Analysis

  • max time kernel
    9s
  • max time network
    10s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/03/2025, 20:58

Errors

Reason
Machine shutdown

General

  • Target

    XClient.exe

  • Size

    336KB

  • MD5

    5fcc047b04b088650ffab33ab0d3a991

  • SHA1

    310de3660d360e55e02aeabc2bb96fe1a00fbeb1

  • SHA256

    227dbbb256d5236819196deda5707bc6abd1df5ba9a483edf82443ad12f26930

  • SHA512

    5bc2803bb1fbcd18b33f7c23120fa144cb29c07376c40622f20d69386932bbf82e8160ec7ec11c781a0624a875ee198369c7b2cf8b2464986054d7c5d94c4cf4

  • SSDEEP

    6144:gv9QxBt25x/5bTgVziHzZnSKrCbYM+2ba8Mq:NxBt8/5/gVziHlBrCbYP85

Malware Config

Extracted

Family

xworm

Version

5.0

Signatures

  • Detect Xworm Payload 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Indicator Removal: Clear Windows Event Logs 1 TTPs 1 IoCs

    Clear Windows Event Logs to hide the activity of an intrusion.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies data under HKEY_USERS 44 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:608
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1020
    • C:\Windows\system32\lsass.exe
      C:\Windows\system32\lsass.exe
      1⤵
        PID:672
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
        1⤵
          PID:952
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
          1⤵
            PID:516
          • C:\Windows\System32\svchost.exe
            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
            1⤵
              PID:992
            • C:\Windows\System32\svchost.exe
              C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
              1⤵
                PID:1064
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                1⤵
                  PID:1076
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                  1⤵
                  • Drops file in System32 directory
                  PID:1144
                  • C:\Windows\system32\taskhostw.exe
                    taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                    2⤵
                      PID:2888
                    • C:\Windows\system32\MusNotification.exe
                      C:\Windows\system32\MusNotification.exe
                      2⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:5056
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                    1⤵
                      PID:1204
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                      1⤵
                        PID:1220
                      • C:\Windows\System32\svchost.exe
                        C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                        1⤵
                        • Indicator Removal: Clear Windows Event Logs
                        PID:1252
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                        1⤵
                          PID:1368
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                          1⤵
                            PID:1396
                            • C:\Windows\system32\sihost.exe
                              sihost.exe
                              2⤵
                                PID:2568
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                              1⤵
                                PID:1444
                              • C:\Windows\System32\svchost.exe
                                C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                1⤵
                                  PID:1456
                                • C:\Windows\system32\svchost.exe
                                  C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                                  1⤵
                                    PID:1504
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                    1⤵
                                      PID:1564
                                    • C:\Windows\System32\svchost.exe
                                      C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                      1⤵
                                        PID:1628
                                      • C:\Windows\System32\svchost.exe
                                        C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                                        1⤵
                                          PID:1664
                                        • C:\Windows\System32\svchost.exe
                                          C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                          1⤵
                                            PID:1736
                                          • C:\Windows\System32\svchost.exe
                                            C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm
                                            1⤵
                                              PID:1764
                                            • C:\Windows\system32\svchost.exe
                                              C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache
                                              1⤵
                                                PID:1856
                                              • C:\Windows\System32\svchost.exe
                                                C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                1⤵
                                                  PID:1864
                                                • C:\Windows\system32\svchost.exe
                                                  C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                  1⤵
                                                    PID:1912
                                                  • C:\Windows\System32\svchost.exe
                                                    C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                    1⤵
                                                      PID:1920
                                                    • C:\Windows\System32\spoolsv.exe
                                                      C:\Windows\System32\spoolsv.exe
                                                      1⤵
                                                        PID:2024
                                                      • C:\Windows\System32\svchost.exe
                                                        C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                        1⤵
                                                          PID:2076
                                                        • C:\Windows\System32\svchost.exe
                                                          C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                          1⤵
                                                            PID:2244
                                                          • C:\Windows\system32\svchost.exe
                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                            1⤵
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:2252
                                                          • C:\Windows\system32\svchost.exe
                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                            1⤵
                                                              PID:2400
                                                            • C:\Windows\system32\svchost.exe
                                                              C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                              1⤵
                                                                PID:2408
                                                              • C:\Windows\system32\svchost.exe
                                                                C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                                1⤵
                                                                  PID:2596
                                                                • C:\Windows\system32\svchost.exe
                                                                  C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc
                                                                  1⤵
                                                                  • Drops file in System32 directory
                                                                  PID:2680
                                                                • C:\Windows\system32\svchost.exe
                                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                                  1⤵
                                                                  • Enumerates connected drives
                                                                  PID:2748
                                                                • C:\Windows\sysmon.exe
                                                                  C:\Windows\sysmon.exe
                                                                  1⤵
                                                                    PID:2760
                                                                  • C:\Windows\System32\svchost.exe
                                                                    C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                                    1⤵
                                                                      PID:2780
                                                                    • C:\Windows\system32\svchost.exe
                                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                                      1⤵
                                                                        PID:2824
                                                                      • C:\Windows\system32\wbem\unsecapp.exe
                                                                        C:\Windows\system32\wbem\unsecapp.exe -Embedding
                                                                        1⤵
                                                                          PID:2988
                                                                        • C:\Windows\system32\svchost.exe
                                                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker
                                                                          1⤵
                                                                            PID:2860
                                                                          • C:\Windows\system32\svchost.exe
                                                                            C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
                                                                            1⤵
                                                                              PID:3444
                                                                            • C:\Windows\Explorer.EXE
                                                                              C:\Windows\Explorer.EXE
                                                                              1⤵
                                                                                PID:3452
                                                                                • C:\Users\Admin\AppData\Local\Temp\XClient.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
                                                                                  2⤵
                                                                                  • Checks computer location settings
                                                                                  • Drops startup file
                                                                                  • Adds Run key to start application
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  • Suspicious use of WriteProcessMemory
                                                                                  PID:3748
                                                                                  • C:\Users\Admin\AppData\Local\Temp\chkxjn1o.ofl.exe
                                                                                    "C:\Users\Admin\AppData\Local\Temp\chkxjn1o.ofl.exe"
                                                                                    3⤵
                                                                                    • Executes dropped EXE
                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    • Suspicious use of WriteProcessMemory
                                                                                    PID:4636
                                                                                  • C:\Windows\SYSTEM32\SCHTASKS.exe
                                                                                    "SCHTASKS.exe" /create /tn "MasonXClient.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\XClient.exe'" /sc onlogon /rl HIGHEST
                                                                                    3⤵
                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                    PID:4872
                                                                                  • C:\Windows\SYSTEM32\SCHTASKS.exe
                                                                                    "SCHTASKS.exe" /create /tn "MasonXClient.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\XClient.exe'" /sc onlogon /rl HIGHEST
                                                                                    3⤵
                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                    PID:100
                                                                                    • C:\Windows\System32\Conhost.exe
                                                                                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                      4⤵
                                                                                        PID:868
                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'
                                                                                      3⤵
                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                      PID:4528
                                                                                      • C:\Windows\System32\Conhost.exe
                                                                                        \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        4⤵
                                                                                          PID:3384
                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'
                                                                                        3⤵
                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                        PID:1792
                                                                                        • C:\Windows\System32\Conhost.exe
                                                                                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                          4⤵
                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                          PID:4996
                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\svchost.exe'
                                                                                        3⤵
                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                        PID:4112
                                                                                        • C:\Windows\System32\Conhost.exe
                                                                                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                          4⤵
                                                                                            PID:3796
                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'
                                                                                          3⤵
                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                          PID:4060
                                                                                          • C:\Windows\System32\Conhost.exe
                                                                                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            4⤵
                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                            PID:1288
                                                                                        • C:\Windows\System32\schtasks.exe
                                                                                          "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\Users\Admin\AppData\Roaming\svchost.exe"
                                                                                          3⤵
                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                          PID:1684
                                                                                          • C:\Windows\System32\Conhost.exe
                                                                                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            4⤵
                                                                                              PID:3924
                                                                                      • C:\Windows\system32\svchost.exe
                                                                                        C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                                                                        1⤵
                                                                                          PID:3648
                                                                                        • C:\Windows\system32\DllHost.exe
                                                                                          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                          1⤵
                                                                                            PID:3836
                                                                                          • C:\Windows\System32\RuntimeBroker.exe
                                                                                            C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                            1⤵
                                                                                              PID:4032
                                                                                            • C:\Windows\System32\RuntimeBroker.exe
                                                                                              C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                              1⤵
                                                                                                PID:4168
                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                                1⤵
                                                                                                • Drops file in System32 directory
                                                                                                • Modifies data under HKEY_USERS
                                                                                                PID:4156
                                                                                              • C:\Windows\System32\svchost.exe
                                                                                                C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                                1⤵
                                                                                                  PID:552
                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                  C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV
                                                                                                  1⤵
                                                                                                    PID:1800
                                                                                                  • C:\Windows\System32\svchost.exe
                                                                                                    C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                                                    1⤵
                                                                                                      PID:1488
                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                      C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                                                                      1⤵
                                                                                                      • Modifies data under HKEY_USERS
                                                                                                      PID:4868
                                                                                                    • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                                                                                      "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                                                                                      1⤵
                                                                                                        PID:1096
                                                                                                      • C:\Windows\system32\SppExtComObj.exe
                                                                                                        C:\Windows\system32\SppExtComObj.exe -Embedding
                                                                                                        1⤵
                                                                                                          PID:4484
                                                                                                        • C:\Windows\System32\svchost.exe
                                                                                                          C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                                          1⤵
                                                                                                            PID:4424
                                                                                                          • C:\Windows\system32\DllHost.exe
                                                                                                            C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                            1⤵
                                                                                                              PID:4560
                                                                                                            • C:\Windows\system32\svchost.exe
                                                                                                              C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc
                                                                                                              1⤵
                                                                                                                PID:2712
                                                                                                              • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                1⤵
                                                                                                                  PID:1716
                                                                                                                • C:\Windows\system32\backgroundTaskHost.exe
                                                                                                                  "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
                                                                                                                  1⤵
                                                                                                                    PID:4092
                                                                                                                  • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                    C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                    1⤵
                                                                                                                      PID:4504
                                                                                                                    • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                      C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                      1⤵
                                                                                                                        PID:3520
                                                                                                                      • C:\Windows\System32\WaaSMedicAgent.exe
                                                                                                                        C:\Windows\System32\WaaSMedicAgent.exe b6b5d39c37041e5e8fcd915bf6fe1a06 lEXGqPLLbU6AC8HECirSJQ.0.1.0.0.0
                                                                                                                        1⤵
                                                                                                                        • Modifies data under HKEY_USERS
                                                                                                                        PID:3464
                                                                                                                        • C:\Windows\System32\Conhost.exe
                                                                                                                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                          2⤵
                                                                                                                            PID:1364
                                                                                                                        • C:\Windows\system32\svchost.exe
                                                                                                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
                                                                                                                          1⤵
                                                                                                                          • Drops file in Windows directory
                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                          PID:2152
                                                                                                                        • C:\Windows\system32\wbem\wmiprvse.exe
                                                                                                                          C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                                          1⤵
                                                                                                                          • Writes to the Master Boot Record (MBR)
                                                                                                                          PID:4216
                                                                                                                        • C:\Windows\servicing\TrustedInstaller.exe
                                                                                                                          C:\Windows\servicing\TrustedInstaller.exe
                                                                                                                          1⤵
                                                                                                                            PID:4596

                                                                                                                          Network

                                                                                                                          MITRE ATT&CK Enterprise v15

                                                                                                                          Replay Monitor

                                                                                                                          Loading Replay Monitor...

                                                                                                                          Downloads

                                                                                                                          • C:\ProgramData\Microsoft\Windows\WER\Temp\WERC796.tmp.csv

                                                                                                                            Filesize

                                                                                                                            39KB

                                                                                                                            MD5

                                                                                                                            fd0295c717dd5798e11081f20f93a483

                                                                                                                            SHA1

                                                                                                                            947896f1b62170e352923d14442d3c3ad3fa29cc

                                                                                                                            SHA256

                                                                                                                            b48c99281c29bb2223a7963449d1e759fc303a810de76aad6d8d7e9954565c7f

                                                                                                                            SHA512

                                                                                                                            2127d709ddf45b9c35f101cf1e7097937f7aff4b4394e68ee9395830cc68cc839f442930bdf7ff23df5531a775710f7b3cc29a434deea5a2d29759f52f12d74b

                                                                                                                          • C:\ProgramData\Microsoft\Windows\WER\Temp\WERC7C5.tmp.txt

                                                                                                                            Filesize

                                                                                                                            13KB

                                                                                                                            MD5

                                                                                                                            65bd6a548ff996393fcc9b1d41d642b6

                                                                                                                            SHA1

                                                                                                                            3d6e785ad806fdf6c5bdbf5f6c04defcb1139276

                                                                                                                            SHA256

                                                                                                                            2d843b0329d38519b64b48769854ca22e91a7aac0edd237b61883607c96b6c08

                                                                                                                            SHA512

                                                                                                                            eb107b58f6fd3e1905658f44e48d3d4f5735ba916088bf725e1ae5e6a18c0f687b3174e0f915d469115bbc7086bfd20a0b6908debe86c3821bffd1c761c00c19

                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                            Filesize

                                                                                                                            2KB

                                                                                                                            MD5

                                                                                                                            d85ba6ff808d9e5444a4b369f5bc2730

                                                                                                                            SHA1

                                                                                                                            31aa9d96590fff6981b315e0b391b575e4c0804a

                                                                                                                            SHA256

                                                                                                                            84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                                                                                                                            SHA512

                                                                                                                            8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                            Filesize

                                                                                                                            944B

                                                                                                                            MD5

                                                                                                                            d28a889fd956d5cb3accfbaf1143eb6f

                                                                                                                            SHA1

                                                                                                                            157ba54b365341f8ff06707d996b3635da8446f7

                                                                                                                            SHA256

                                                                                                                            21e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45

                                                                                                                            SHA512

                                                                                                                            0b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c

                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                            Filesize

                                                                                                                            944B

                                                                                                                            MD5

                                                                                                                            aba273eeba4876ea41ee0e64b4cbb51d

                                                                                                                            SHA1

                                                                                                                            bef5f75b81cf27268dc0d0f30f00b022f9288db9

                                                                                                                            SHA256

                                                                                                                            67fc3f5c3407858793c6fac6131b0f340667ffc567fa76b43245ecf2621322c9

                                                                                                                            SHA512

                                                                                                                            23dc2f0cfc68194dcbf407a6528cf9f9a8aa89f4821be22413bde036ae5ca44144b568aa3160372b9741f3d0f5baa48dff8a8b582bdedc3ad3fb121af340c0ae

                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                            Filesize

                                                                                                                            944B

                                                                                                                            MD5

                                                                                                                            481c1608c2bec426ca209e8800611abd

                                                                                                                            SHA1

                                                                                                                            5df5a08760b0e5c56cb9daf768894435354d2651

                                                                                                                            SHA256

                                                                                                                            44e538c7570e175634f9929d350a79203730fcb753638f611a1dd4780ec430ed

                                                                                                                            SHA512

                                                                                                                            5a87762225beffbd34048fd0d617a75eff25ca6dfe47c258cdfad8c841f8b0b4144ae8c7ef04ee5de36987cb6ae0953499d5fa27b2100483a8042ee5e27d190c

                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_yqu3cbu1.qyg.ps1

                                                                                                                            Filesize

                                                                                                                            60B

                                                                                                                            MD5

                                                                                                                            d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                            SHA1

                                                                                                                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                            SHA256

                                                                                                                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                            SHA512

                                                                                                                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\chkxjn1o.ofl.exe

                                                                                                                            Filesize

                                                                                                                            161KB

                                                                                                                            MD5

                                                                                                                            94f1ab3a068f83b32639579ec9c5d025

                                                                                                                            SHA1

                                                                                                                            38f3d5bc5de46feb8de093d11329766b8e2054ae

                                                                                                                            SHA256

                                                                                                                            879cc20b41635709bb304e315aaa5ca4708b480a1bfc2f4935fcf2215188efb0

                                                                                                                            SHA512

                                                                                                                            44d5236a804d63302b21ca25ebc148a64605508d03c990a244c44ceb8630849da0510b7b2d0bee72e01ca6681e2d86d7e6aee8847674a26f0028d149b9abee0c

                                                                                                                          • memory/516-39-0x00007FFF7B2F0000-0x00007FFF7B300000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            64KB

                                                                                                                          • memory/516-41-0x00000163021A0000-0x00000163021CB000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            172KB

                                                                                                                          • memory/516-423-0x00000163021A0000-0x00000163021CB000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            172KB

                                                                                                                          • memory/516-38-0x00000163021A0000-0x00000163021CB000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            172KB

                                                                                                                          • memory/608-26-0x00000204A4F40000-0x00000204A4F6B000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            172KB

                                                                                                                          • memory/608-27-0x00007FFFBB30D000-0x00007FFFBB30E000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            4KB

                                                                                                                          • memory/608-13-0x00000204A4F10000-0x00000204A4F35000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            148KB

                                                                                                                          • memory/608-14-0x00000204A4F40000-0x00000204A4F6B000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            172KB

                                                                                                                          • memory/608-15-0x00007FFF7B2F0000-0x00007FFF7B300000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            64KB

                                                                                                                          • memory/672-19-0x00007FFF7B2F0000-0x00007FFF7B300000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            64KB

                                                                                                                          • memory/672-18-0x000002B5C7000000-0x000002B5C702B000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            172KB

                                                                                                                          • memory/672-28-0x000002B5C7000000-0x000002B5C702B000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            172KB

                                                                                                                          • memory/952-33-0x0000017147ED0000-0x0000017147EFB000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            172KB

                                                                                                                          • memory/952-36-0x0000017147ED0000-0x0000017147EFB000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            172KB

                                                                                                                          • memory/952-345-0x0000017147ED0000-0x0000017147EFB000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            172KB

                                                                                                                          • memory/952-34-0x00007FFF7B2F0000-0x00007FFF7B300000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            64KB

                                                                                                                          • memory/992-47-0x00007FFF7B2F0000-0x00007FFF7B300000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            64KB

                                                                                                                          • memory/992-464-0x000002021B200000-0x000002021B22B000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            172KB

                                                                                                                          • memory/992-58-0x000002021B200000-0x000002021B22B000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            172KB

                                                                                                                          • memory/992-46-0x000002021B200000-0x000002021B22B000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            172KB

                                                                                                                          • memory/1020-30-0x00007FFFBB30C000-0x00007FFFBB30D000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            4KB

                                                                                                                          • memory/1020-31-0x00007FFFBB30F000-0x00007FFFBB310000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            4KB

                                                                                                                          • memory/1020-32-0x00007FFF7B2F0000-0x00007FFF7B300000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            64KB

                                                                                                                          • memory/1020-29-0x0000023F1A7A0000-0x0000023F1A7CB000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            172KB

                                                                                                                          • memory/1020-23-0x0000023F1A7A0000-0x0000023F1A7CB000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            172KB

                                                                                                                          • memory/1064-465-0x000001690A360000-0x000001690A38B000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            172KB

                                                                                                                          • memory/1064-50-0x00007FFF7B2F0000-0x00007FFF7B300000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            64KB

                                                                                                                          • memory/1064-49-0x000001690A360000-0x000001690A38B000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            172KB

                                                                                                                          • memory/1064-59-0x000001690A360000-0x000001690A38B000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            172KB

                                                                                                                          • memory/1076-53-0x00007FFF7B2F0000-0x00007FFF7B300000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            64KB

                                                                                                                          • memory/1076-52-0x000001F808DD0000-0x000001F808DFB000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            172KB

                                                                                                                          • memory/1144-55-0x0000020FDC490000-0x0000020FDC4BB000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            172KB

                                                                                                                          • memory/1144-56-0x00007FFF7B2F0000-0x00007FFF7B300000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            64KB

                                                                                                                          • memory/1204-61-0x0000017241B90000-0x0000017241BBB000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            172KB

                                                                                                                          • memory/1204-62-0x00007FFF7B2F0000-0x00007FFF7B300000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            64KB

                                                                                                                          • memory/1220-72-0x000001E7AD970000-0x000001E7AD99B000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            172KB

                                                                                                                          • memory/1220-73-0x00007FFF7B2F0000-0x00007FFF7B300000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            64KB

                                                                                                                          • memory/1252-76-0x00007FFF7B2F0000-0x00007FFF7B300000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            64KB

                                                                                                                          • memory/1252-75-0x000002825B650000-0x000002825B67B000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            172KB

                                                                                                                          • memory/1368-79-0x00007FFF7B2F0000-0x00007FFF7B300000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            64KB

                                                                                                                          • memory/1368-78-0x000001D326C90000-0x000001D326CBB000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            172KB

                                                                                                                          • memory/1396-81-0x000001D1A4970000-0x000001D1A499B000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            172KB

                                                                                                                          • memory/1396-82-0x00007FFF7B2F0000-0x00007FFF7B300000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            64KB

                                                                                                                          • memory/1456-83-0x000001EDA7160000-0x000001EDA718B000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            172KB

                                                                                                                          • memory/1456-85-0x00007FFF7B2F0000-0x00007FFF7B300000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            64KB

                                                                                                                          • memory/3748-297-0x00000276659B0000-0x00000276659D8000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            160KB

                                                                                                                          • memory/3748-466-0x0000027665840000-0x0000027665850000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            64KB

                                                                                                                          • memory/3748-291-0x00007FFF9D1B3000-0x00007FFF9D1B5000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            8KB

                                                                                                                          • memory/3748-0-0x00007FFF9D1B3000-0x00007FFF9D1B5000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            8KB

                                                                                                                          • memory/3748-2-0x00000276654D0000-0x00000276654FC000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            176KB

                                                                                                                          • memory/3748-1-0x000002764B110000-0x000002764B16A000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            360KB

                                                                                                                          • memory/4528-355-0x000001AF74F80000-0x000001AF74FA2000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            136KB

                                                                                                                          • memory/4636-12-0x00007FFFBAC40000-0x00007FFFBACFE000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            760KB

                                                                                                                          • memory/4636-11-0x00007FFFBB270000-0x00007FFFBB465000-memory.dmp

                                                                                                                            Filesize

                                                                                                                            2.0MB