Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-01-2025 02:17

General

  • Target

    3db6003aed5663530344f627592d7071efcece6ab608d114cd219d5b19f389a5.exe

  • Size

    335KB

  • MD5

    2e01c152b22c13fb946c204b6875a2d8

  • SHA1

    20f7a049f779623a11b4fbfb300c1f7a380fb33b

  • SHA256

    3db6003aed5663530344f627592d7071efcece6ab608d114cd219d5b19f389a5

  • SHA512

    80dc80d22ecb90d3c58c40e112de882548a1d933937d851993af4e6a92746900283770bd09d88047bd79fa053600113d1f9bb42a6af5beefe00b3ee15d4e7310

  • SSDEEP

    6144:MEbVUO1x/5bTgVziHzZnSKrCbYMJAbB8+q:lr/5/gVziHlBrCbYx83

Malware Config

Extracted

Family

xworm

Mutex

yNحكـX8ٍبAGLWِF6Jo2DiObلٍLZا3ا

Attributes
  • Install_directory

    %Port%

  • install_file

    MicrosoftEdgeUpdateTaskMachineUAC.exe

aes.plain

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Indicator Removal: Clear Windows Event Logs 1 TTPs 1 IoCs

    Clear Windows Event Logs to hide the activity of an intrusion.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 17 IoCs
  • Drops file in Windows directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Checks SCSI registry key(s) 3 TTPs 18 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:632
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        2⤵
          PID:376
      • C:\Windows\system32\lsass.exe
        C:\Windows\system32\lsass.exe
        1⤵
        • Drops file in System32 directory
        PID:704
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
        1⤵
          PID:976
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
          1⤵
            PID:776
          • C:\Windows\System32\svchost.exe
            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
            1⤵
              PID:1020
            • C:\Windows\system32\svchost.exe
              C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
              1⤵
                PID:1148
              • C:\Windows\System32\svchost.exe
                C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                1⤵
                  PID:1156
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                  1⤵
                  • Drops file in System32 directory
                  PID:1168
                  • C:\Windows\system32\taskhostw.exe
                    taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                    2⤵
                      PID:3004
                    • C:\Windows\system32\MusNotification.exe
                      C:\Windows\system32\MusNotification.exe
                      2⤵
                        PID:2132
                    • C:\Windows\System32\svchost.exe
                      C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                      1⤵
                      • Indicator Removal: Clear Windows Event Logs
                      PID:1200
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                      1⤵
                        PID:1260
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                        1⤵
                          PID:1336
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                          1⤵
                            PID:1352
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                            1⤵
                              PID:1416
                              • C:\Windows\system32\sihost.exe
                                sihost.exe
                                2⤵
                                  PID:2776
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                                1⤵
                                  PID:1432
                                • C:\Windows\System32\svchost.exe
                                  C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                                  1⤵
                                    PID:1616
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                                    1⤵
                                      PID:1648
                                    • C:\Windows\System32\svchost.exe
                                      C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                      1⤵
                                        PID:1660
                                      • C:\Windows\system32\svchost.exe
                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                        1⤵
                                          PID:1748
                                        • C:\Windows\System32\svchost.exe
                                          C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm
                                          1⤵
                                            PID:1772
                                          • C:\Windows\System32\svchost.exe
                                            C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                            1⤵
                                              PID:1792
                                            • C:\Windows\System32\svchost.exe
                                              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                              1⤵
                                                PID:1876
                                              • C:\Windows\system32\svchost.exe
                                                C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                1⤵
                                                  PID:2036
                                                • C:\Windows\System32\svchost.exe
                                                  C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                  1⤵
                                                    PID:2044
                                                  • C:\Windows\system32\svchost.exe
                                                    C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache
                                                    1⤵
                                                      PID:1408
                                                    • C:\Windows\system32\svchost.exe
                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                      1⤵
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:1604
                                                    • C:\Windows\System32\svchost.exe
                                                      C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                      1⤵
                                                        PID:2068
                                                      • C:\Windows\System32\spoolsv.exe
                                                        C:\Windows\System32\spoolsv.exe
                                                        1⤵
                                                          PID:2172
                                                        • C:\Windows\System32\svchost.exe
                                                          C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                          1⤵
                                                            PID:2288
                                                          • C:\Windows\System32\svchost.exe
                                                            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                            1⤵
                                                              PID:2352
                                                            • C:\Windows\system32\svchost.exe
                                                              C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                              1⤵
                                                                PID:2520
                                                              • C:\Windows\system32\svchost.exe
                                                                C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                                1⤵
                                                                  PID:2528
                                                                • C:\Windows\system32\svchost.exe
                                                                  C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc
                                                                  1⤵
                                                                  • Drops file in System32 directory
                                                                  PID:2688
                                                                • C:\Windows\sysmon.exe
                                                                  C:\Windows\sysmon.exe
                                                                  1⤵
                                                                    PID:2724
                                                                  • C:\Windows\system32\svchost.exe
                                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                                    1⤵
                                                                    • Enumerates connected drives
                                                                    PID:2744
                                                                  • C:\Windows\system32\svchost.exe
                                                                    C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                                    1⤵
                                                                      PID:2760
                                                                    • C:\Windows\System32\svchost.exe
                                                                      C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                                      1⤵
                                                                        PID:2788
                                                                      • C:\Windows\system32\svchost.exe
                                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                                        1⤵
                                                                          PID:2796
                                                                        • C:\Windows\system32\wbem\unsecapp.exe
                                                                          C:\Windows\system32\wbem\unsecapp.exe -Embedding
                                                                          1⤵
                                                                            PID:3060
                                                                          • C:\Windows\system32\svchost.exe
                                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker
                                                                            1⤵
                                                                              PID:3132
                                                                            • C:\Windows\system32\svchost.exe
                                                                              C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
                                                                              1⤵
                                                                                PID:3440
                                                                              • C:\Windows\Explorer.EXE
                                                                                C:\Windows\Explorer.EXE
                                                                                1⤵
                                                                                • Suspicious use of FindShellTrayWindow
                                                                                PID:3540
                                                                                • C:\Users\Admin\AppData\Local\Temp\3db6003aed5663530344f627592d7071efcece6ab608d114cd219d5b19f389a5.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\3db6003aed5663530344f627592d7071efcece6ab608d114cd219d5b19f389a5.exe"
                                                                                  2⤵
                                                                                  • Checks computer location settings
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  • Suspicious use of WriteProcessMemory
                                                                                  PID:840
                                                                                  • C:\Users\Admin\AppData\Local\Temp\zrhdhlr0.qwm.exe
                                                                                    "C:\Users\Admin\AppData\Local\Temp\zrhdhlr0.qwm.exe"
                                                                                    3⤵
                                                                                    • Executes dropped EXE
                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    • Suspicious use of WriteProcessMemory
                                                                                    PID:3960
                                                                                  • C:\Windows\SYSTEM32\SCHTASKS.exe
                                                                                    "SCHTASKS.exe" /create /tn "Mason3db6003aed5663530344f627592d7071efcece6ab608d114cd219d5b19f389a5.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\3db6003aed5663530344f627592d7071efcece6ab608d114cd219d5b19f389a5.exe'" /sc onlogon /rl HIGHEST
                                                                                    3⤵
                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                    PID:3776
                                                                                  • C:\Windows\SYSTEM32\SCHTASKS.exe
                                                                                    "SCHTASKS.exe" /create /tn "Mason3db6003aed5663530344f627592d7071efcece6ab608d114cd219d5b19f389a5.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\3db6003aed5663530344f627592d7071efcece6ab608d114cd219d5b19f389a5.exe'" /sc onlogon /rl HIGHEST
                                                                                    3⤵
                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                    PID:3680
                                                                                    • C:\Windows\System32\Conhost.exe
                                                                                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                      4⤵
                                                                                        PID:4748
                                                                                    • C:\Windows\SYSTEM32\netsh.exe
                                                                                      netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\3db6003aed5663530344f627592d7071efcece6ab608d114cd219d5b19f389a5.exe" "3db6003aed5663530344f627592d7071efcece6ab608d114cd219d5b19f389a5.exe" ENABLE
                                                                                      3⤵
                                                                                      • Modifies Windows Firewall
                                                                                      • Event Triggered Execution: Netsh Helper DLL
                                                                                      PID:2932
                                                                                      • C:\Windows\System32\Conhost.exe
                                                                                        \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        4⤵
                                                                                          PID:684
                                                                                  • C:\Windows\system32\svchost.exe
                                                                                    C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                                                                    1⤵
                                                                                      PID:3664
                                                                                    • C:\Windows\system32\DllHost.exe
                                                                                      C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                      1⤵
                                                                                        PID:3848
                                                                                      • C:\Windows\System32\RuntimeBroker.exe
                                                                                        C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                        1⤵
                                                                                          PID:4008
                                                                                        • C:\Windows\System32\RuntimeBroker.exe
                                                                                          C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                          1⤵
                                                                                            PID:4116
                                                                                          • C:\Windows\system32\svchost.exe
                                                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                            1⤵
                                                                                            • Drops file in System32 directory
                                                                                            • Modifies data under HKEY_USERS
                                                                                            PID:4976
                                                                                          • C:\Windows\System32\svchost.exe
                                                                                            C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                            1⤵
                                                                                              PID:4612
                                                                                            • C:\Windows\system32\svchost.exe
                                                                                              C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV
                                                                                              1⤵
                                                                                                PID:1212
                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                                                                1⤵
                                                                                                  PID:2376
                                                                                                • C:\Windows\system32\SppExtComObj.exe
                                                                                                  C:\Windows\system32\SppExtComObj.exe -Embedding
                                                                                                  1⤵
                                                                                                    PID:4364
                                                                                                  • C:\Windows\System32\svchost.exe
                                                                                                    C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                                    1⤵
                                                                                                      PID:2808
                                                                                                    • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                                                                                      "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                                                                                      1⤵
                                                                                                      • Drops file in System32 directory
                                                                                                      • Modifies data under HKEY_USERS
                                                                                                      PID:4892
                                                                                                    • C:\Windows\system32\DllHost.exe
                                                                                                      C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                      1⤵
                                                                                                        PID:1908
                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                        C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc
                                                                                                        1⤵
                                                                                                          PID:4200
                                                                                                        • C:\Windows\System32\RuntimeBroker.exe
                                                                                                          C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                          1⤵
                                                                                                            PID:3808
                                                                                                          • C:\Windows\System32\WaaSMedicAgent.exe
                                                                                                            C:\Windows\System32\WaaSMedicAgent.exe 3a66d87d574d7b1e5c1ba1bc6ea42fb6 JtAzGMHcP0GHv7uEyoSjcA.0.1.0.0.0
                                                                                                            1⤵
                                                                                                            • Sets service image path in registry
                                                                                                            • Modifies data under HKEY_USERS
                                                                                                            PID:2404
                                                                                                            • C:\Windows\System32\Conhost.exe
                                                                                                              \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                              2⤵
                                                                                                                PID:4580
                                                                                                            • C:\Windows\system32\svchost.exe
                                                                                                              C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
                                                                                                              1⤵
                                                                                                              • Drops file in Windows directory
                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                              PID:1640
                                                                                                            • C:\Windows\system32\wbem\wmiprvse.exe
                                                                                                              C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                              1⤵
                                                                                                              • Checks BIOS information in registry
                                                                                                              • Writes to the Master Boot Record (MBR)
                                                                                                              • Checks SCSI registry key(s)
                                                                                                              • Enumerates system info in registry
                                                                                                              PID:1428
                                                                                                            • C:\Windows\servicing\TrustedInstaller.exe
                                                                                                              C:\Windows\servicing\TrustedInstaller.exe
                                                                                                              1⤵
                                                                                                              • Drops file in Windows directory
                                                                                                              PID:568
                                                                                                            • C:\Windows\system32\svchost.exe
                                                                                                              C:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc
                                                                                                              1⤵
                                                                                                              • Checks processor information in registry
                                                                                                              PID:4896
                                                                                                            • C:\Windows\System32\mousocoreworker.exe
                                                                                                              C:\Windows\System32\mousocoreworker.exe -Embedding
                                                                                                              1⤵
                                                                                                              • Checks processor information in registry
                                                                                                              • Enumerates system info in registry
                                                                                                              • Modifies data under HKEY_USERS
                                                                                                              PID:4516
                                                                                                            • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
                                                                                                              C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
                                                                                                              1⤵
                                                                                                                PID:3712

                                                                                                              Network

                                                                                                              MITRE ATT&CK Enterprise v15

                                                                                                              Replay Monitor

                                                                                                              Loading Replay Monitor...

                                                                                                              Downloads

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\zrhdhlr0.qwm.exe

                                                                                                                Filesize

                                                                                                                161KB

                                                                                                                MD5

                                                                                                                94f1ab3a068f83b32639579ec9c5d025

                                                                                                                SHA1

                                                                                                                38f3d5bc5de46feb8de093d11329766b8e2054ae

                                                                                                                SHA256

                                                                                                                879cc20b41635709bb304e315aaa5ca4708b480a1bfc2f4935fcf2215188efb0

                                                                                                                SHA512

                                                                                                                44d5236a804d63302b21ca25ebc148a64605508d03c990a244c44ceb8630849da0510b7b2d0bee72e01ca6681e2d86d7e6aee8847674a26f0028d149b9abee0c

                                                                                                              • C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\Preferred

                                                                                                                Filesize

                                                                                                                24B

                                                                                                                MD5

                                                                                                                7f3a24c97f2d74b5cfa23e385974306d

                                                                                                                SHA1

                                                                                                                b7c6ce858f4441f20b13f47499760f2636b4e29f

                                                                                                                SHA256

                                                                                                                0a02416a12e8d4248c2510e78dc0ed017316c3c02ab1e81b4e67aca76bdeb012

                                                                                                                SHA512

                                                                                                                51a34ee0a8ed0c32c5ae6c133aa81cdbdbbbdc7badfba7a22b7052a1b2e8bf2c7244eb57f95772eb5e8e8b6eb8e946f99f984f0f050e00a53ef1f87eb970d846

                                                                                                              • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Maintenance Work

                                                                                                                Filesize

                                                                                                                2KB

                                                                                                                MD5

                                                                                                                8abf2d6067c6f3191a015f84aa9b6efe

                                                                                                                SHA1

                                                                                                                98f2b0a5cdb13cd3d82dc17bd43741bf0b3496f7

                                                                                                                SHA256

                                                                                                                ee18bd3259f220c41062abcbe71a421da3e910df11b9f86308a16cdc3a66fbea

                                                                                                                SHA512

                                                                                                                c2d686a6373efcff583c1ef50c144c59addb8b9c4857ccd8565cd8be3c94b0ac0273945167eb04ebd40dfb0351e4b66cffe4c4e478fb7733714630a11f765b63

                                                                                                              • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Maintenance Work

                                                                                                                Filesize

                                                                                                                2KB

                                                                                                                MD5

                                                                                                                f313c5b4f95605026428425586317353

                                                                                                                SHA1

                                                                                                                06be66fa06e1cffc54459c38d3d258f46669d01a

                                                                                                                SHA256

                                                                                                                129d0b993cd3858af5b7e87fdf74d8e59e6f2110184b5c905df8f5f6f2c39d8b

                                                                                                                SHA512

                                                                                                                b87a829c86eff1d10e1590b18a9909f05101a535e5f4cef914a4192956eb35a8bfef614c9f95d53783d77571687f3eb3c4e8ee2f24d23ad24e0976d8266b8890

                                                                                                              • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Wake To Work

                                                                                                                Filesize

                                                                                                                2KB

                                                                                                                MD5

                                                                                                                ceb7caa4e9c4b8d760dbf7e9e5ca44c5

                                                                                                                SHA1

                                                                                                                a3879621f9493414d497ea6d70fbf17e283d5c08

                                                                                                                SHA256

                                                                                                                98c054088df4957e8d6361fd2539c219bcf35f8a524aad8f5d1a95f218e990e9

                                                                                                                SHA512

                                                                                                                1eddfbf4cb62d3c5b4755a371316304aaeabb00f01bad03fb4f925a98a2f0824f613537d86deddd648a74d694dc13ed5183e761fdc1ec92589f6fa28beb7fbff

                                                                                                              • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Wake To Work

                                                                                                                Filesize

                                                                                                                2KB

                                                                                                                MD5

                                                                                                                7d612892b20e70250dbd00d0cdd4f09b

                                                                                                                SHA1

                                                                                                                63251cfa4e5d6cbf6fb14f6d8a7407dbe763d3f5

                                                                                                                SHA256

                                                                                                                727c9e7b91e144e453d5b32e18f12508ee84dabe71bc852941d9c9b4923f9e02

                                                                                                                SHA512

                                                                                                                f8d481f3300947d49ce5ab988a9d4e3154746afccc97081cbed1135ffb24fc107203d485dda2d5d714e74e752c614d8cfd16781ea93450fe782ffae3f77066d1

                                                                                                              • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Work

                                                                                                                Filesize

                                                                                                                2KB

                                                                                                                MD5

                                                                                                                1e8e2076314d54dd72e7ee09ff8a52ab

                                                                                                                SHA1

                                                                                                                5fd0a67671430f66237f483eef39ff599b892272

                                                                                                                SHA256

                                                                                                                55f203d6b40a39a6beba9dd3a2cb9034284f49578009835dd4f0f8e1db6ebe2f

                                                                                                                SHA512

                                                                                                                5b0c97284923c4619d9c00cba20ce1c6d65d1826abe664c390b04283f7a663256b4a6efe51f794cb5ec82ccea80307729addde841469da8d041cbcfd94feb0f6

                                                                                                              • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Work

                                                                                                                Filesize

                                                                                                                2KB

                                                                                                                MD5

                                                                                                                0b990e24f1e839462c0ac35fef1d119e

                                                                                                                SHA1

                                                                                                                9e17905f8f68f9ce0a2024d57b537aa8b39c6708

                                                                                                                SHA256

                                                                                                                a1106ed0845cd438e074344e0fe296dc10ee121a0179e09398eaaea2357c614a

                                                                                                                SHA512

                                                                                                                c65ba42fc0a2cb0b70888beb8ca334f7d5a8eaf954a5ef7adaecbcb4ce8d61b34858dfd9560954f95f59b4d8110a79ceaa39088b6a0caf8b42ceda41b46ec4a4

                                                                                                              • C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

                                                                                                                Filesize

                                                                                                                404B

                                                                                                                MD5

                                                                                                                35661d56dd6b18e853e89284c0ebb3f3

                                                                                                                SHA1

                                                                                                                a7fff313ede18cd2b39a4072afc99451ac822601

                                                                                                                SHA256

                                                                                                                a1d9fc597db627702c92c72514b31e7da28e3b51e512089eac097a5e7745e9da

                                                                                                                SHA512

                                                                                                                d117953467d53e604650b006164f84d62b50c29600a9658a52fbfbd69b6febf23be068dcbb9eb2a209b4ed2c8a5ff507c61de7c794030312da36fb2fae1b4018

                                                                                                              • memory/376-23-0x0000020503C20000-0x0000020503C4B000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/376-24-0x00007FF8C0CD0000-0x00007FF8C0CE0000-memory.dmp

                                                                                                                Filesize

                                                                                                                64KB

                                                                                                              • memory/376-29-0x0000020503C20000-0x0000020503C4B000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/632-14-0x000001CCDCC70000-0x000001CCDCC9B000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/632-26-0x000001CCDCC70000-0x000001CCDCC9B000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/632-27-0x00007FF900CED000-0x00007FF900CEE000-memory.dmp

                                                                                                                Filesize

                                                                                                                4KB

                                                                                                              • memory/632-13-0x000001CCDCC40000-0x000001CCDCC65000-memory.dmp

                                                                                                                Filesize

                                                                                                                148KB

                                                                                                              • memory/632-15-0x00007FF8C0CD0000-0x00007FF8C0CE0000-memory.dmp

                                                                                                                Filesize

                                                                                                                64KB

                                                                                                              • memory/704-19-0x00007FF8C0CD0000-0x00007FF8C0CE0000-memory.dmp

                                                                                                                Filesize

                                                                                                                64KB

                                                                                                              • memory/704-28-0x000001FC1F590000-0x000001FC1F5BB000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/704-18-0x000001FC1F590000-0x000001FC1F5BB000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/776-337-0x000001CB56960000-0x000001CB5698B000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/776-39-0x000001CB56960000-0x000001CB5698B000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/776-37-0x00007FF8C0CD0000-0x00007FF8C0CE0000-memory.dmp

                                                                                                                Filesize

                                                                                                                64KB

                                                                                                              • memory/776-36-0x000001CB56960000-0x000001CB5698B000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/840-281-0x000002551AA30000-0x000002551AA40000-memory.dmp

                                                                                                                Filesize

                                                                                                                64KB

                                                                                                              • memory/840-0-0x00007FF8E2C43000-0x00007FF8E2C45000-memory.dmp

                                                                                                                Filesize

                                                                                                                8KB

                                                                                                              • memory/840-273-0x00007FF8E2C43000-0x00007FF8E2C45000-memory.dmp

                                                                                                                Filesize

                                                                                                                8KB

                                                                                                              • memory/840-278-0x0000025534E80000-0x0000025534E8E000-memory.dmp

                                                                                                                Filesize

                                                                                                                56KB

                                                                                                              • memory/840-282-0x0000025535FC0000-0x0000025535FCE000-memory.dmp

                                                                                                                Filesize

                                                                                                                56KB

                                                                                                              • memory/840-362-0x000002551AA30000-0x000002551AA40000-memory.dmp

                                                                                                                Filesize

                                                                                                                64KB

                                                                                                              • memory/840-2-0x000002551A9F0000-0x000002551AA1C000-memory.dmp

                                                                                                                Filesize

                                                                                                                176KB

                                                                                                              • memory/840-1-0x000002551A5F0000-0x000002551A64A000-memory.dmp

                                                                                                                Filesize

                                                                                                                360KB

                                                                                                              • memory/976-31-0x00007FF8C0CD0000-0x00007FF8C0CE0000-memory.dmp

                                                                                                                Filesize

                                                                                                                64KB

                                                                                                              • memory/976-302-0x00000164E52D0000-0x00000164E52FB000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/976-33-0x00000164E52D0000-0x00000164E52FB000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/976-30-0x00000164E52D0000-0x00000164E52FB000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/976-34-0x00007FF900CEC000-0x00007FF900CED000-memory.dmp

                                                                                                                Filesize

                                                                                                                4KB

                                                                                                              • memory/1020-64-0x00000228867B0000-0x00000228867DB000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/1020-65-0x00007FF8C0CD0000-0x00007FF8C0CE0000-memory.dmp

                                                                                                                Filesize

                                                                                                                64KB

                                                                                                              • memory/1148-67-0x000001CFF5560000-0x000001CFF558B000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/1148-68-0x00007FF8C0CD0000-0x00007FF8C0CE0000-memory.dmp

                                                                                                                Filesize

                                                                                                                64KB

                                                                                                              • memory/1156-71-0x00007FF8C0CD0000-0x00007FF8C0CE0000-memory.dmp

                                                                                                                Filesize

                                                                                                                64KB

                                                                                                              • memory/1156-70-0x000001B35A970000-0x000001B35A99B000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/1168-73-0x0000024629730000-0x000002462975B000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/1168-74-0x00007FF8C0CD0000-0x00007FF8C0CE0000-memory.dmp

                                                                                                                Filesize

                                                                                                                64KB

                                                                                                              • memory/1200-76-0x0000013329430000-0x000001332945B000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/1200-77-0x00007FF8C0CD0000-0x00007FF8C0CE0000-memory.dmp

                                                                                                                Filesize

                                                                                                                64KB

                                                                                                              • memory/1260-80-0x00007FF8C0CD0000-0x00007FF8C0CE0000-memory.dmp

                                                                                                                Filesize

                                                                                                                64KB

                                                                                                              • memory/1260-79-0x0000022E76990000-0x0000022E769BB000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/3960-12-0x00007FF8FFE70000-0x00007FF8FFF2E000-memory.dmp

                                                                                                                Filesize

                                                                                                                760KB

                                                                                                              • memory/3960-11-0x00007FF900C50000-0x00007FF900E45000-memory.dmp

                                                                                                                Filesize

                                                                                                                2.0MB