Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-01-2025 09:00

General

  • Target

    UZI.exe

  • Size

    1.1MB

  • MD5

    53438f13efec4841b7182bdcebc4410b

  • SHA1

    9483c1614dbf6e133c92a1d355a017eff4eeed2b

  • SHA256

    6e5aa4eae614ca049a1b2c8b803e6610b2b176a8e009ddad8df221c5899bb0ac

  • SHA512

    363eb26746cc536a351f176d17205305ac84c18f151d608eb3f6543bed9db9e6d6104b90babde74d780873ef092bb2628493b5486f4521d0f9e8d26b5b33de8b

  • SSDEEP

    24576:Fam4MROxnF4HrrcI0AilFEvxHPRZoo1jXbh:FOMiaHrrcI0AilFEvxHPjr

Malware Config

Extracted

Family

orcus

C2

195.88.218.126:10134

Attributes
  • autostart_method

    Disable

  • enable_keylogger

    false

  • install_path

    %programfiles%\Orcus\Orcus.exe

  • reconnect_delay

    10000

  • registry_keyname

    Orcus

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    AppData\OrcusWatchdog.exe

Signatures

  • Orcus

    Orcus is a Remote Access Trojan that is being sold on underground forums.

  • Orcus family
  • Orcurs Rat Executable 2 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Indicator Removal: Clear Windows Event Logs 1 TTPs 1 IoCs

    Clear Windows Event Logs to hide the activity of an intrusion.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 19 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 30 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 9 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 7 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • NTFS ADS 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 16 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:616
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        2⤵
          PID:64
          • C:\Windows\system32\WerFault.exe
            C:\Windows\system32\WerFault.exe -u -p 64 -s 3656
            3⤵
            • Checks processor information in registry
            • Enumerates system info in registry
            • Suspicious behavior: EnumeratesProcesses
            PID:2204
        • C:\Windows\system32\dwm.exe
          "dwm.exe"
          2⤵
          • Checks SCSI registry key(s)
          • Enumerates system info in registry
          • Modifies data under HKEY_USERS
          • Suspicious use of AdjustPrivilegeToken
          PID:4924
      • C:\Windows\system32\lsass.exe
        C:\Windows\system32\lsass.exe
        1⤵
        • Drops file in System32 directory
        • Suspicious use of WriteProcessMemory
        PID:672
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
        1⤵
          PID:956
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
          1⤵
            PID:440
          • C:\Windows\System32\svchost.exe
            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
            1⤵
              PID:612
            • C:\Windows\system32\svchost.exe
              C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
              1⤵
              • Drops file in System32 directory
              PID:1028
              • C:\Windows\system32\taskhostw.exe
                taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                2⤵
                  PID:2984
                • C:\Windows\system32\MusNotification.exe
                  C:\Windows\system32\MusNotification.exe
                  2⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1728
              • C:\Windows\System32\svchost.exe
                C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                1⤵
                  PID:1072
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                  1⤵
                    PID:1092
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                    1⤵
                      PID:1164
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                      1⤵
                        PID:1268
                        • C:\Windows\system32\sihost.exe
                          sihost.exe
                          2⤵
                            PID:2804
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                          1⤵
                            PID:1276
                          • C:\Windows\System32\svchost.exe
                            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                            1⤵
                            • Indicator Removal: Clear Windows Event Logs
                            PID:1300
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                            1⤵
                              PID:1400
                            • C:\Windows\System32\svchost.exe
                              C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                              1⤵
                                PID:1416
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                                1⤵
                                  PID:1472
                                • C:\Windows\system32\svchost.exe
                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                  1⤵
                                    PID:1548
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                                    1⤵
                                      PID:1568
                                    • C:\Windows\System32\svchost.exe
                                      C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                      1⤵
                                        PID:1644
                                      • C:\Windows\System32\svchost.exe
                                        C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                                        1⤵
                                          PID:1692
                                        • C:\Windows\System32\svchost.exe
                                          C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm
                                          1⤵
                                            PID:1772
                                          • C:\Windows\System32\svchost.exe
                                            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                            1⤵
                                              PID:1780
                                            • C:\Windows\system32\svchost.exe
                                              C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache
                                              1⤵
                                                PID:1912
                                              • C:\Windows\System32\svchost.exe
                                                C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                1⤵
                                                  PID:1924
                                                • C:\Windows\System32\svchost.exe
                                                  C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                  1⤵
                                                    PID:1988
                                                  • C:\Windows\system32\svchost.exe
                                                    C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                    1⤵
                                                      PID:2012
                                                    • C:\Windows\System32\spoolsv.exe
                                                      C:\Windows\System32\spoolsv.exe
                                                      1⤵
                                                        PID:1808
                                                      • C:\Windows\System32\svchost.exe
                                                        C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                        1⤵
                                                          PID:2080
                                                        • C:\Windows\System32\svchost.exe
                                                          C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                          1⤵
                                                            PID:2228
                                                          • C:\Windows\system32\svchost.exe
                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                            1⤵
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:2364
                                                          • C:\Windows\system32\svchost.exe
                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                            1⤵
                                                              PID:2388
                                                            • C:\Windows\system32\svchost.exe
                                                              C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                              1⤵
                                                                PID:2396
                                                              • C:\Windows\system32\svchost.exe
                                                                C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc
                                                                1⤵
                                                                • Drops file in System32 directory
                                                                PID:2468
                                                              • C:\Windows\sysmon.exe
                                                                C:\Windows\sysmon.exe
                                                                1⤵
                                                                  PID:2532
                                                                • C:\Windows\system32\svchost.exe
                                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                                  1⤵
                                                                  • Enumerates connected drives
                                                                  PID:2544
                                                                • C:\Windows\System32\svchost.exe
                                                                  C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                                  1⤵
                                                                    PID:2580
                                                                  • C:\Windows\system32\svchost.exe
                                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                                    1⤵
                                                                      PID:2604
                                                                    • C:\Windows\system32\svchost.exe
                                                                      C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                                      1⤵
                                                                        PID:2844
                                                                      • C:\Windows\system32\svchost.exe
                                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker
                                                                        1⤵
                                                                          PID:3044
                                                                        • C:\Windows\system32\wbem\unsecapp.exe
                                                                          C:\Windows\system32\wbem\unsecapp.exe -Embedding
                                                                          1⤵
                                                                            PID:700
                                                                          • C:\Windows\system32\svchost.exe
                                                                            C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
                                                                            1⤵
                                                                              PID:3296
                                                                            • C:\Windows\Explorer.EXE
                                                                              C:\Windows\Explorer.EXE
                                                                              1⤵
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              • Suspicious use of FindShellTrayWindow
                                                                              • Suspicious use of SendNotifyMessage
                                                                              PID:3396
                                                                              • C:\Users\Admin\AppData\Local\Temp\UZI.exe
                                                                                "C:\Users\Admin\AppData\Local\Temp\UZI.exe"
                                                                                2⤵
                                                                                • Checks computer location settings
                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                • Suspicious use of WriteProcessMemory
                                                                                PID:2648
                                                                                • C:\Users\Admin\AppData\Local\Temp\oqrtgtd1.jt0.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\oqrtgtd1.jt0.exe"
                                                                                  3⤵
                                                                                  • Executes dropped EXE
                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  • Suspicious use of WriteProcessMemory
                                                                                  PID:2944
                                                                                • C:\Windows\SYSTEM32\SCHTASKS.exe
                                                                                  "SCHTASKS.exe" /create /tn "MasonUZI.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\UZI.exe'" /sc onlogon /rl HIGHEST
                                                                                  3⤵
                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                  PID:4004
                                                                                • C:\Windows\SYSTEM32\SCHTASKS.exe
                                                                                  "SCHTASKS.exe" /create /tn "MasonUZI.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\UZI.exe'" /sc onlogon /rl HIGHEST
                                                                                  3⤵
                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                  PID:3256
                                                                                  • C:\Windows\System32\Conhost.exe
                                                                                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                    4⤵
                                                                                      PID:1528
                                                                              • C:\Windows\system32\svchost.exe
                                                                                C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                                                                1⤵
                                                                                  PID:3516
                                                                                • C:\Windows\system32\DllHost.exe
                                                                                  C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                  1⤵
                                                                                    PID:3732
                                                                                  • C:\Windows\System32\RuntimeBroker.exe
                                                                                    C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                    1⤵
                                                                                      PID:3888
                                                                                    • C:\Windows\System32\RuntimeBroker.exe
                                                                                      C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                      1⤵
                                                                                      • Suspicious use of UnmapMainImage
                                                                                      PID:3576
                                                                                    • C:\Windows\system32\svchost.exe
                                                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                      1⤵
                                                                                      • Drops file in System32 directory
                                                                                      • Checks SCSI registry key(s)
                                                                                      • Modifies data under HKEY_USERS
                                                                                      PID:1804
                                                                                    • C:\Windows\System32\svchost.exe
                                                                                      C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                      1⤵
                                                                                        PID:3928
                                                                                      • C:\Windows\system32\svchost.exe
                                                                                        C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV
                                                                                        1⤵
                                                                                          PID:2100
                                                                                        • C:\Windows\system32\svchost.exe
                                                                                          C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                                                          1⤵
                                                                                          • Modifies data under HKEY_USERS
                                                                                          PID:3884
                                                                                        • C:\Windows\system32\SppExtComObj.exe
                                                                                          C:\Windows\system32\SppExtComObj.exe -Embedding
                                                                                          1⤵
                                                                                            PID:2912
                                                                                          • C:\Windows\System32\svchost.exe
                                                                                            C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                            1⤵
                                                                                              PID:3428
                                                                                            • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                                                                              "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                                                                              1⤵
                                                                                              • Drops file in System32 directory
                                                                                              • Modifies data under HKEY_USERS
                                                                                              PID:4244
                                                                                            • C:\Windows\system32\DllHost.exe
                                                                                              C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                              1⤵
                                                                                                PID:944
                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc
                                                                                                1⤵
                                                                                                  PID:316
                                                                                                • C:\Windows\System32\RuntimeBroker.exe
                                                                                                  C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                  1⤵
                                                                                                    PID:4832
                                                                                                  • C:\Windows\System32\svchost.exe
                                                                                                    C:\Windows\System32\svchost.exe -k WerSvcGroup
                                                                                                    1⤵
                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                    PID:2428
                                                                                                  • C:\Windows\system32\backgroundTaskHost.exe
                                                                                                    "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:ShellFeedsUI.AppXnj65k2d1a1rnztt2t2nng5ctmk3e76pn.mca
                                                                                                    1⤵
                                                                                                      PID:2028
                                                                                                    • C:\Windows\system32\wbem\wmiprvse.exe
                                                                                                      C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                      1⤵
                                                                                                      • Checks BIOS information in registry
                                                                                                      • Writes to the Master Boot Record (MBR)
                                                                                                      • Checks SCSI registry key(s)
                                                                                                      • Enumerates system info in registry
                                                                                                      • NTFS ADS
                                                                                                      PID:1104
                                                                                                    • C:\Windows\System32\WaaSMedicAgent.exe
                                                                                                      C:\Windows\System32\WaaSMedicAgent.exe bfedf3bdba9daaf9dbc373339bbdaefd e4EmNk87oUWDBNh7yQufcg.0.1.0.0.0
                                                                                                      1⤵
                                                                                                      • Sets service image path in registry
                                                                                                      • Modifies data under HKEY_USERS
                                                                                                      PID:4780
                                                                                                      • C:\Windows\System32\Conhost.exe
                                                                                                        \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                        2⤵
                                                                                                          PID:1584
                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
                                                                                                        1⤵
                                                                                                        • Drops file in Windows directory
                                                                                                        PID:696
                                                                                                      • C:\Windows\servicing\TrustedInstaller.exe
                                                                                                        C:\Windows\servicing\TrustedInstaller.exe
                                                                                                        1⤵
                                                                                                          PID:2032
                                                                                                        • C:\Windows\system32\svchost.exe
                                                                                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc
                                                                                                          1⤵
                                                                                                            PID:1940
                                                                                                          • C:\Windows\System32\mousocoreworker.exe
                                                                                                            C:\Windows\System32\mousocoreworker.exe -Embedding
                                                                                                            1⤵
                                                                                                            • Checks processor information in registry
                                                                                                            • Enumerates system info in registry
                                                                                                            • Modifies data under HKEY_USERS
                                                                                                            PID:872
                                                                                                          • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
                                                                                                            C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
                                                                                                            1⤵
                                                                                                              PID:2888

                                                                                                            Network

                                                                                                            MITRE ATT&CK Enterprise v15

                                                                                                            Replay Monitor

                                                                                                            Loading Replay Monitor...

                                                                                                            Downloads

                                                                                                            • C:\ProgramData\Microsoft\Windows\WER\Temp\WER6F44.tmp.csv

                                                                                                              Filesize

                                                                                                              36KB

                                                                                                              MD5

                                                                                                              8c5df0a6344fa7c3c273554482b7d4f1

                                                                                                              SHA1

                                                                                                              899d6be48041a24b34281cf421e700bbd411b9b6

                                                                                                              SHA256

                                                                                                              a43259f88de281971e18c5a81aeeada018d2734ca6e9384cf1b05dd08adbfd5c

                                                                                                              SHA512

                                                                                                              a6269df92d5c6989b8fca6a2f8a1e2a9d177b833ae2572cf29d586c9c24a7513b4e314216249c108d6e055f3b12bd7e1808b4d132b897c2e3d8a0576f7a50a80

                                                                                                            • C:\ProgramData\Microsoft\Windows\WER\Temp\WER6F64.tmp.txt

                                                                                                              Filesize

                                                                                                              13KB

                                                                                                              MD5

                                                                                                              cb3fabbe8883d02a71682bd9d9fdfab2

                                                                                                              SHA1

                                                                                                              0946e919fcfabb8fef24473dc0391a4b05e0b233

                                                                                                              SHA256

                                                                                                              938a9368c339010d6a3a466c074c19f07d81927dc6f4bcfe863f1b29f1838e44

                                                                                                              SHA512

                                                                                                              077f5b21f970cf70ef1c8d67977b36d224d19f79e5682e9465e82359fc8833c728dc071d625a169c6fe4d57027c4e7ffa3e6161748018a06bf23e9cbf097bf63

                                                                                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506

                                                                                                              Filesize

                                                                                                              328B

                                                                                                              MD5

                                                                                                              7ff227358d40d1e950768c88dbf410f2

                                                                                                              SHA1

                                                                                                              95d13f4f4132a713740ec230ce310487e4fc2131

                                                                                                              SHA256

                                                                                                              721b01ae5c60fd904a5efb770541bb3bd8084a72c8c589dce69db705a5cf0111

                                                                                                              SHA512

                                                                                                              ddd2e787a9a5d6adb7290e8540934f762d9dc3d8785f872e0eff1ad42aa6e07bd65ba0a278545ca79fd3e3f7b7437fa5a19262ba9c9af3afa22face51929c6a6

                                                                                                            • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749

                                                                                                              Filesize

                                                                                                              290B

                                                                                                              MD5

                                                                                                              fff175f6398b6194904eb08ccb73574b

                                                                                                              SHA1

                                                                                                              2f271d8a04d7d7acc62db74ebc1426d44c9bb8cb

                                                                                                              SHA256

                                                                                                              0f3948f22bc48e3dee649c35372b90f73304d805cf721c3f36a0f1e479b7152b

                                                                                                              SHA512

                                                                                                              8f2ac362ba4301d0b53b29972d9e8fd4c4dce18d1c2ef4d89742cc3c51fe0ad86b80ff76b23ce65ec7eaa58ef78b9876ac1d1806256a0977cb3815df243fb1c3

                                                                                                            • C:\Users\Admin\AppData\Local\Temp\oqrtgtd1.jt0.exe

                                                                                                              Filesize

                                                                                                              161KB

                                                                                                              MD5

                                                                                                              94f1ab3a068f83b32639579ec9c5d025

                                                                                                              SHA1

                                                                                                              38f3d5bc5de46feb8de093d11329766b8e2054ae

                                                                                                              SHA256

                                                                                                              879cc20b41635709bb304e315aaa5ca4708b480a1bfc2f4935fcf2215188efb0

                                                                                                              SHA512

                                                                                                              44d5236a804d63302b21ca25ebc148a64605508d03c990a244c44ceb8630849da0510b7b2d0bee72e01ca6681e2d86d7e6aee8847674a26f0028d149b9abee0c

                                                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\S-1-5-21-493223053-2004649691-1575712786-1000\Preferred

                                                                                                              Filesize

                                                                                                              24B

                                                                                                              MD5

                                                                                                              7a3c606a4a90be151acfbfd76b0f8f7b

                                                                                                              SHA1

                                                                                                              8462e863a7bbcfc13fc7ba9cb74d0593de97632a

                                                                                                              SHA256

                                                                                                              88ef5d5288d6fba0d59f7977838119ead239be92a4ca69af6c398ab38f91b6f1

                                                                                                              SHA512

                                                                                                              1993c2fdb3d8cc389ced98d42dee988b02497c0ae64a782a2ddff47e14bef6e8f26804a95623ac42d9959318bae517ffb291f953fd4cdd6dffe322172d643252

                                                                                                            • C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\Preferred

                                                                                                              Filesize

                                                                                                              24B

                                                                                                              MD5

                                                                                                              fe5ced3f95701e69ca046669dc57a73b

                                                                                                              SHA1

                                                                                                              280e96cdd69d631ca39b6c98d898195914d80076

                                                                                                              SHA256

                                                                                                              37194ae329aa3a6fcc344080840cc6a0f7fa34d5672d16c0de7953a66ec14552

                                                                                                              SHA512

                                                                                                              d861d0c51659d8f21a01d4d0002f5fa55300e18494c8e2a9b2359159f41adf84293ca80e20aaaec896fedc886199ac53b1a0e3ec9ce26b0f337ab0447952eb76

                                                                                                            • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Maintenance Work

                                                                                                              Filesize

                                                                                                              2KB

                                                                                                              MD5

                                                                                                              f313c5b4f95605026428425586317353

                                                                                                              SHA1

                                                                                                              06be66fa06e1cffc54459c38d3d258f46669d01a

                                                                                                              SHA256

                                                                                                              129d0b993cd3858af5b7e87fdf74d8e59e6f2110184b5c905df8f5f6f2c39d8b

                                                                                                              SHA512

                                                                                                              b87a829c86eff1d10e1590b18a9909f05101a535e5f4cef914a4192956eb35a8bfef614c9f95d53783d77571687f3eb3c4e8ee2f24d23ad24e0976d8266b8890

                                                                                                            • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Wake To Work

                                                                                                              Filesize

                                                                                                              2KB

                                                                                                              MD5

                                                                                                              7d612892b20e70250dbd00d0cdd4f09b

                                                                                                              SHA1

                                                                                                              63251cfa4e5d6cbf6fb14f6d8a7407dbe763d3f5

                                                                                                              SHA256

                                                                                                              727c9e7b91e144e453d5b32e18f12508ee84dabe71bc852941d9c9b4923f9e02

                                                                                                              SHA512

                                                                                                              f8d481f3300947d49ce5ab988a9d4e3154746afccc97081cbed1135ffb24fc107203d485dda2d5d714e74e752c614d8cfd16781ea93450fe782ffae3f77066d1

                                                                                                            • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Work

                                                                                                              Filesize

                                                                                                              2KB

                                                                                                              MD5

                                                                                                              0b990e24f1e839462c0ac35fef1d119e

                                                                                                              SHA1

                                                                                                              9e17905f8f68f9ce0a2024d57b537aa8b39c6708

                                                                                                              SHA256

                                                                                                              a1106ed0845cd438e074344e0fe296dc10ee121a0179e09398eaaea2357c614a

                                                                                                              SHA512

                                                                                                              c65ba42fc0a2cb0b70888beb8ca334f7d5a8eaf954a5ef7adaecbcb4ce8d61b34858dfd9560954f95f59b4d8110a79ceaa39088b6a0caf8b42ceda41b46ec4a4

                                                                                                            • C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

                                                                                                              Filesize

                                                                                                              404B

                                                                                                              MD5

                                                                                                              ac2bd707e3562149fc2dfae347d4b6e0

                                                                                                              SHA1

                                                                                                              53671a86727917ab5b96f49e5f5b5b50edb9d2e7

                                                                                                              SHA256

                                                                                                              d9fb97d4e554d627b5d55831d776a9ec5e3666d01c96b23e746a60df9629abe6

                                                                                                              SHA512

                                                                                                              fa9174cbd967236a0cef65878748c5c8814762970916ad89fb2103c393825b33ed076d8440e5efd2db96beeeae79b5b09d257a02416a6f1d07b76772fa6d8e85

                                                                                                            • memory/64-335-0x00007FFBFF66F000-0x00007FFBFF670000-memory.dmp

                                                                                                              Filesize

                                                                                                              4KB

                                                                                                            • memory/64-28-0x00007FFBFF66D000-0x00007FFBFF66E000-memory.dmp

                                                                                                              Filesize

                                                                                                              4KB

                                                                                                            • memory/64-23-0x0000023A907E0000-0x0000023A9080B000-memory.dmp

                                                                                                              Filesize

                                                                                                              172KB

                                                                                                            • memory/64-278-0x00007FFBFF66C000-0x00007FFBFF66D000-memory.dmp

                                                                                                              Filesize

                                                                                                              4KB

                                                                                                            • memory/64-27-0x0000023A907E0000-0x0000023A9080B000-memory.dmp

                                                                                                              Filesize

                                                                                                              172KB

                                                                                                            • memory/440-35-0x000001F10D090000-0x000001F10D0BB000-memory.dmp

                                                                                                              Filesize

                                                                                                              172KB

                                                                                                            • memory/440-379-0x000001F10D090000-0x000001F10D0BB000-memory.dmp

                                                                                                              Filesize

                                                                                                              172KB

                                                                                                            • memory/440-36-0x00007FFBBF650000-0x00007FFBBF660000-memory.dmp

                                                                                                              Filesize

                                                                                                              64KB

                                                                                                            • memory/440-38-0x000001F10D090000-0x000001F10D0BB000-memory.dmp

                                                                                                              Filesize

                                                                                                              172KB

                                                                                                            • memory/612-52-0x0000020078C00000-0x0000020078C2B000-memory.dmp

                                                                                                              Filesize

                                                                                                              172KB

                                                                                                            • memory/612-88-0x0000020078C00000-0x0000020078C2B000-memory.dmp

                                                                                                              Filesize

                                                                                                              172KB

                                                                                                            • memory/612-53-0x00007FFBBF650000-0x00007FFBBF660000-memory.dmp

                                                                                                              Filesize

                                                                                                              64KB

                                                                                                            • memory/616-14-0x0000022080110000-0x000002208013B000-memory.dmp

                                                                                                              Filesize

                                                                                                              172KB

                                                                                                            • memory/616-13-0x00000220800E0000-0x0000022080105000-memory.dmp

                                                                                                              Filesize

                                                                                                              148KB

                                                                                                            • memory/616-15-0x00007FFBBF650000-0x00007FFBBF660000-memory.dmp

                                                                                                              Filesize

                                                                                                              64KB

                                                                                                            • memory/616-24-0x0000022080110000-0x000002208013B000-memory.dmp

                                                                                                              Filesize

                                                                                                              172KB

                                                                                                            • memory/616-25-0x00007FFBFF66D000-0x00007FFBFF66E000-memory.dmp

                                                                                                              Filesize

                                                                                                              4KB

                                                                                                            • memory/672-26-0x000001A636AA0000-0x000001A636ACB000-memory.dmp

                                                                                                              Filesize

                                                                                                              172KB

                                                                                                            • memory/672-18-0x000001A636AA0000-0x000001A636ACB000-memory.dmp

                                                                                                              Filesize

                                                                                                              172KB

                                                                                                            • memory/672-19-0x00007FFBBF650000-0x00007FFBBF660000-memory.dmp

                                                                                                              Filesize

                                                                                                              64KB

                                                                                                            • memory/956-374-0x000001997C640000-0x000001997C66B000-memory.dmp

                                                                                                              Filesize

                                                                                                              172KB

                                                                                                            • memory/956-33-0x00007FFBFF66C000-0x00007FFBFF66D000-memory.dmp

                                                                                                              Filesize

                                                                                                              4KB

                                                                                                            • memory/956-30-0x00007FFBBF650000-0x00007FFBBF660000-memory.dmp

                                                                                                              Filesize

                                                                                                              64KB

                                                                                                            • memory/956-32-0x000001997C640000-0x000001997C66B000-memory.dmp

                                                                                                              Filesize

                                                                                                              172KB

                                                                                                            • memory/956-29-0x000001997C640000-0x000001997C66B000-memory.dmp

                                                                                                              Filesize

                                                                                                              172KB

                                                                                                            • memory/1028-56-0x00007FFBBF650000-0x00007FFBBF660000-memory.dmp

                                                                                                              Filesize

                                                                                                              64KB

                                                                                                            • memory/1028-55-0x0000025037C60000-0x0000025037C8B000-memory.dmp

                                                                                                              Filesize

                                                                                                              172KB

                                                                                                            • memory/1072-58-0x000001C267170000-0x000001C26719B000-memory.dmp

                                                                                                              Filesize

                                                                                                              172KB

                                                                                                            • memory/1072-59-0x00007FFBBF650000-0x00007FFBBF660000-memory.dmp

                                                                                                              Filesize

                                                                                                              64KB

                                                                                                            • memory/1092-62-0x00007FFBBF650000-0x00007FFBBF660000-memory.dmp

                                                                                                              Filesize

                                                                                                              64KB

                                                                                                            • memory/1092-61-0x0000023A353A0000-0x0000023A353CB000-memory.dmp

                                                                                                              Filesize

                                                                                                              172KB

                                                                                                            • memory/1164-64-0x0000016F6DD60000-0x0000016F6DD8B000-memory.dmp

                                                                                                              Filesize

                                                                                                              172KB

                                                                                                            • memory/1164-65-0x00007FFBBF650000-0x00007FFBBF660000-memory.dmp

                                                                                                              Filesize

                                                                                                              64KB

                                                                                                            • memory/1268-68-0x00007FFBBF650000-0x00007FFBBF660000-memory.dmp

                                                                                                              Filesize

                                                                                                              64KB

                                                                                                            • memory/1268-67-0x0000027499DB0000-0x0000027499DDB000-memory.dmp

                                                                                                              Filesize

                                                                                                              172KB

                                                                                                            • memory/1276-70-0x000001E78CA60000-0x000001E78CA8B000-memory.dmp

                                                                                                              Filesize

                                                                                                              172KB

                                                                                                            • memory/1276-71-0x00007FFBBF650000-0x00007FFBBF660000-memory.dmp

                                                                                                              Filesize

                                                                                                              64KB

                                                                                                            • memory/1300-73-0x0000011484A30000-0x0000011484A5B000-memory.dmp

                                                                                                              Filesize

                                                                                                              172KB

                                                                                                            • memory/1300-74-0x00007FFBBF650000-0x00007FFBBF660000-memory.dmp

                                                                                                              Filesize

                                                                                                              64KB

                                                                                                            • memory/1400-76-0x000001FAE11A0000-0x000001FAE11CB000-memory.dmp

                                                                                                              Filesize

                                                                                                              172KB

                                                                                                            • memory/1400-77-0x00007FFBBF650000-0x00007FFBBF660000-memory.dmp

                                                                                                              Filesize

                                                                                                              64KB

                                                                                                            • memory/1416-80-0x00007FFBBF650000-0x00007FFBBF660000-memory.dmp

                                                                                                              Filesize

                                                                                                              64KB

                                                                                                            • memory/1416-79-0x000001D261AB0000-0x000001D261ADB000-memory.dmp

                                                                                                              Filesize

                                                                                                              172KB

                                                                                                            • memory/1472-82-0x0000025F83D30000-0x0000025F83D5B000-memory.dmp

                                                                                                              Filesize

                                                                                                              172KB

                                                                                                            • memory/2648-347-0x000002847BDD0000-0x000002847BDDE000-memory.dmp

                                                                                                              Filesize

                                                                                                              56KB

                                                                                                            • memory/2648-410-0x00007FFBFF5D0000-0x00007FFBFF7C5000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.0MB

                                                                                                            • memory/2648-350-0x000002847C9F0000-0x000002847CA02000-memory.dmp

                                                                                                              Filesize

                                                                                                              72KB

                                                                                                            • memory/2648-351-0x000002847CA00000-0x000002847CA18000-memory.dmp

                                                                                                              Filesize

                                                                                                              96KB

                                                                                                            • memory/2648-346-0x000002847C0D0000-0x000002847C12C000-memory.dmp

                                                                                                              Filesize

                                                                                                              368KB

                                                                                                            • memory/2648-383-0x000002847CCA0000-0x000002847CCB2000-memory.dmp

                                                                                                              Filesize

                                                                                                              72KB

                                                                                                            • memory/2648-384-0x000002847CD00000-0x000002847CD3C000-memory.dmp

                                                                                                              Filesize

                                                                                                              240KB

                                                                                                            • memory/2648-385-0x000002847CE50000-0x000002847CF5A000-memory.dmp

                                                                                                              Filesize

                                                                                                              1.0MB

                                                                                                            • memory/2648-386-0x000002847D130000-0x000002847D2F2000-memory.dmp

                                                                                                              Filesize

                                                                                                              1.8MB

                                                                                                            • memory/2648-355-0x000002847C9E0000-0x000002847C9F0000-memory.dmp

                                                                                                              Filesize

                                                                                                              64KB

                                                                                                            • memory/2648-348-0x00007FFBFF5D0000-0x00007FFBFF7C5000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.0MB

                                                                                                            • memory/2648-343-0x000002847BFE0000-0x000002847C0C8000-memory.dmp

                                                                                                              Filesize

                                                                                                              928KB

                                                                                                            • memory/2648-0-0x00007FFBE16B3000-0x00007FFBE16B5000-memory.dmp

                                                                                                              Filesize

                                                                                                              8KB

                                                                                                            • memory/2648-1-0x0000028461670000-0x000002846178A000-memory.dmp

                                                                                                              Filesize

                                                                                                              1.1MB

                                                                                                            • memory/2648-2-0x0000028461B30000-0x0000028461B5C000-memory.dmp

                                                                                                              Filesize

                                                                                                              176KB

                                                                                                            • memory/2944-12-0x00007FFBFE790000-0x00007FFBFE84E000-memory.dmp

                                                                                                              Filesize

                                                                                                              760KB

                                                                                                            • memory/2944-11-0x00007FFBFF5D0000-0x00007FFBFF7C5000-memory.dmp

                                                                                                              Filesize

                                                                                                              2.0MB