:4020
        • C:\Windows\system32\dwm.exe
          "dwm.exe"
          2⤵
          • Checks SCSI registry key(s)
          • Enumerates system info in registry
          • Modifies data under HKEY_USERS
          • Suspicious use of AdjustPrivilegeToken
          PID:1576
      • C:\Windows\system32\lsass.exe
        C:\Windows\system32\lsass.exe
        1⤵
        • Drops file in System32 directory
        • Suspicious use of WriteProcessMemory
        PID:672
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
        1⤵
          PID:960
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
          1⤵
            PID:736
          • C:\Windows\System32\svchost.exe
            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
            1⤵
              PID:1004
            • C:\Windows\system32\svchost.exe
              C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
              1⤵
                PID:1104
              • C:\Windows\System32\svchost.exe
                C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                1⤵
                  PID:1116
                • C:\Windows\System32\svchost.exe
                  C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                  1⤵
                  • Indicator Removal: Clear Windows Event Logs
                  PID:1140
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                  1⤵
                  • Drops file in System32 directory
                  PID:1200
                  • C:\Windows\system32\taskhostw.exe
                    taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                    2⤵
                      PID:2684
                    • C:\Windows\system32\MusNotification.exe
                      C:\Windows\system32\MusNotification.exe
                      2⤵
                      • Checks processor information in registry
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1644
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                    1⤵
                      PID:1272
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                      1⤵
                        PID:1280
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                        1⤵
                          PID:1336
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                          1⤵
                            PID:1448
                            • C:\Windows\system32\sihost.exe
                              sihost.exe
                              2⤵
                                PID:2528
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                              1⤵
                                PID:1464
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                                1⤵
                                  PID:1596
                                • C:\Windows\System32\svchost.exe
                                  C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                  1⤵
                                    PID:1604
                                  • C:\Windows\System32\svchost.exe
                                    C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                                    1⤵
                                      PID:1636
                                    • C:\Windows\system32\svchost.exe
                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                      1⤵
                                        PID:1724
                                      • C:\Windows\System32\svchost.exe
                                        C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                        1⤵
                                          PID:1764
                                        • C:\Windows\System32\svchost.exe
                                          C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm
                                          1⤵
                                            PID:1772
                                          • C:\Windows\System32\svchost.exe
                                            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                            1⤵
                                              PID:1844
                                            • C:\Windows\system32\svchost.exe
                                              C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                              1⤵
                                                PID:1976
                                              • C:\Windows\system32\svchost.exe
                                                C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache
                                                1⤵
                                                  PID:2000
                                                • C:\Windows\System32\svchost.exe
                                                  C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                  1⤵
                                                    PID:2008
                                                  • C:\Windows\System32\svchost.exe
                                                    C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                    1⤵
                                                      PID:1672
                                                    • C:\Windows\system32\svchost.exe
                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                      1⤵
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:1800
                                                    • C:\Windows\System32\spoolsv.exe
                                                      C:\Windows\System32\spoolsv.exe
                                                      1⤵
                                                        PID:2068
                                                      • C:\Windows\System32\svchost.exe
                                                        C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                        1⤵
                                                          PID:2216
                                                        • C:\Windows\System32\svchost.exe
                                                          C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                          1⤵
                                                            PID:2316
                                                          • C:\Windows\system32\svchost.exe
                                                            C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                            1⤵
                                                              PID:2500
                                                            • C:\Windows\system32\svchost.exe
                                                              C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                              1⤵
                                                                PID:2656
                                                              • C:\Windows\system32\svchost.exe
                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker
                                                                1⤵
                                                                  PID:2664
                                                                • C:\Windows\system32\svchost.exe
                                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                                  1⤵
                                                                    PID:2672
                                                                  • C:\Windows\system32\svchost.exe
                                                                    C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc
                                                                    1⤵
                                                                    • Drops file in System32 directory
                                                                    PID:2852
                                                                  • C:\Windows\system32\svchost.exe
                                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                                    1⤵
                                                                    • Enumerates connected drives
                                                                    PID:2900
                                                                  • C:\Windows\sysmon.exe
                                                                    C:\Windows\sysmon.exe
                                                                    1⤵
                                                                      PID:2920
                                                                    • C:\Windows\System32\svchost.exe
                                                                      C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                                      1⤵
                                                                        PID:2952
                                                                      • C:\Windows\system32\svchost.exe
                                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                                        1⤵
                                                                          PID:2968
                                                                        • C:\Windows\system32\wbem\unsecapp.exe
                                                                          C:\Windows\system32\wbem\unsecapp.exe -Embedding
                                                                          1⤵
                                                                            PID:3156
                                                                          • C:\Windows\system32\svchost.exe
                                                                            C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
                                                                            1⤵
                                                                              PID:3264
                                                                            • C:\Windows\Explorer.EXE
                                                                              C:\Windows\Explorer.EXE
                                                                              1⤵
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              • Suspicious use of FindShellTrayWindow
                                                                              • Suspicious use of SendNotifyMessage
                                                                              PID:3516
                                                                              • C:\Users\Admin\AppData\Local\Temp\XWorm RAT V2.1.exe
                                                                                "C:\Users\Admin\AppData\Local\Temp\XWorm RAT V2.1.exe"
                                                                                2⤵
                                                                                • Checks computer location settings
                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                • Suspicious use of WriteProcessMemory
                                                                                PID:4300
                                                                                • C:\Users\Admin\AppData\Local\Temp\zo5vr202.etf.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\zo5vr202.etf.exe"
                                                                                  3⤵
                                                                                  • Executes dropped EXE
                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  • Suspicious use of WriteProcessMemory
                                                                                  PID:4904
                                                                                • C:\Windows\SYSTEM32\SCHTASKS.exe
                                                                                  "SCHTASKS.exe" /create /tn "MasonXWorm RAT V2.1.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\XWorm RAT V2.1.exe'" /sc onlogon /rl HIGHEST
                                                                                  3⤵
                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                  PID:2432
                                                                                • C:\Windows\SYSTEM32\SCHTASKS.exe
                                                                                  "SCHTASKS.exe" /create /tn "MasonXWorm RAT V2.1.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\XWorm RAT V2.1.exe'" /sc onlogon /rl HIGHEST
                                                                                  3⤵
                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                  PID:1184
                                                                                  • C:\Windows\System32\Conhost.exe
                                                                                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                    4⤵
                                                                                      PID:2332
                                                                                  • C:\Windows\SYSTEM32\netsh.exe
                                                                                    netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\XWorm RAT V2.1.exe" "XWorm RAT V2.1.exe" ENABLE
                                                                                    3⤵
                                                                                    • Modifies Windows Firewall
                                                                                    • Event Triggered Execution: Netsh Helper DLL
                                                                                    PID:1408
                                                                                    • C:\Windows\System32\Conhost.exe
                                                                                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                      4⤵
                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                      PID:928
                                                                              • C:\Windows\system32\svchost.exe
                                                                                C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                                                                1⤵
                                                                                  PID:3640
                                                                                • C:\Windows\system32\DllHost.exe
                                                                                  C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                  1⤵
                                                                                    PID:3820
                                                                                  • C:\Windows\System32\RuntimeBroker.exe
                                                                                    C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                    1⤵
                                                                                      PID:3984
                                                                                    • C:\Windows\System32\RuntimeBroker.exe
                                                                                      C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                      1⤵
                                                                                      • Suspicious use of UnmapMainImage
                                                                                      PID:3708
                                                                                    • C:\Windows\system32\svchost.exe
                                                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                      1⤵
                                                                                      • Drops file in System32 directory
                                                                                      • Checks SCSI registry key(s)
                                                                                      • Modifies data under HKEY_USERS
                                                                                      PID:4952
                                                                                    • C:\Windows\System32\svchost.exe
                                                                                      C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                      1⤵
                                                                                        PID:3876
                                                                                      • C:\Windows\system32\svchost.exe
                                                                                        C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV
                                                                                        1⤵
                                                                                          PID:4080
                                                                                        • C:\Windows\system32\svchost.exe
                                                                                          C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                                                          1⤵
                                                                                          • Modifies data under HKEY_USERS
                                                                                          PID:2568
                                                                                        • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                                                                          "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                                                                          1⤵
                                                                                          • Drops file in System32 directory
                                                                                          • Modifies data under HKEY_USERS
                                                                                          PID:4340
                                                                                        • C:\Windows\system32\SppExtComObj.exe
                                                                                          C:\Windows\system32\SppExtComObj.exe -Embedding
                                                                                          1⤵
                                                                                            PID:1332
                                                                                          • C:\Windows\System32\svchost.exe
                                                                                            C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                            1⤵
                                                                                              PID:2292
                                                                                            • C:\Windows\system32\DllHost.exe
                                                                                              C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                              1⤵
                                                                                                PID:456
                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc
                                                                                                1⤵
                                                                                                  PID:4592
                                                                                                • C:\Windows\System32\RuntimeBroker.exe
                                                                                                  C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                  1⤵
                                                                                                    PID:1680
                                                                                                  • C:\Windows\System32\svchost.exe
                                                                                                    C:\Windows\System32\svchost.exe -k WerSvcGroup
                                                                                                    1⤵
                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                    PID:4736
                                                                                                  • C:\Windows\system32\backgroundTaskHost.exe
                                                                                                    "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:ShellFeedsUI.AppXnj65k2d1a1rnztt2t2nng5ctmk3e76pn.mca
                                                                                                    1⤵
                                                                                                      PID:4968
                                                                                                    • C:\Windows\System32\WaaSMedicAgent.exe
                                                                                                      C:\Windows\System32\WaaSMedicAgent.exe 3237f405ca8836bb014e06aee68fd246 qybXCJmwSEu1ZKPOZ5lAPA.0.1.0.0.0
                                                                                                      1⤵
                                                                                                      • Sets service image path in registry
                                                                                                      • Modifies data under HKEY_USERS
                                                                                                      PID:2704
                                                                                                      • C:\Windows\System32\Conhost.exe
                                                                                                        \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                        2⤵
                                                                                                          PID:4348
                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
                                                                                                        1⤵
                                                                                                        • Drops file in Windows directory
                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                        PID:1620
                                                                                                      • C:\Windows\system32\wbem\wmiprvse.exe
                                                                                                        C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                        1⤵
                                                                                                        • Checks BIOS information in registry
                                                                                                        • Writes to the Master Boot Record (MBR)
                                                                                                        • Checks SCSI registry key(s)
                                                                                                        • Enumerates system info in registry
                                                                                                        PID:1588
                                                                                                      • C:\Windows\servicing\TrustedInstaller.exe
                                                                                                        C:\Windows\servicing\TrustedInstaller.exe
                                                                                                        1⤵
                                                                                                        • Drops file in Windows directory
                                                                                                        PID:1184
                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc
                                                                                                        1⤵
                                                                                                          PID:1832
                                                                                                        • C:\Windows\System32\mousocoreworker.exe
                                                                                                          C:\Windows\System32\mousocoreworker.exe -Embedding
                                                                                                          1⤵
                                                                                                          • Checks processor information in registry
                                                                                                          • Enumerates system info in registry
                                                                                                          • Modifies data under HKEY_USERS
                                                                                                          PID:4612
                                                                                                        • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
                                                                                                          C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
                                                                                                          1⤵
                                                                                                            PID:4992

                                                                                                          Network

                                                                                                          MITRE ATT&CK Enterprise v15

                                                                                                          Replay Monitor

                                                                                                          Loading Replay Monitor...

                                                                                                          Downloads

                                                                                                          • C:\ProgramData\Microsoft\Windows\WER\Temp\WER79E3.tmp.csv

                                                                                                            Filesize

                                                                                                            36KB

                                                                                                            MD5

                                                                                                            df1d903d2558741157f4517933acb25d

                                                                                                            SHA1

                                                                                                            e6e7b085e7c969620c91a2192b16f50aaad2e95c

                                                                                                            SHA256

                                                                                                            98fea8683cea667984b9517421ac1df33455633d71499b2497fa4fe878f67859

                                                                                                            SHA512

                                                                                                            5233ca2eed71309388f3c6031324e47fec6d98700d67c19b977d024425573a16d8a76634e476c48cd9e248b0430540acbfbb3d1a8fd3470b3c1156fa9a555f82

                                                                                                          • C:\ProgramData\Microsoft\Windows\WER\Temp\WER7A03.tmp.txt

                                                                                                            Filesize

                                                                                                            13KB

                                                                                                            MD5

                                                                                                            cee9a13c4ff268998f1f544e7da70223

                                                                                                            SHA1

                                                                                                            f317ffdd71ec466ac921e2a10d69573e0bada2a9

                                                                                                            SHA256

                                                                                                            3f6c70579c4a554c3cfe757ed856179effc71ed86c02a22aa11dc167668c21f1

                                                                                                            SHA512

                                                                                                            f8058b89bfe12b557b69ed8874b5aac15783265c917cf8aad664edeeee16d6168cea03c0a49af1bf2876441b5a2438f99136807cc653c54d771a3e9256d52699

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\zo5vr202.etf.exe

                                                                                                            Filesize

                                                                                                            161KB

                                                                                                            MD5

                                                                                                            94f1ab3a068f83b32639579ec9c5d025

                                                                                                            SHA1

                                                                                                            38f3d5bc5de46feb8de093d11329766b8e2054ae

                                                                                                            SHA256

                                                                                                            879cc20b41635709bb304e315aaa5ca4708b480a1bfc2f4935fcf2215188efb0

                                                                                                            SHA512

                                                                                                            44d5236a804d63302b21ca25ebc148a64605508d03c990a244c44ceb8630849da0510b7b2d0bee72e01ca6681e2d86d7e6aee8847674a26f0028d149b9abee0c

                                                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\S-1-5-21-3227495264-2217614367-4027411560-1000\Preferred

                                                                                                            Filesize

                                                                                                            24B

                                                                                                            MD5

                                                                                                            7d3760b3965ec2554a31a17195612b43

                                                                                                            SHA1

                                                                                                            60002aa63ff1e10c88d8c0c5bd66242dd70014d0

                                                                                                            SHA256

                                                                                                            bfa2cc537b3b23f64b8d83885b17952fbbe20028ad0857c43b15d0215a4c491d

                                                                                                            SHA512

                                                                                                            b1f8ca4789a09a683dc773810a36883343de183d059e2e4e4d38b28feebeecb1af54ded1bb766d85ebd125e4ad9b37eb109f10a8c89c8296b02596982e4d772f

                                                                                                          • C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\Preferred

                                                                                                            Filesize

                                                                                                            24B

                                                                                                            MD5

                                                                                                            bb772515f879993a3a4acfd5cb195337

                                                                                                            SHA1

                                                                                                            dc0f4f676fd5beddf01c30c70821bf674ad5daee

                                                                                                            SHA256

                                                                                                            0c23fc0a07066a713b24fe52a3950615df54c67adf65495307452dc4141ff74d

                                                                                                            SHA512

                                                                                                            87cc49aba1cb9cc07fa41362980c032027a537989062f36f9f5f7ee8881ae772905589eeab8c30e5d09ab75606fc2a88e559f5073a935c362acd6e14ae456fc0

                                                                                                          • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Maintenance Work

                                                                                                            Filesize

                                                                                                            2KB

                                                                                                            MD5

                                                                                                            8abf2d6067c6f3191a015f84aa9b6efe

                                                                                                            SHA1

                                                                                                            98f2b0a5cdb13cd3d82dc17bd43741bf0b3496f7

                                                                                                            SHA256

                                                                                                            ee18bd3259f220c41062abcbe71a421da3e910df11b9f86308a16cdc3a66fbea

                                                                                                            SHA512

                                                                                                            c2d686a6373efcff583c1ef50c144c59addb8b9c4857ccd8565cd8be3c94b0ac0273945167eb04ebd40dfb0351e4b66cffe4c4e478fb7733714630a11f765b63

                                                                                                          • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Maintenance Work

                                                                                                            Filesize

                                                                                                            2KB

                                                                                                            MD5

                                                                                                            f313c5b4f95605026428425586317353

                                                                                                            SHA1

                                                                                                            06be66fa06e1cffc54459c38d3d258f46669d01a

                                                                                                            SHA256

                                                                                                            129d0b993cd3858af5b7e87fdf74d8e59e6f2110184b5c905df8f5f6f2c39d8b

                                                                                                            SHA512

                                                                                                            b87a829c86eff1d10e1590b18a9909f05101a535e5f4cef914a4192956eb35a8bfef614c9f95d53783d77571687f3eb3c4e8ee2f24d23ad24e0976d8266b8890

                                                                                                          • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Wake To Work

                                                                                                            Filesize

                                                                                                            2KB

                                                                                                            MD5

                                                                                                            7d612892b20e70250dbd00d0cdd4f09b

                                                                                                            SHA1

                                                                                                            63251cfa4e5d6cbf6fb14f6d8a7407dbe763d3f5

                                                                                                            SHA256

                                                                                                            727c9e7b91e144e453d5b32e18f12508ee84dabe71bc852941d9c9b4923f9e02

                                                                                                            SHA512

                                                                                                            f8d481f3300947d49ce5ab988a9d4e3154746afccc97081cbed1135ffb24fc107203d485dda2d5d714e74e752c614d8cfd16781ea93450fe782ffae3f77066d1

                                                                                                          • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Work

                                                                                                            Filesize

                                                                                                            2KB

                                                                                                            MD5

                                                                                                            0b990e24f1e839462c0ac35fef1d119e

                                                                                                            SHA1

                                                                                                            9e17905f8f68f9ce0a2024d57b537aa8b39c6708

                                                                                                            SHA256

                                                                                                            a1106ed0845cd438e074344e0fe296dc10ee121a0179e09398eaaea2357c614a

                                                                                                            SHA512

                                                                                                            c65ba42fc0a2cb0b70888beb8ca334f7d5a8eaf954a5ef7adaecbcb4ce8d61b34858dfd9560954f95f59b4d8110a79ceaa39088b6a0caf8b42ceda41b46ec4a4

                                                                                                          • C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

                                                                                                            Filesize

                                                                                                            404B

                                                                                                            MD5

                                                                                                            40b8f24087ec1670ccf5fe87c834094b

                                                                                                            SHA1

                                                                                                            c2c57ea9f8c567fc99a13d80f7033100e497577b

                                                                                                            SHA256

                                                                                                            d7a6c8c29f64f02367804e2f41594a8a06bf86c8d3021f4bf049271a54e337d4

                                                                                                            SHA512

                                                                                                            463947b37f851fda78ab06cfb3da82a35c736f5aa3c9ecdd4b70a02620d677d5f5e0f0adbdbff141486e6ed81c2a8504b81a5d8d731210887bf92b1921698fe8

                                                                                                          • memory/60-23-0x000002CCB3C50000-0x000002CCB3C7B000-memory.dmp

                                                                                                            Filesize

                                                                                                            172KB

                                                                                                          • memory/60-287-0x00007FFA6AF6C000-0x00007FFA6AF6D000-memory.dmp

                                                                                                            Filesize

                                                                                                            4KB

                                                                                                          • memory/60-28-0x00007FFA6AF6D000-0x00007FFA6AF6E000-memory.dmp

                                                                                                            Filesize

                                                                                                            4KB

                                                                                                          • memory/60-29-0x00007FFA6AF6F000-0x00007FFA6AF70000-memory.dmp

                                                                                                            Filesize

                                                                                                            4KB

                                                                                                          • memory/60-27-0x000002CCB3C50000-0x000002CCB3C7B000-memory.dmp

                                                                                                            Filesize

                                                                                                            172KB

                                                                                                          • memory/608-25-0x00007FFA6AF6D000-0x00007FFA6AF6E000-memory.dmp

                                                                                                            Filesize

                                                                                                            4KB

                                                                                                          • memory/608-24-0x00000218676D0000-0x00000218676FB000-memory.dmp

                                                                                                            Filesize

                                                                                                            172KB

                                                                                                          • memory/608-15-0x00007FFA2AF50000-0x00007FFA2AF60000-memory.dmp

                                                                                                            Filesize

                                                                                                            64KB

                                                                                                          • memory/608-13-0x00000218676A0000-0x00000218676C5000-memory.dmp

                                                                                                            Filesize

                                                                                                            148KB

                                                                                                          • memory/608-14-0x00000218676D0000-0x00000218676FB000-memory.dmp

                                                                                                            Filesize

                                                                                                            172KB

                                                                                                          • memory/672-26-0x000002281F960000-0x000002281F98B000-memory.dmp

                                                                                                            Filesize

                                                                                                            172KB

                                                                                                          • memory/672-18-0x000002281F960000-0x000002281F98B000-memory.dmp

                                                                                                            Filesize

                                                                                                            172KB

                                                                                                          • memory/672-19-0x00007FFA2AF50000-0x00007FFA2AF60000-memory.dmp

                                                                                                            Filesize

                                                                                                            64KB

                                                                                                          • memory/736-357-0x000001F205960000-0x000001F20598B000-memory.dmp

                                                                                                            Filesize

                                                                                                            172KB

                                                                                                          • memory/736-37-0x00007FFA2AF50000-0x00007FFA2AF60000-memory.dmp

                                                                                                            Filesize

                                                                                                            64KB

                                                                                                          • memory/736-36-0x000001F205960000-0x000001F20598B000-memory.dmp

                                                                                                            Filesize

                                                                                                            172KB

                                                                                                          • memory/736-39-0x000001F205960000-0x000001F20598B000-memory.dmp

                                                                                                            Filesize

                                                                                                            172KB

                                                                                                          • memory/960-34-0x00007FFA6AF6C000-0x00007FFA6AF6D000-memory.dmp

                                                                                                            Filesize

                                                                                                            4KB

                                                                                                          • memory/960-354-0x0000017C665D0000-0x0000017C665FB000-memory.dmp

                                                                                                            Filesize

                                                                                                            172KB

                                                                                                          • memory/960-33-0x0000017C665D0000-0x0000017C665FB000-memory.dmp

                                                                                                            Filesize

                                                                                                            172KB

                                                                                                          • memory/960-30-0x0000017C665D0000-0x0000017C665FB000-memory.dmp

                                                                                                            Filesize

                                                                                                            172KB

                                                                                                          • memory/960-31-0x00007FFA2AF50000-0x00007FFA2AF60000-memory.dmp

                                                                                                            Filesize

                                                                                                            64KB

                                                                                                          • memory/1004-97-0x000002806A8E0000-0x000002806A90B000-memory.dmp

                                                                                                            Filesize

                                                                                                            172KB

                                                                                                          • memory/1004-466-0x000002806A8E0000-0x000002806A90B000-memory.dmp

                                                                                                            Filesize

                                                                                                            172KB

                                                                                                          • memory/1104-55-0x00007FFA2AF50000-0x00007FFA2AF60000-memory.dmp

                                                                                                            Filesize

                                                                                                            64KB

                                                                                                          • memory/1104-426-0x0000018690F40000-0x0000018690F6B000-memory.dmp

                                                                                                            Filesize

                                                                                                            172KB

                                                                                                          • memory/1104-90-0x0000018690F40000-0x0000018690F6B000-memory.dmp

                                                                                                            Filesize

                                                                                                            172KB

                                                                                                          • memory/1104-54-0x0000018690F40000-0x0000018690F6B000-memory.dmp

                                                                                                            Filesize

                                                                                                            172KB

                                                                                                          • memory/1116-58-0x00007FFA2AF50000-0x00007FFA2AF60000-memory.dmp

                                                                                                            Filesize

                                                                                                            64KB

                                                                                                          • memory/1116-57-0x0000024406570000-0x000002440659B000-memory.dmp

                                                                                                            Filesize

                                                                                                            172KB

                                                                                                          • memory/1140-60-0x00000185CEC70000-0x00000185CEC9B000-memory.dmp

                                                                                                            Filesize

                                                                                                            172KB

                                                                                                          • memory/1140-61-0x00007FFA2AF50000-0x00007FFA2AF60000-memory.dmp

                                                                                                            Filesize

                                                                                                            64KB

                                                                                                          • memory/1200-63-0x0000018EDC5D0000-0x0000018EDC5FB000-memory.dmp

                                                                                                            Filesize

                                                                                                            172KB

                                                                                                          • memory/1200-64-0x00007FFA2AF50000-0x00007FFA2AF60000-memory.dmp

                                                                                                            Filesize

                                                                                                            64KB

                                                                                                          • memory/1272-66-0x00000193F0BA0000-0x00000193F0BCB000-memory.dmp

                                                                                                            Filesize

                                                                                                            172KB

                                                                                                          • memory/1272-67-0x00007FFA2AF50000-0x00007FFA2AF60000-memory.dmp

                                                                                                            Filesize

                                                                                                            64KB

                                                                                                          • memory/1280-79-0x00007FFA2AF50000-0x00007FFA2AF60000-memory.dmp

                                                                                                            Filesize

                                                                                                            64KB

                                                                                                          • memory/1280-78-0x000002CAD2120000-0x000002CAD214B000-memory.dmp

                                                                                                            Filesize

                                                                                                            172KB

                                                                                                          • memory/1336-69-0x0000026349460000-0x000002634948B000-memory.dmp

                                                                                                            Filesize

                                                                                                            172KB

                                                                                                          • memory/1336-70-0x00007FFA2AF50000-0x00007FFA2AF60000-memory.dmp

                                                                                                            Filesize

                                                                                                            64KB

                                                                                                          • memory/1448-73-0x00007FFA2AF50000-0x00007FFA2AF60000-memory.dmp

                                                                                                            Filesize

                                                                                                            64KB

                                                                                                          • memory/1448-72-0x00000283EEFB0000-0x00000283EEFDB000-memory.dmp

                                                                                                            Filesize

                                                                                                            172KB

                                                                                                          • memory/1464-76-0x00007FFA2AF50000-0x00007FFA2AF60000-memory.dmp

                                                                                                            Filesize

                                                                                                            64KB

                                                                                                          • memory/1464-75-0x0000022A1D260000-0x0000022A1D28B000-memory.dmp

                                                                                                            Filesize

                                                                                                            172KB

                                                                                                          • memory/1596-81-0x0000022B72D90000-0x0000022B72DBB000-memory.dmp

                                                                                                            Filesize

                                                                                                            172KB

                                                                                                          • memory/1596-82-0x00007FFA2AF50000-0x00007FFA2AF60000-memory.dmp

                                                                                                            Filesize

                                                                                                            64KB

                                                                                                          • memory/4300-280-0x00007FFA4CE53000-0x00007FFA4CE55000-memory.dmp

                                                                                                            Filesize

                                                                                                            8KB

                                                                                                          • memory/4300-349-0x000001AF9CEA0000-0x000001AF9CEAE000-memory.dmp

                                                                                                            Filesize

                                                                                                            56KB

                                                                                                          • memory/4300-352-0x00007FFA6AED0000-0x00007FFA6B0C5000-memory.dmp

                                                                                                            Filesize

                                                                                                            2.0MB

                                                                                                          • memory/4300-353-0x000001AF9CF60000-0x000001AF9CF6E000-memory.dmp

                                                                                                            Filesize

                                                                                                            56KB

                                                                                                          • memory/4300-477-0x00007FFA6AED0000-0x00007FFA6B0C5000-memory.dmp

                                                                                                            Filesize

                                                                                                            2.0MB

                                                                                                          • memory/4300-0-0x00007FFA4CE53000-0x00007FFA4CE55000-memory.dmp

                                                                                                            Filesize

                                                                                                            8KB

                                                                                                          • memory/4300-2-0x000001AF9B440000-0x000001AF9B46C000-memory.dmp

                                                                                                            Filesize

                                                                                                            176KB

                                                                                                          • memory/4300-1-0x000001AF9B060000-0x000001AF9B0BA000-memory.dmp

                                                                                                            Filesize

                                                                                                            360KB

                                                                                                          • memory/4904-12-0x00007FFA6A9B0000-0x00007FFA6AA6E000-memory.dmp

                                                                                                            Filesize

                                                                                                            760KB

                                                                                                          • memory/4904-11-0x00007FFA6AED0000-0x00007FFA6B0C5000-memory.dmp

                                                                                                            Filesize

                                                                                                            2.0MB