Resubmissions

02/03/2025, 20:59

250302-zsp6wsvthz 10

02/03/2025, 18:11

250302-ws3kfazzd1 10

Analysis

  • max time kernel
    150s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/03/2025, 18:11

General

  • Target

    stub.exe

  • Size

    231KB

  • MD5

    265b52aa4d100784d7cd39258d5e4d21

  • SHA1

    5b708da62d55364477ffb77e7feb4193f4635f92

  • SHA256

    9d08e5e62b409ef1ccd05c7996eb5432e4a36f55642cb7441d153909e823f144

  • SHA512

    4ce9e2c41b65ce3c108765dcd934e0f2a12f6c9640cb2ae547997b26a66da1d515ea7bfeb9cc529a57fbd41f51d61068ca7b9f551119e1403ff0cf1b5684e661

  • SSDEEP

    3072:AvNYkHFE9jZOjT4LD8KbgVtn8Mo8G1gVziHzZbIK1YKB/pCAcNqXhwBV3yxSQigS:srE9Z/5bTgVziHzZnSKrCbYMJZbe8tq

Malware Config

Extracted

Family

xworm

Version

5.0

C2

217.136.29.82:50007

Attributes
  • install_file

    Mason.exe

aes.plain

Signatures

  • Detect Xworm Payload 2 IoCs
  • Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Indicator Removal: Clear Windows Event Logs 1 TTPs 1 IoCs

    Clear Windows Event Logs to hide the activity of an intrusion.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 18 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 5 IoCs
  • Modifies data under HKEY_USERS 57 IoCs
  • Modifies registry class 4 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:612
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        2⤵
          PID:380
          • C:\Windows\system32\WerFault.exe
            C:\Windows\system32\WerFault.exe -u -p 380 -s 2604
            3⤵
            • Checks processor information in registry
            • Enumerates system info in registry
            • Suspicious behavior: EnumeratesProcesses
            PID:2216
        • C:\Windows\system32\WerFault.exe
          C:\Windows\system32\WerFault.exe -u -p 612 -s 1124
          2⤵
          • Checks processor information in registry
          • Enumerates system info in registry
          • Suspicious behavior: EnumeratesProcesses
          PID:812
      • C:\Windows\system32\lsass.exe
        C:\Windows\system32\lsass.exe
        1⤵
          PID:676
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
          1⤵
            PID:968
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
            1⤵
              PID:740
            • C:\Windows\System32\svchost.exe
              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
              1⤵
                PID:1064
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                1⤵
                  PID:1072
                • C:\Windows\System32\svchost.exe
                  C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                  1⤵
                    PID:1096
                  • C:\Windows\System32\svchost.exe
                    C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                    1⤵
                    • Indicator Removal: Clear Windows Event Logs
                    PID:1192
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                    1⤵
                    • Drops file in System32 directory
                    PID:1204
                    • C:\Windows\system32\taskhostw.exe
                      taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                      2⤵
                        PID:2640
                      • C:\Windows\system32\MusNotification.exe
                        C:\Windows\system32\MusNotification.exe
                        2⤵
                          PID:4424
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                        1⤵
                          PID:1284
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                          1⤵
                            PID:1300
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                            1⤵
                              PID:1400
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                              1⤵
                                PID:1452
                              • C:\Windows\System32\svchost.exe
                                C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                1⤵
                                  PID:1484
                                • C:\Windows\system32\svchost.exe
                                  C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                                  1⤵
                                    PID:1508
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                                    1⤵
                                      PID:1524
                                      • C:\Windows\system32\sihost.exe
                                        sihost.exe
                                        2⤵
                                          PID:2492
                                        • C:\Windows\system32\sihost.exe
                                          sihost.exe
                                          2⤵
                                            PID:4340
                                          • C:\Windows\system32\sihost.exe
                                            sihost.exe
                                            2⤵
                                              PID:2188
                                            • C:\Windows\system32\sihost.exe
                                              sihost.exe
                                              2⤵
                                                PID:2132
                                              • C:\Windows\system32\sihost.exe
                                                sihost.exe
                                                2⤵
                                                  PID:4612
                                                • C:\Windows\system32\sihost.exe
                                                  sihost.exe
                                                  2⤵
                                                    PID:3224
                                                  • C:\Windows\system32\sihost.exe
                                                    sihost.exe
                                                    2⤵
                                                      PID:1624
                                                  • C:\Windows\system32\svchost.exe
                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                                    1⤵
                                                      PID:1596
                                                    • C:\Windows\System32\svchost.exe
                                                      C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                                      1⤵
                                                        PID:1672
                                                      • C:\Windows\System32\svchost.exe
                                                        C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                                                        1⤵
                                                          PID:1704
                                                        • C:\Windows\System32\svchost.exe
                                                          C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                          1⤵
                                                            PID:1780
                                                          • C:\Windows\System32\svchost.exe
                                                            C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm
                                                            1⤵
                                                              PID:1808
                                                            • C:\Windows\system32\svchost.exe
                                                              C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                              1⤵
                                                                PID:1964
                                                              • C:\Windows\system32\svchost.exe
                                                                C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache
                                                                1⤵
                                                                  PID:1084
                                                                • C:\Windows\System32\svchost.exe
                                                                  C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                                  1⤵
                                                                    PID:1240
                                                                  • C:\Windows\System32\svchost.exe
                                                                    C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                                    1⤵
                                                                      PID:2056
                                                                    • C:\Windows\system32\svchost.exe
                                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                                      1⤵
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:2088
                                                                    • C:\Windows\System32\svchost.exe
                                                                      C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                                      1⤵
                                                                        PID:2116
                                                                      • C:\Windows\System32\spoolsv.exe
                                                                        C:\Windows\System32\spoolsv.exe
                                                                        1⤵
                                                                          PID:2248
                                                                        • C:\Windows\System32\svchost.exe
                                                                          C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                                          1⤵
                                                                            PID:2348
                                                                          • C:\Windows\system32\svchost.exe
                                                                            C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                                            1⤵
                                                                              PID:2520
                                                                            • C:\Windows\system32\svchost.exe
                                                                              C:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker
                                                                              1⤵
                                                                                PID:2688
                                                                              • C:\Windows\system32\svchost.exe
                                                                                C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                                                1⤵
                                                                                  PID:2712
                                                                                • C:\Windows\system32\svchost.exe
                                                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                                                  1⤵
                                                                                    PID:2720
                                                                                  • C:\Windows\system32\svchost.exe
                                                                                    C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc
                                                                                    1⤵
                                                                                    • Drops file in System32 directory
                                                                                    PID:2932
                                                                                  • C:\Windows\system32\svchost.exe
                                                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                                                    1⤵
                                                                                    • Enumerates connected drives
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:2980
                                                                                  • C:\Windows\sysmon.exe
                                                                                    C:\Windows\sysmon.exe
                                                                                    1⤵
                                                                                      PID:2996
                                                                                    • C:\Windows\system32\svchost.exe
                                                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                                                      1⤵
                                                                                        PID:3016
                                                                                      • C:\Windows\System32\svchost.exe
                                                                                        C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                                                        1⤵
                                                                                          PID:3032
                                                                                        • C:\Windows\system32\wbem\unsecapp.exe
                                                                                          C:\Windows\system32\wbem\unsecapp.exe -Embedding
                                                                                          1⤵
                                                                                            PID:3212
                                                                                          • C:\Windows\Explorer.EXE
                                                                                            C:\Windows\Explorer.EXE
                                                                                            1⤵
                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                            PID:3416
                                                                                            • C:\Users\Admin\AppData\Local\Temp\stub.exe
                                                                                              "C:\Users\Admin\AppData\Local\Temp\stub.exe"
                                                                                              2⤵
                                                                                              • Checks computer location settings
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              • Suspicious use of WriteProcessMemory
                                                                                              PID:4944
                                                                                              • C:\Users\Admin\AppData\Local\Temp\qzmfbac3.naq.exe
                                                                                                "C:\Users\Admin\AppData\Local\Temp\qzmfbac3.naq.exe"
                                                                                                3⤵
                                                                                                • Executes dropped EXE
                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                • Suspicious use of WriteProcessMemory
                                                                                                PID:4900
                                                                                              • C:\Windows\SYSTEM32\SCHTASKS.exe
                                                                                                "SCHTASKS.exe" /create /tn "Masonstub.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\stub.exe'" /sc onlogon /rl HIGHEST
                                                                                                3⤵
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:1816
                                                                                              • C:\Windows\SYSTEM32\SCHTASKS.exe
                                                                                                "SCHTASKS.exe" /create /tn "Masonstub.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\stub.exe'" /sc onlogon /rl HIGHEST
                                                                                                3⤵
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:3980
                                                                                                • C:\Windows\System32\Conhost.exe
                                                                                                  \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                  4⤵
                                                                                                    PID:3452
                                                                                            • C:\Windows\system32\svchost.exe
                                                                                              C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
                                                                                              1⤵
                                                                                                PID:3424
                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                                                                                1⤵
                                                                                                  PID:3740
                                                                                                • C:\Windows\system32\DllHost.exe
                                                                                                  C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                  1⤵
                                                                                                    PID:3916
                                                                                                  • C:\Windows\System32\RuntimeBroker.exe
                                                                                                    C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                    1⤵
                                                                                                      PID:4080
                                                                                                    • C:\Windows\System32\RuntimeBroker.exe
                                                                                                      C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                      1⤵
                                                                                                        PID:4188
                                                                                                      • C:\Windows\System32\svchost.exe
                                                                                                        C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                                        1⤵
                                                                                                          PID:4936
                                                                                                        • C:\Windows\system32\svchost.exe
                                                                                                          C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV
                                                                                                          1⤵
                                                                                                            PID:4388
                                                                                                          • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                                                                                            "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                                                                                            1⤵
                                                                                                            • Drops file in System32 directory
                                                                                                            • Modifies data under HKEY_USERS
                                                                                                            PID:2488
                                                                                                          • C:\Windows\system32\svchost.exe
                                                                                                            C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                                                                            1⤵
                                                                                                            • Modifies data under HKEY_USERS
                                                                                                            PID:3752
                                                                                                          • C:\Windows\system32\SppExtComObj.exe
                                                                                                            C:\Windows\system32\SppExtComObj.exe -Embedding
                                                                                                            1⤵
                                                                                                              PID:3620
                                                                                                            • C:\Windows\System32\svchost.exe
                                                                                                              C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                                              1⤵
                                                                                                                PID:3136
                                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                                                1⤵
                                                                                                                • Drops file in System32 directory
                                                                                                                • Modifies data under HKEY_USERS
                                                                                                                PID:1380
                                                                                                              • C:\Windows\system32\DllHost.exe
                                                                                                                C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                                1⤵
                                                                                                                  PID:4128
                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                  C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc
                                                                                                                  1⤵
                                                                                                                    PID:1368
                                                                                                                  • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                    C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                    1⤵
                                                                                                                      PID:3300
                                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo
                                                                                                                      1⤵
                                                                                                                        PID:5076
                                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                                        C:\Windows\system32\svchost.exe -k appmodel -p -s camsvc
                                                                                                                        1⤵
                                                                                                                          PID:3636
                                                                                                                        • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                          C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                          1⤵
                                                                                                                          • Modifies registry class
                                                                                                                          PID:4396
                                                                                                                        • C:\Windows\system32\backgroundTaskHost.exe
                                                                                                                          "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
                                                                                                                          1⤵
                                                                                                                            PID:548
                                                                                                                          • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                            C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                            1⤵
                                                                                                                              PID:2624
                                                                                                                            • C:\Windows\System32\svchost.exe
                                                                                                                              C:\Windows\System32\svchost.exe -k WerSvcGroup
                                                                                                                              1⤵
                                                                                                                              • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                                                              PID:2860
                                                                                                                              • C:\Windows\system32\WerFault.exe
                                                                                                                                C:\Windows\system32\WerFault.exe -pss -s 508 -p 380 -ip 380
                                                                                                                                2⤵
                                                                                                                                • Suspicious use of NtCreateProcessExOtherParentProcess
                                                                                                                                PID:2460
                                                                                                                              • C:\Windows\system32\WerFault.exe
                                                                                                                                C:\Windows\system32\WerFault.exe -pss -s 548 -p 612 -ip 612
                                                                                                                                2⤵
                                                                                                                                  PID:5104
                                                                                                                              • C:\Windows\System32\WaaSMedicAgent.exe
                                                                                                                                C:\Windows\System32\WaaSMedicAgent.exe f0636eb8b967fcc6d70333ef05cd14e8 7Dgk7JPNRkyRPoHYa4sPsQ.0.1.0.0.0
                                                                                                                                1⤵
                                                                                                                                • Sets service image path in registry
                                                                                                                                • Modifies data under HKEY_USERS
                                                                                                                                PID:384
                                                                                                                                • C:\Windows\System32\Conhost.exe
                                                                                                                                  \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                  2⤵
                                                                                                                                    PID:1132
                                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
                                                                                                                                  1⤵
                                                                                                                                  • Drops file in Windows directory
                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                  PID:820
                                                                                                                                • C:\Windows\system32\wbem\wmiprvse.exe
                                                                                                                                  C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                                                  1⤵
                                                                                                                                  • Checks BIOS information in registry
                                                                                                                                  • Writes to the Master Boot Record (MBR)
                                                                                                                                  • Checks SCSI registry key(s)
                                                                                                                                  • Enumerates system info in registry
                                                                                                                                  PID:5036
                                                                                                                                • C:\Windows\servicing\TrustedInstaller.exe
                                                                                                                                  C:\Windows\servicing\TrustedInstaller.exe
                                                                                                                                  1⤵
                                                                                                                                    PID:616
                                                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc
                                                                                                                                    1⤵
                                                                                                                                      PID:3488
                                                                                                                                    • C:\Windows\System32\mousocoreworker.exe
                                                                                                                                      C:\Windows\System32\mousocoreworker.exe -Embedding
                                                                                                                                      1⤵
                                                                                                                                        PID:2052

                                                                                                                                      Network

                                                                                                                                      MITRE ATT&CK Enterprise v15

                                                                                                                                      Replay Monitor

                                                                                                                                      Loading Replay Monitor...

                                                                                                                                      Downloads

                                                                                                                                      • C:\ProgramData\Microsoft\Windows\WER\Temp\WEREFAF.tmp.csv

                                                                                                                                        Filesize

                                                                                                                                        39KB

                                                                                                                                        MD5

                                                                                                                                        e586728f40a0093c8eb3024bd7b2f18a

                                                                                                                                        SHA1

                                                                                                                                        25b01dcaa2395d13620dcd5b8c485a841d3d5b62

                                                                                                                                        SHA256

                                                                                                                                        c318411eefa5b8401965de4457c12b390e3de2258f65ffb1978c52a1db584cf8

                                                                                                                                        SHA512

                                                                                                                                        1e3b58bc58a1646eb043859f60f3b3b038f6a2612384e34c48fec821910ad6ba053a32b386cb5d17f993b0b565966d5b84ba1f056e0d7b73e36fa698d683a49c

                                                                                                                                      • C:\ProgramData\Microsoft\Windows\WER\Temp\WEREFCF.tmp.txt

                                                                                                                                        Filesize

                                                                                                                                        13KB

                                                                                                                                        MD5

                                                                                                                                        dc83a7ab3a12a83cebfeffe698ea0eb5

                                                                                                                                        SHA1

                                                                                                                                        9da76e30388453efbed186da1e9cc93eba0b836c

                                                                                                                                        SHA256

                                                                                                                                        ff415ce5c35d0d15a499da5f1ae4cdf7d264f8e2caf3545d3f77ec4a9fd39cc6

                                                                                                                                        SHA512

                                                                                                                                        ed5b336c761d754b019b91dc6deee3722274eafacaed2faa9c0f8cd222a6644cac86dabf257dd00566eb1d50bb636c4b1fb17e00a4a8ec71886a607050e8a7da

                                                                                                                                      • C:\ProgramData\Microsoft\Windows\WER\Temp\WERF00F.tmp.csv

                                                                                                                                        Filesize

                                                                                                                                        37KB

                                                                                                                                        MD5

                                                                                                                                        df04aa8b9ffaf45fc4294e860040706e

                                                                                                                                        SHA1

                                                                                                                                        e4d32abd93b9b8e6369094ab1945056a6635c0b9

                                                                                                                                        SHA256

                                                                                                                                        706734a524bdee58aa69150dd492a2db1ffeafd21f8aaa35d599a07e627fd435

                                                                                                                                        SHA512

                                                                                                                                        5a684c855827057d91e9b771c5b1ecebf9b0fb316f49f51d2a9591a17cfdffb0f27fe823b427fa62c2556a6c281e7abe08e0f689c98de930e1301f734f1233d6

                                                                                                                                      • C:\ProgramData\Microsoft\Windows\WER\Temp\WERF02F.tmp.txt

                                                                                                                                        Filesize

                                                                                                                                        13KB

                                                                                                                                        MD5

                                                                                                                                        43232d8488364daff24cc1a2b5b7a076

                                                                                                                                        SHA1

                                                                                                                                        21f895e762d21066ed4d00cd28dc74b36a453a54

                                                                                                                                        SHA256

                                                                                                                                        e542cac89ae7a9cc94b2f7ba2a9a1c95334ad96c1f9719133e2146e91ab1882b

                                                                                                                                        SHA512

                                                                                                                                        17b9196f6aef15a69ae14a80e14662a0b143097a46827b3ac769c3b0bf456563adc0267d19e1631a8eff4b8af90e1363bd98a26be9a26ebe1382f58e1b415147

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\qzmfbac3.naq.exe

                                                                                                                                        Filesize

                                                                                                                                        161KB

                                                                                                                                        MD5

                                                                                                                                        94f1ab3a068f83b32639579ec9c5d025

                                                                                                                                        SHA1

                                                                                                                                        38f3d5bc5de46feb8de093d11329766b8e2054ae

                                                                                                                                        SHA256

                                                                                                                                        879cc20b41635709bb304e315aaa5ca4708b480a1bfc2f4935fcf2215188efb0

                                                                                                                                        SHA512

                                                                                                                                        44d5236a804d63302b21ca25ebc148a64605508d03c990a244c44ceb8630849da0510b7b2d0bee72e01ca6681e2d86d7e6aee8847674a26f0028d149b9abee0c

                                                                                                                                      • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Work

                                                                                                                                        Filesize

                                                                                                                                        2KB

                                                                                                                                        MD5

                                                                                                                                        1e8e2076314d54dd72e7ee09ff8a52ab

                                                                                                                                        SHA1

                                                                                                                                        5fd0a67671430f66237f483eef39ff599b892272

                                                                                                                                        SHA256

                                                                                                                                        55f203d6b40a39a6beba9dd3a2cb9034284f49578009835dd4f0f8e1db6ebe2f

                                                                                                                                        SHA512

                                                                                                                                        5b0c97284923c4619d9c00cba20ce1c6d65d1826abe664c390b04283f7a663256b4a6efe51f794cb5ec82ccea80307729addde841469da8d041cbcfd94feb0f6

                                                                                                                                      • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Work

                                                                                                                                        Filesize

                                                                                                                                        2KB

                                                                                                                                        MD5

                                                                                                                                        0b990e24f1e839462c0ac35fef1d119e

                                                                                                                                        SHA1

                                                                                                                                        9e17905f8f68f9ce0a2024d57b537aa8b39c6708

                                                                                                                                        SHA256

                                                                                                                                        a1106ed0845cd438e074344e0fe296dc10ee121a0179e09398eaaea2357c614a

                                                                                                                                        SHA512

                                                                                                                                        c65ba42fc0a2cb0b70888beb8ca334f7d5a8eaf954a5ef7adaecbcb4ce8d61b34858dfd9560954f95f59b4d8110a79ceaa39088b6a0caf8b42ceda41b46ec4a4

                                                                                                                                      • C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

                                                                                                                                        Filesize

                                                                                                                                        404B

                                                                                                                                        MD5

                                                                                                                                        537dc33671c397e8f6c9e2f95a3dfe04

                                                                                                                                        SHA1

                                                                                                                                        27d8871864bd7b256572f0c937da403f68f4ccd6

                                                                                                                                        SHA256

                                                                                                                                        97a1c4c6d8dd639e85a2388c4e37360c6ea506fb1b32b1f07d85a1a5d806e1d2

                                                                                                                                        SHA512

                                                                                                                                        8453a3ca6fec8a20fa5032402886a1f94398ee29593528c502a9ad51a31e493ec73c469307183719fb230a06814a4984236260ac882fadc75c6a992b6a39a40a

                                                                                                                                      • memory/380-52-0x000001621FA80000-0x000001621FAAB000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        172KB

                                                                                                                                      • memory/380-356-0x000001621FA80000-0x000001621FAAB000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        172KB

                                                                                                                                      • memory/380-18-0x000001621FA80000-0x000001621FAAB000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        172KB

                                                                                                                                      • memory/612-16-0x0000018284B60000-0x0000018284B8B000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        172KB

                                                                                                                                      • memory/612-46-0x00007FFB1EB8D000-0x00007FFB1EB8E000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        4KB

                                                                                                                                      • memory/612-314-0x00007FFB1EB8F000-0x00007FFB1EB90000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        4KB

                                                                                                                                      • memory/612-313-0x00007FFB1EB8C000-0x00007FFB1EB8D000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        4KB

                                                                                                                                      • memory/612-45-0x0000018284B60000-0x0000018284B8B000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        172KB

                                                                                                                                      • memory/612-13-0x0000018284B30000-0x0000018284B55000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        148KB

                                                                                                                                      • memory/676-59-0x00007FFB1EB8D000-0x00007FFB1EB8E000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        4KB

                                                                                                                                      • memory/676-57-0x000002368B630000-0x000002368B65B000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        172KB

                                                                                                                                      • memory/676-19-0x000002368B630000-0x000002368B65B000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        172KB

                                                                                                                                      • memory/676-20-0x00007FFADEB70000-0x00007FFADEB80000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        64KB

                                                                                                                                      • memory/3416-67-0x0000000002B50000-0x0000000002B7B000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        172KB

                                                                                                                                      • memory/3416-172-0x0000000002B50000-0x0000000002B7B000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        172KB

                                                                                                                                      • memory/3416-173-0x00007FFB1EB8F000-0x00007FFB1EB90000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        4KB

                                                                                                                                      • memory/3416-68-0x00007FFADEB70000-0x00007FFADEB80000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        64KB

                                                                                                                                      • memory/4900-12-0x00007FFB1D9E0000-0x00007FFB1DA9E000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        760KB

                                                                                                                                      • memory/4900-11-0x00007FFB1EAF0000-0x00007FFB1ECE5000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        2.0MB

                                                                                                                                      • memory/4944-0-0x00007FFB007B3000-0x00007FFB007B5000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        8KB

                                                                                                                                      • memory/4944-415-0x000001AAFE400000-0x000001AAFE40E000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        56KB

                                                                                                                                      • memory/4944-452-0x00007FFB007B3000-0x00007FFB007B5000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        8KB

                                                                                                                                      • memory/4944-453-0x00007FFB1EAF0000-0x00007FFB1ECE5000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        2.0MB

                                                                                                                                      • memory/4944-474-0x00007FFB1EAF0000-0x00007FFB1ECE5000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        2.0MB

                                                                                                                                      • memory/4944-2-0x000001AAE5720000-0x000001AAE574C000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        176KB

                                                                                                                                      • memory/4944-1-0x000001AAE3BA0000-0x000001AAE3BE0000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        256KB