Analysis

  • max time kernel
    6s
  • max time network
    20s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/03/2025, 20:57

Errors

Reason
Machine shutdown

General

  • Target

    XClient.exe

  • Size

    336KB

  • MD5

    5fcc047b04b088650ffab33ab0d3a991

  • SHA1

    310de3660d360e55e02aeabc2bb96fe1a00fbeb1

  • SHA256

    227dbbb256d5236819196deda5707bc6abd1df5ba9a483edf82443ad12f26930

  • SHA512

    5bc2803bb1fbcd18b33f7c23120fa144cb29c07376c40622f20d69386932bbf82e8160ec7ec11c781a0624a875ee198369c7b2cf8b2464986054d7c5d94c4cf4

  • SSDEEP

    6144:gv9QxBt25x/5bTgVziHzZnSKrCbYM+2ba8Mq:NxBt8/5/gVziHlBrCbYP85

Malware Config

Extracted

Family

xworm

Version

5.0

Signatures

  • Detect Xworm Payload 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Indicator Removal: Clear Windows Event Logs 1 TTPs 1 IoCs

    Clear Windows Event Logs to hide the activity of an intrusion.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 62 IoCs
  • Modifies registry class 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 16 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:628
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        2⤵
          PID:376
          • C:\Windows\system32\WerFault.exe
            C:\Windows\system32\WerFault.exe -u -p 376 -s 3564
            3⤵
            • Checks processor information in registry
            • Enumerates system info in registry
            • Suspicious behavior: EnumeratesProcesses
            PID:2876
        • C:\Windows\system32\dwm.exe
          "dwm.exe"
          2⤵
          • Checks SCSI registry key(s)
          • Enumerates system info in registry
          • Modifies data under HKEY_USERS
          • Suspicious use of AdjustPrivilegeToken
          PID:2840
      • C:\Windows\system32\lsass.exe
        C:\Windows\system32\lsass.exe
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:696
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
        1⤵
          PID:976
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
          1⤵
            PID:528
          • C:\Windows\System32\svchost.exe
            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
            1⤵
              PID:1012
            • C:\Windows\system32\svchost.exe
              C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
              1⤵
              • Drops file in System32 directory
              PID:1120
              • C:\Windows\system32\taskhostw.exe
                taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                2⤵
                  PID:2776
                • C:\Windows\system32\MusNotification.exe
                  C:\Windows\system32\MusNotification.exe
                  2⤵
                    PID:4128
                • C:\Windows\System32\svchost.exe
                  C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                  1⤵
                  • Indicator Removal: Clear Windows Event Logs
                  PID:1128
                • C:\Windows\System32\svchost.exe
                  C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                  1⤵
                    PID:1136
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                    1⤵
                      PID:1144
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                      1⤵
                        PID:1224
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                        1⤵
                          PID:1304
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                          1⤵
                            PID:1328
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                            1⤵
                              PID:1432
                              • C:\Windows\system32\sihost.exe
                                sihost.exe
                                2⤵
                                  PID:2552
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                                1⤵
                                  PID:1440
                                • C:\Windows\System32\svchost.exe
                                  C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                  1⤵
                                    PID:1572
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                                    1⤵
                                      PID:1580
                                    • C:\Windows\System32\svchost.exe
                                      C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                                      1⤵
                                        PID:1640
                                      • C:\Windows\system32\svchost.exe
                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                        1⤵
                                          PID:1708
                                        • C:\Windows\System32\svchost.exe
                                          C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                          1⤵
                                            PID:1744
                                          • C:\Windows\System32\svchost.exe
                                            C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm
                                            1⤵
                                              PID:1756
                                            • C:\Windows\System32\svchost.exe
                                              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                              1⤵
                                                PID:1832
                                              • C:\Windows\system32\svchost.exe
                                                C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache
                                                1⤵
                                                  PID:1964
                                                • C:\Windows\System32\svchost.exe
                                                  C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                  1⤵
                                                    PID:1972
                                                  • C:\Windows\system32\svchost.exe
                                                    C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                    1⤵
                                                      PID:1996
                                                    • C:\Windows\System32\svchost.exe
                                                      C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                      1⤵
                                                        PID:64
                                                      • C:\Windows\system32\svchost.exe
                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                        1⤵
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:1740
                                                      • C:\Windows\System32\spoolsv.exe
                                                        C:\Windows\System32\spoolsv.exe
                                                        1⤵
                                                          PID:2076
                                                        • C:\Windows\System32\svchost.exe
                                                          C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                          1⤵
                                                            PID:2228
                                                          • C:\Windows\System32\svchost.exe
                                                            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                            1⤵
                                                              PID:2292
                                                            • C:\Windows\system32\svchost.exe
                                                              C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                              1⤵
                                                                PID:2452
                                                              • C:\Windows\system32\svchost.exe
                                                                C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                                1⤵
                                                                  PID:2472
                                                                • C:\Windows\system32\svchost.exe
                                                                  C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                                  1⤵
                                                                    PID:2600
                                                                  • C:\Windows\system32\svchost.exe
                                                                    C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc
                                                                    1⤵
                                                                    • Drops file in System32 directory
                                                                    PID:2712
                                                                  • C:\Windows\system32\svchost.exe
                                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                                    1⤵
                                                                      PID:2736
                                                                    • C:\Windows\sysmon.exe
                                                                      C:\Windows\sysmon.exe
                                                                      1⤵
                                                                        PID:2768
                                                                      • C:\Windows\System32\svchost.exe
                                                                        C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                                        1⤵
                                                                          PID:2788
                                                                        • C:\Windows\system32\svchost.exe
                                                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                                          1⤵
                                                                            PID:2800
                                                                          • C:\Windows\system32\svchost.exe
                                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker
                                                                            1⤵
                                                                              PID:2880
                                                                            • C:\Windows\system32\wbem\unsecapp.exe
                                                                              C:\Windows\system32\wbem\unsecapp.exe -Embedding
                                                                              1⤵
                                                                                PID:3084
                                                                              • C:\Windows\Explorer.EXE
                                                                                C:\Windows\Explorer.EXE
                                                                                1⤵
                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                • Suspicious use of FindShellTrayWindow
                                                                                • Suspicious use of SendNotifyMessage
                                                                                PID:3464
                                                                                • C:\Users\Admin\AppData\Local\Temp\XClient.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
                                                                                  2⤵
                                                                                  • Checks computer location settings
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  • Suspicious use of WriteProcessMemory
                                                                                  PID:4228
                                                                                  • C:\Users\Admin\AppData\Local\Temp\gfwkwksb.psl.exe
                                                                                    "C:\Users\Admin\AppData\Local\Temp\gfwkwksb.psl.exe"
                                                                                    3⤵
                                                                                    • Executes dropped EXE
                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    • Suspicious use of WriteProcessMemory
                                                                                    PID:3976
                                                                                  • C:\Windows\SYSTEM32\SCHTASKS.exe
                                                                                    "SCHTASKS.exe" /create /tn "MasonXClient.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\XClient.exe'" /sc onlogon /rl HIGHEST
                                                                                    3⤵
                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                    PID:1696
                                                                                    • C:\Windows\System32\Conhost.exe
                                                                                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                      4⤵
                                                                                        PID:5028
                                                                                    • C:\Windows\SYSTEM32\SCHTASKS.exe
                                                                                      "SCHTASKS.exe" /create /tn "MasonXClient.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\XClient.exe'" /sc onlogon /rl HIGHEST
                                                                                      3⤵
                                                                                      • Scheduled Task/Job: Scheduled Task
                                                                                      PID:2936
                                                                                      • C:\Windows\System32\Conhost.exe
                                                                                        \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        4⤵
                                                                                          PID:3772
                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'
                                                                                        3⤵
                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                        PID:3532
                                                                                        • C:\Windows\System32\Conhost.exe
                                                                                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                          4⤵
                                                                                            PID:4928
                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'
                                                                                          3⤵
                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                          PID:5024
                                                                                          • C:\Windows\System32\Conhost.exe
                                                                                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            4⤵
                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                            PID:4552
                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\svchost.exe'
                                                                                          3⤵
                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                          PID:4000
                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'
                                                                                          3⤵
                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                          PID:1620
                                                                                        • C:\Windows\System32\schtasks.exe
                                                                                          "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\Users\Admin\AppData\Roaming\svchost.exe"
                                                                                          3⤵
                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                          PID:5112
                                                                                    • C:\Windows\system32\svchost.exe
                                                                                      C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
                                                                                      1⤵
                                                                                        PID:3476
                                                                                      • C:\Windows\system32\svchost.exe
                                                                                        C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                                                                        1⤵
                                                                                          PID:3672
                                                                                        • C:\Windows\system32\DllHost.exe
                                                                                          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                          1⤵
                                                                                            PID:3840
                                                                                          • C:\Windows\System32\RuntimeBroker.exe
                                                                                            C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                            1⤵
                                                                                              PID:4056
                                                                                            • C:\Windows\System32\RuntimeBroker.exe
                                                                                              C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                              1⤵
                                                                                                PID:4156
                                                                                              • C:\Windows\system32\DllHost.exe
                                                                                                C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                1⤵
                                                                                                  PID:5012
                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                                  1⤵
                                                                                                  • Drops file in System32 directory
                                                                                                  • Modifies data under HKEY_USERS
                                                                                                  PID:4784
                                                                                                • C:\Windows\System32\svchost.exe
                                                                                                  C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                                                  1⤵
                                                                                                    PID:720
                                                                                                  • C:\Windows\System32\svchost.exe
                                                                                                    C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                                    1⤵
                                                                                                      PID:3832
                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                      C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV
                                                                                                      1⤵
                                                                                                        PID:4896
                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                        C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                                                                        1⤵
                                                                                                        • Modifies data under HKEY_USERS
                                                                                                        PID:3320
                                                                                                      • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                                                                                        "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                                                                                        1⤵
                                                                                                          PID:4920
                                                                                                        • C:\Windows\system32\SppExtComObj.exe
                                                                                                          C:\Windows\system32\SppExtComObj.exe -Embedding
                                                                                                          1⤵
                                                                                                            PID:1072
                                                                                                          • C:\Windows\System32\svchost.exe
                                                                                                            C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                                            1⤵
                                                                                                              PID:3196
                                                                                                            • C:\Windows\system32\svchost.exe
                                                                                                              C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc
                                                                                                              1⤵
                                                                                                                PID:4800
                                                                                                              • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                1⤵
                                                                                                                  PID:4004
                                                                                                                • C:\Windows\System32\svchost.exe
                                                                                                                  C:\Windows\System32\svchost.exe -k WerSvcGroup
                                                                                                                  1⤵
                                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                                  PID:448
                                                                                                                • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                  C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                  1⤵
                                                                                                                  • Modifies registry class
                                                                                                                  PID:564
                                                                                                                • C:\Windows\System32\WaaSMedicAgent.exe
                                                                                                                  C:\Windows\System32\WaaSMedicAgent.exe 524ed5dbf78ebe21c90dab37103d9b04 oXcEQ6No3kWufrgGh5YzPQ.0.1.0.0.0
                                                                                                                  1⤵
                                                                                                                  • Modifies data under HKEY_USERS
                                                                                                                  PID:4664
                                                                                                                  • C:\Windows\System32\Conhost.exe
                                                                                                                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                    2⤵
                                                                                                                      PID:1252
                                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
                                                                                                                    1⤵
                                                                                                                    • Drops file in Windows directory
                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                    PID:3308

                                                                                                                  Network

                                                                                                                  MITRE ATT&CK Enterprise v15

                                                                                                                  Replay Monitor

                                                                                                                  Loading Replay Monitor...

                                                                                                                  Downloads

                                                                                                                  • C:\ProgramData\Microsoft\Windows\WER\Temp\WERBA09.tmp.csv

                                                                                                                    Filesize

                                                                                                                    37KB

                                                                                                                    MD5

                                                                                                                    072546f850bf275f3a2a3db79969cf7a

                                                                                                                    SHA1

                                                                                                                    03e289735c912ca83cf4d9dd348d4fc2b6e08e1f

                                                                                                                    SHA256

                                                                                                                    2f787a931c981c322fd832d8c4bb9c9bcd4cbd6221ae7de9606a4262e18640e7

                                                                                                                    SHA512

                                                                                                                    b3e803956022505b9e90bb660f89f7013441f4ad4619046edc9596cbed5f523c266698bc8d04fe0b7e79fe889ae6d65cbc3d7d3a5c08f96e63c36f10b06a7568

                                                                                                                  • C:\ProgramData\Microsoft\Windows\WER\Temp\WERBA29.tmp.txt

                                                                                                                    Filesize

                                                                                                                    13KB

                                                                                                                    MD5

                                                                                                                    f7dd4fbe4bb739b939283dcc13a9d853

                                                                                                                    SHA1

                                                                                                                    37e397b00d04e6eca951cecd15e10bef76001fe4

                                                                                                                    SHA256

                                                                                                                    ec94626174255c1a651c71ff9abdb1734e5eb07357176cb05b0ccd971ad924d7

                                                                                                                    SHA512

                                                                                                                    27d15d587a85f796eaca3a2b7102e0ac82db1a968a17a6a29afa19a903d6e81a852eb08eb226fe2cedaae77ef824406ce3c6778ffa1d29080898ab73e94bfcef

                                                                                                                  • C:\ProgramData\Microsoft\Windows\WER\Temp\WERDEC9.tmp.csv

                                                                                                                    Filesize

                                                                                                                    40KB

                                                                                                                    MD5

                                                                                                                    211dad3389a8a7f114dac791dd949ea5

                                                                                                                    SHA1

                                                                                                                    1806fc2df92e27cf1fb16e0dcbf99b017e4316e9

                                                                                                                    SHA256

                                                                                                                    ce881647b63348925d0b53f27a653e3f2b571b1e17868e4bfac44e4e9eff0d75

                                                                                                                    SHA512

                                                                                                                    7bff1e93f29ec2322312af5ad4fad7a60ed7215fd9c4ee38660b2c5c0167ac21085b1de0d6c491c104c993d92a3f1e3a149f4221ebfafcd2c9b01a74f787c1de

                                                                                                                  • C:\ProgramData\Microsoft\Windows\WER\Temp\WERDEE9.tmp.txt

                                                                                                                    Filesize

                                                                                                                    13KB

                                                                                                                    MD5

                                                                                                                    dc33f08c54302941db5e2dc37c096ba7

                                                                                                                    SHA1

                                                                                                                    bd84cb10a6ce43d48f6bf444e00e3c9f9dff7906

                                                                                                                    SHA256

                                                                                                                    e417494f679835b8c3310aced9eb2dc7f853db80ca01a7c71cc289b3579b96e6

                                                                                                                    SHA512

                                                                                                                    de9cd202fa0652d2d68d5002109900c60e3f08af2196d13a352c9f90bd3f6835a2be94ccd571c6275ef70d77fccd6e06d99299beef359fde6c11dea1abae9cb8

                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                    Filesize

                                                                                                                    2KB

                                                                                                                    MD5

                                                                                                                    d85ba6ff808d9e5444a4b369f5bc2730

                                                                                                                    SHA1

                                                                                                                    31aa9d96590fff6981b315e0b391b575e4c0804a

                                                                                                                    SHA256

                                                                                                                    84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                                                                                                                    SHA512

                                                                                                                    8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                    Filesize

                                                                                                                    944B

                                                                                                                    MD5

                                                                                                                    77d622bb1a5b250869a3238b9bc1402b

                                                                                                                    SHA1

                                                                                                                    d47f4003c2554b9dfc4c16f22460b331886b191b

                                                                                                                    SHA256

                                                                                                                    f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb

                                                                                                                    SHA512

                                                                                                                    d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9

                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                    Filesize

                                                                                                                    944B

                                                                                                                    MD5

                                                                                                                    01fff31a70e26012f37789b179059e32

                                                                                                                    SHA1

                                                                                                                    555b6f05cce7daf46920df1c01eb5c55dc62c9e6

                                                                                                                    SHA256

                                                                                                                    adf65afaf1c83572f05a99bf2ede8eb7be1aab0717d5254f501d5e09ba6f587b

                                                                                                                    SHA512

                                                                                                                    ac310c9bc5c1effc45e1e425972b09d1f961af216b50e1a504caa046b7f1a5f3179760e0b29591d83756ecb686d17a24770cf06fcea57e6f287ca5bbf6b6971b

                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                    Filesize

                                                                                                                    944B

                                                                                                                    MD5

                                                                                                                    d8cb3e9459807e35f02130fad3f9860d

                                                                                                                    SHA1

                                                                                                                    5af7f32cb8a30e850892b15e9164030a041f4bd6

                                                                                                                    SHA256

                                                                                                                    2b139c74072ccbdaa17b950f32a6dbc934dfb7af9973d97c9b0d9c498012ba68

                                                                                                                    SHA512

                                                                                                                    045239ba31367fbdd59e883f74eafc05724e23bd6e8f0c1e7171ea2496a497eb9e0cfcb57285bb81c4d569daadba43d6ef64c626ca48f1e2a59e8d97f0cc9184

                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_2qrg2lz0.ykw.ps1

                                                                                                                    Filesize

                                                                                                                    60B

                                                                                                                    MD5

                                                                                                                    d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                    SHA1

                                                                                                                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                    SHA256

                                                                                                                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                    SHA512

                                                                                                                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\gfwkwksb.psl.exe

                                                                                                                    Filesize

                                                                                                                    161KB

                                                                                                                    MD5

                                                                                                                    94f1ab3a068f83b32639579ec9c5d025

                                                                                                                    SHA1

                                                                                                                    38f3d5bc5de46feb8de093d11329766b8e2054ae

                                                                                                                    SHA256

                                                                                                                    879cc20b41635709bb304e315aaa5ca4708b480a1bfc2f4935fcf2215188efb0

                                                                                                                    SHA512

                                                                                                                    44d5236a804d63302b21ca25ebc148a64605508d03c990a244c44ceb8630849da0510b7b2d0bee72e01ca6681e2d86d7e6aee8847674a26f0028d149b9abee0c

                                                                                                                  • memory/376-23-0x000001A243D20000-0x000001A243D4B000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    172KB

                                                                                                                  • memory/376-29-0x00007FFBB336F000-0x00007FFBB3370000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4KB

                                                                                                                  • memory/376-320-0x000001A243D20000-0x000001A243D4B000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    172KB

                                                                                                                  • memory/376-27-0x000001A243D20000-0x000001A243D4B000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    172KB

                                                                                                                  • memory/376-28-0x00007FFBB336D000-0x00007FFBB336E000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4KB

                                                                                                                  • memory/528-431-0x00000287DC0D0000-0x00000287DC0FB000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    172KB

                                                                                                                  • memory/528-39-0x00000287DC0D0000-0x00000287DC0FB000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    172KB

                                                                                                                  • memory/528-37-0x00007FFB73350000-0x00007FFB73360000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    64KB

                                                                                                                  • memory/528-36-0x00000287DC0D0000-0x00000287DC0FB000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    172KB

                                                                                                                  • memory/628-24-0x0000012DC94F0000-0x0000012DC951B000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    172KB

                                                                                                                  • memory/628-14-0x0000012DC94F0000-0x0000012DC951B000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    172KB

                                                                                                                  • memory/628-15-0x00007FFB73350000-0x00007FFB73360000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    64KB

                                                                                                                  • memory/628-13-0x0000012DC94B0000-0x0000012DC94D5000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    148KB

                                                                                                                  • memory/628-25-0x00007FFBB336D000-0x00007FFBB336E000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4KB

                                                                                                                  • memory/696-18-0x00000196D26F0000-0x00000196D271B000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    172KB

                                                                                                                  • memory/696-26-0x00000196D26F0000-0x00000196D271B000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    172KB

                                                                                                                  • memory/696-19-0x00007FFB73350000-0x00007FFB73360000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    64KB

                                                                                                                  • memory/976-34-0x00007FFBB336C000-0x00007FFBB336D000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4KB

                                                                                                                  • memory/976-31-0x00007FFB73350000-0x00007FFB73360000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    64KB

                                                                                                                  • memory/976-30-0x000001E93D2D0000-0x000001E93D2FB000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    172KB

                                                                                                                  • memory/976-33-0x000001E93D2D0000-0x000001E93D2FB000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    172KB

                                                                                                                  • memory/976-349-0x000001E93D2D0000-0x000001E93D2FB000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    172KB

                                                                                                                  • memory/1012-43-0x000001E6CB780000-0x000001E6CB7AB000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    172KB

                                                                                                                  • memory/1012-44-0x00007FFB73350000-0x00007FFB73360000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    64KB

                                                                                                                  • memory/1012-52-0x000001E6CB780000-0x000001E6CB7AB000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    172KB

                                                                                                                  • memory/1012-471-0x000001E6CB780000-0x000001E6CB7AB000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    172KB

                                                                                                                  • memory/1120-46-0x00000203D8E60000-0x00000203D8E8B000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    172KB

                                                                                                                  • memory/1120-47-0x00007FFB73350000-0x00007FFB73360000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    64KB

                                                                                                                  • memory/1120-53-0x00000203D8E60000-0x00000203D8E8B000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    172KB

                                                                                                                  • memory/1120-472-0x00000203D8E60000-0x00000203D8E8B000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    172KB

                                                                                                                  • memory/1128-50-0x00007FFB73350000-0x00007FFB73360000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    64KB

                                                                                                                  • memory/1128-49-0x0000023EA5430000-0x0000023EA545B000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    172KB

                                                                                                                  • memory/1136-56-0x000001752CA60000-0x000001752CA8B000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    172KB

                                                                                                                  • memory/1136-57-0x00007FFB73350000-0x00007FFB73360000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    64KB

                                                                                                                  • memory/1144-60-0x00007FFB73350000-0x00007FFB73360000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    64KB

                                                                                                                  • memory/1144-59-0x00000178FC130000-0x00000178FC15B000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    172KB

                                                                                                                  • memory/1224-63-0x0000024C24EB0000-0x0000024C24EDB000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    172KB

                                                                                                                  • memory/1224-64-0x00007FFB73350000-0x00007FFB73360000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    64KB

                                                                                                                  • memory/3532-363-0x000001F055DF0000-0x000001F055E12000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    136KB

                                                                                                                  • memory/3976-12-0x00007FFBB1470000-0x00007FFBB152E000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    760KB

                                                                                                                  • memory/3976-11-0x00007FFBB32D0000-0x00007FFBB34C5000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    2.0MB

                                                                                                                  • memory/4228-340-0x00007FFB951C3000-0x00007FFB951C5000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    8KB

                                                                                                                  • memory/4228-333-0x0000025142070000-0x0000025142098000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    160KB

                                                                                                                  • memory/4228-0-0x00007FFB951C3000-0x00007FFB951C5000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    8KB

                                                                                                                  • memory/4228-497-0x00007FFBB32D0000-0x00007FFBB34C5000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    2.0MB

                                                                                                                  • memory/4228-2-0x0000025127CE0000-0x0000025127D0C000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    176KB

                                                                                                                  • memory/4228-1-0x0000025127900000-0x000002512795A000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    360KB