Analysis

  • max time kernel
    18s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    11/03/2024, 09:23

General

  • Target

    Hollow.cc.exe

  • Size

    89KB

  • MD5

    daeae07e61c80cabc482c3b3f30183bf

  • SHA1

    34afd425664c4cedd49c15e6dea81debce01ef4d

  • SHA256

    90bfb31560bdff53539aa556437edb6ec0a1760928ea585e4c621994fbe020ea

  • SHA512

    bf37703a58de244b6fefe706645aa2b296c32cda96834841861a3751022eb51c8277f4f3ccab397ba2897a78757234b73ecefa23e1e0c7f16ddb2f002ee859a9

  • SSDEEP

    1536:QcBXBwWcN2p5qfIqZvUpYyIovpoK5ZFb9B90O0muuJJReU:QcBX3k2DqfIqZ3y3vpoK7R9B90/MDwU

Score
8/10

Malware Config

Signatures

  • Stops running service(s) 3 TTPs
  • Launches sc.exe 15 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 56 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 34 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Hollow.cc.exe
    "C:\Users\Admin\AppData\Local\Temp\Hollow.cc.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2612
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2088
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im HTTPDebuggerUI.exe
        3⤵
        • Kills process with taskkill
        PID:1164
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2276
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im HTTPDebuggerSvc.exe
        3⤵
        • Kills process with taskkill
        PID:1544
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c taskkill /f /im Ida64.exe >nul 2>&1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2432
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im Ida64.exe
        3⤵
        • Kills process with taskkill
        PID:2284
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c taskkill /f /im OllyDbg.exe >nul 2>&1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1760
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im OllyDbg.exe
        3⤵
        • Kills process with taskkill
        PID:2196
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c taskkill /f /im Dbg64.exe >nul 2>&1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:956
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im Dbg64.exe
        3⤵
        • Kills process with taskkill
        PID:1700
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c taskkill /f /im beamer.exe >nul 2>&1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1292
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im beamer.exe
        3⤵
        • Kills process with taskkill
        PID:844
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c taskkill /f /im UD.exe >nul 2>&1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2624
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im UD.exe
        3⤵
        • Kills process with taskkill
        PID:2660
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c taskkill /f /im Dbg32.exe >nul 2>&1
      2⤵
        PID:1692
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /f /im Dbg32.exe
          3⤵
          • Kills process with taskkill
          PID:2744
      • C:\Windows\SysWOW64\cmd.exe
        "cmd.exe" /c sc stop HTTPDebuggerPro >nul 2>&1
        2⤵
          PID:2492
          • C:\Windows\SysWOW64\sc.exe
            sc stop HTTPDebuggerPro
            3⤵
            • Launches sc.exe
            PID:2692
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&1
          2⤵
            PID:2408
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T
              3⤵
              • Kills process with taskkill
              PID:2700
          • C:\Windows\SysWOW64\cmd.exe
            "cmd.exe" /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
            2⤵
              PID:1224
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                3⤵
                • Kills process with taskkill
                PID:2452
            • C:\Windows\SysWOW64\cmd.exe
              "cmd.exe" /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&1
              2⤵
                PID:3068
                • C:\Windows\SysWOW64\taskkill.exe
                  taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T
                  3⤵
                  • Kills process with taskkill
                  PID:1496
              • C:\Windows\SysWOW64\cmd.exe
                "cmd.exe" /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&1
                2⤵
                  PID:2364
                  • C:\Windows\SysWOW64\taskkill.exe
                    taskkill /f /im HTTPDebuggerUI.exe
                    3⤵
                    • Kills process with taskkill
                    PID:2644
                • C:\Windows\SysWOW64\cmd.exe
                  "cmd.exe" /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&1
                  2⤵
                    PID:2896
                    • C:\Windows\SysWOW64\taskkill.exe
                      taskkill /f /im HTTPDebuggerSvc.exe
                      3⤵
                      • Kills process with taskkill
                      PID:2768
                  • C:\Windows\SysWOW64\cmd.exe
                    "cmd.exe" /c sc stop HTTPDebuggerPro >nul 2>&1
                    2⤵
                      PID:2208
                      • C:\Windows\SysWOW64\sc.exe
                        sc stop HTTPDebuggerPro
                        3⤵
                        • Launches sc.exe
                        PID:2624
                    • C:\Windows\SysWOW64\cmd.exe
                      "cmd.exe" /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&1
                      2⤵
                        PID:1516
                        • C:\Windows\SysWOW64\taskkill.exe
                          taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T
                          3⤵
                          • Kills process with taskkill
                          PID:1964
                      • C:\Windows\SysWOW64\cmd.exe
                        "cmd.exe" /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
                        2⤵
                          PID:2064
                          • C:\Windows\SysWOW64\taskkill.exe
                            taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                            3⤵
                            • Kills process with taskkill
                            PID:2844
                        • C:\Windows\SysWOW64\cmd.exe
                          "cmd.exe" /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&1
                          2⤵
                            PID:2744
                            • C:\Windows\SysWOW64\taskkill.exe
                              taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T
                              3⤵
                              • Kills process with taskkill
                              PID:2892
                          • C:\Windows\SysWOW64\cmd.exe
                            "cmd.exe" /c taskkill /FI "IMAGENAME eq x64dbg*" /IM * /F /T >nul 2>&1
                            2⤵
                              PID:2748
                              • C:\Windows\SysWOW64\taskkill.exe
                                taskkill /FI "IMAGENAME eq x64dbg*" /IM * /F /T
                                3⤵
                                • Kills process with taskkill
                                PID:2436
                            • C:\Windows\SysWOW64\cmd.exe
                              "cmd.exe" /c taskkill /FI "IMAGENAME eq x32dbg*" /IM * /F /T >nul 2>&1
                              2⤵
                                PID:2608
                                • C:\Windows\SysWOW64\taskkill.exe
                                  taskkill /FI "IMAGENAME eq x32dbg*" /IM * /F /T
                                  3⤵
                                  • Kills process with taskkill
                                  PID:2820
                              • C:\Windows\SysWOW64\cmd.exe
                                "cmd.exe" /c taskkill /FI "IMAGENAME eq ollydbg*" /IM * /F /T >nul 2>&1
                                2⤵
                                  PID:2448
                                  • C:\Windows\SysWOW64\taskkill.exe
                                    taskkill /FI "IMAGENAME eq ollydbg*" /IM * /F /T
                                    3⤵
                                    • Kills process with taskkill
                                    PID:776
                                • C:\Windows\SysWOW64\cmd.exe
                                  "cmd.exe" /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
                                  2⤵
                                    PID:924
                                    • C:\Windows\SysWOW64\taskkill.exe
                                      taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
                                      3⤵
                                      • Kills process with taskkill
                                      PID:760
                                  • C:\Windows\SysWOW64\cmd.exe
                                    "cmd.exe" /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
                                    2⤵
                                      PID:2276
                                      • C:\Windows\SysWOW64\taskkill.exe
                                        taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
                                        3⤵
                                        • Kills process with taskkill
                                        PID:1064
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "cmd.exe" /c taskkill /FI "IMAGENAME eq charles*" /IM * /F /T >nul 2>&1
                                      2⤵
                                        PID:2860
                                        • C:\Windows\SysWOW64\taskkill.exe
                                          taskkill /FI "IMAGENAME eq charles*" /IM * /F /T
                                          3⤵
                                          • Kills process with taskkill
                                          PID:2968
                                      • C:\Windows\SysWOW64\cmd.exe
                                        "cmd.exe" /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&1
                                        2⤵
                                          PID:1560
                                          • C:\Windows\SysWOW64\taskkill.exe
                                            taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T
                                            3⤵
                                            • Kills process with taskkill
                                            PID:2392
                                        • C:\Windows\SysWOW64\cmd.exe
                                          "cmd.exe" /c taskkill /FI "IMAGENAME eq ida*" /IM * /F /T >nul 2>&1
                                          2⤵
                                            PID:1736
                                            • C:\Windows\SysWOW64\taskkill.exe
                                              taskkill /FI "IMAGENAME eq ida*" /IM * /F /T
                                              3⤵
                                              • Kills process with taskkill
                                              PID:1536
                                          • C:\Windows\SysWOW64\cmd.exe
                                            "cmd.exe" /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
                                            2⤵
                                              PID:1988
                                              • C:\Windows\SysWOW64\taskkill.exe
                                                taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                                                3⤵
                                                • Kills process with taskkill
                                                PID:1432
                                            • C:\Windows\SysWOW64\cmd.exe
                                              "cmd.exe" /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&1
                                              2⤵
                                                PID:112
                                                • C:\Windows\SysWOW64\taskkill.exe
                                                  taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T
                                                  3⤵
                                                  • Kills process with taskkill
                                                  PID:572
                                              • C:\Windows\SysWOW64\cmd.exe
                                                "cmd.exe" /c sc stop HTTPDebuggerPro >nul 2>&1
                                                2⤵
                                                  PID:2184
                                                  • C:\Windows\SysWOW64\sc.exe
                                                    sc stop HTTPDebuggerPro
                                                    3⤵
                                                    • Launches sc.exe
                                                    PID:1612
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  "cmd.exe" /c sc stop HTTPDebuggerProSdk >nul 2>&1
                                                  2⤵
                                                    PID:2168
                                                    • C:\Windows\SysWOW64\sc.exe
                                                      sc stop HTTPDebuggerProSdk
                                                      3⤵
                                                      • Launches sc.exe
                                                      PID:2620
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    "cmd.exe" /c sc stop KProcessHacker3 >nul 2>&1
                                                    2⤵
                                                      PID:1684
                                                      • C:\Windows\SysWOW64\sc.exe
                                                        sc stop KProcessHacker3
                                                        3⤵
                                                        • Launches sc.exe
                                                        PID:1236
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      "cmd.exe" /c sc stop KProcessHacker2 >nul 2>&1
                                                      2⤵
                                                        PID:2708
                                                        • C:\Windows\SysWOW64\sc.exe
                                                          sc stop KProcessHacker2
                                                          3⤵
                                                          • Launches sc.exe
                                                          PID:2140
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        "cmd.exe" /c sc stop KProcessHacker1 >nul 2>&1
                                                        2⤵
                                                          PID:868
                                                          • C:\Windows\SysWOW64\sc.exe
                                                            sc stop KProcessHacker1
                                                            3⤵
                                                            • Launches sc.exe
                                                            PID:2028
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          "cmd.exe" /c sc stop wireshark >nul 2>&1
                                                          2⤵
                                                            PID:784
                                                            • C:\Windows\SysWOW64\sc.exe
                                                              sc stop wireshark
                                                              3⤵
                                                              • Launches sc.exe
                                                              PID:2364
                                                          • C:\Windows\SysWOW64\cmd.exe
                                                            "cmd.exe" /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&1
                                                            2⤵
                                                              PID:1112
                                                              • C:\Windows\SysWOW64\taskkill.exe
                                                                taskkill /f /im HTTPDebuggerSvc.exe
                                                                3⤵
                                                                • Kills process with taskkill
                                                                PID:1332
                                                            • C:\Windows\SysWOW64\cmd.exe
                                                              "cmd.exe" /c sc stop HTTPDebuggerPro >nul 2>&1
                                                              2⤵
                                                                PID:696
                                                                • C:\Windows\SysWOW64\sc.exe
                                                                  sc stop HTTPDebuggerPro
                                                                  3⤵
                                                                  • Launches sc.exe
                                                                  PID:2868
                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                "cmd.exe" /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&1
                                                                2⤵
                                                                  PID:2032
                                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                                    taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T
                                                                    3⤵
                                                                    • Kills process with taskkill
                                                                    PID:2772
                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                  "cmd.exe" /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
                                                                  2⤵
                                                                    PID:848
                                                                    • C:\Windows\SysWOW64\taskkill.exe
                                                                      taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                                                                      3⤵
                                                                      • Kills process with taskkill
                                                                      PID:2628
                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                    "cmd.exe" /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&1
                                                                    2⤵
                                                                      PID:2508
                                                                      • C:\Windows\SysWOW64\taskkill.exe
                                                                        taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T
                                                                        3⤵
                                                                        • Kills process with taskkill
                                                                        PID:1708
                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                      "cmd.exe" /c taskkill /FI "IMAGENAME eq x64dbg*" /IM * /F /T >nul 2>&1
                                                                      2⤵
                                                                        PID:1772
                                                                        • C:\Windows\SysWOW64\taskkill.exe
                                                                          taskkill /FI "IMAGENAME eq x64dbg*" /IM * /F /T
                                                                          3⤵
                                                                          • Kills process with taskkill
                                                                          PID:1756
                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                        "cmd.exe" /c taskkill /FI "IMAGENAME eq x32dbg*" /IM * /F /T >nul 2>&1
                                                                        2⤵
                                                                          PID:1232
                                                                          • C:\Windows\SysWOW64\taskkill.exe
                                                                            taskkill /FI "IMAGENAME eq x32dbg*" /IM * /F /T
                                                                            3⤵
                                                                            • Kills process with taskkill
                                                                            PID:2992
                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                          "cmd.exe" /c taskkill /FI "IMAGENAME eq ollydbg*" /IM * /F /T >nul 2>&1
                                                                          2⤵
                                                                            PID:1640
                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                              taskkill /FI "IMAGENAME eq ollydbg*" /IM * /F /T
                                                                              3⤵
                                                                              • Kills process with taskkill
                                                                              PID:2132
                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                            "cmd.exe" /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
                                                                            2⤵
                                                                              PID:1300
                                                                              • C:\Windows\SysWOW64\taskkill.exe
                                                                                taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
                                                                                3⤵
                                                                                • Kills process with taskkill
                                                                                PID:1996
                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                              "cmd.exe" /c taskkill /FI "IMAGENAME eq die*" /IM * /F /T >nul 2>&1
                                                                              2⤵
                                                                                PID:816
                                                                                • C:\Windows\SysWOW64\taskkill.exe
                                                                                  taskkill /FI "IMAGENAME eq die*" /IM * /F /T
                                                                                  3⤵
                                                                                  • Kills process with taskkill
                                                                                  PID:3004
                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                "cmd.exe" /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&1
                                                                                2⤵
                                                                                  PID:1532
                                                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                                                    taskkill /f /im HTTPDebuggerSvc.exe
                                                                                    3⤵
                                                                                    • Kills process with taskkill
                                                                                    PID:2312
                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                  "cmd.exe" /c taskkill /f /im HTTPDebugger.exe >nul 2>&1
                                                                                  2⤵
                                                                                    PID:2556
                                                                                    • C:\Windows\SysWOW64\taskkill.exe
                                                                                      taskkill /f /im HTTPDebugger.exe
                                                                                      3⤵
                                                                                      • Kills process with taskkill
                                                                                      PID:2208
                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                    "cmd.exe" /c taskkill /f /im FolderChangesView.exe >nul 2>&1
                                                                                    2⤵
                                                                                      PID:2292
                                                                                      • C:\Windows\SysWOW64\taskkill.exe
                                                                                        taskkill /f /im FolderChangesView.exe
                                                                                        3⤵
                                                                                        • Kills process with taskkill
                                                                                        PID:1516
                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                      "cmd.exe" /c sc stop HttpDebuggerSdk >nul 2>&1
                                                                                      2⤵
                                                                                        PID:2060
                                                                                        • C:\Windows\SysWOW64\sc.exe
                                                                                          sc stop HttpDebuggerSdk
                                                                                          3⤵
                                                                                          • Launches sc.exe
                                                                                          PID:2064
                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                        "cmd.exe" /c sc stop npf >nul 2>&1
                                                                                        2⤵
                                                                                          PID:2492
                                                                                          • C:\Windows\SysWOW64\sc.exe
                                                                                            sc stop npf
                                                                                            3⤵
                                                                                            • Launches sc.exe
                                                                                            PID:2892
                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                          "cmd.exe" /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&1
                                                                                          2⤵
                                                                                            PID:2340
                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                              taskkill /f /im HTTPDebuggerUI.exe
                                                                                              3⤵
                                                                                              • Kills process with taskkill
                                                                                              PID:2464
                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                            "cmd.exe" /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&1
                                                                                            2⤵
                                                                                              PID:1480
                                                                                              • C:\Windows\SysWOW64\taskkill.exe
                                                                                                taskkill /f /im HTTPDebuggerSvc.exe
                                                                                                3⤵
                                                                                                • Kills process with taskkill
                                                                                                PID:1908
                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                              "cmd.exe" /c taskkill /f /im Ida64.exe >nul 2>&1
                                                                                              2⤵
                                                                                                PID:2608
                                                                                                • C:\Windows\SysWOW64\taskkill.exe
                                                                                                  taskkill /f /im Ida64.exe
                                                                                                  3⤵
                                                                                                  • Kills process with taskkill
                                                                                                  PID:1164
                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                "cmd.exe" /c taskkill /f /im OllyDbg.exe >nul 2>&1
                                                                                                2⤵
                                                                                                  PID:2448
                                                                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                                                                    taskkill /f /im OllyDbg.exe
                                                                                                    3⤵
                                                                                                    • Kills process with taskkill
                                                                                                    PID:1404
                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                  "cmd.exe" /c taskkill /f /im Dbg64.exe >nul 2>&1
                                                                                                  2⤵
                                                                                                    PID:924
                                                                                                    • C:\Windows\SysWOW64\taskkill.exe
                                                                                                      taskkill /f /im Dbg64.exe
                                                                                                      3⤵
                                                                                                      • Kills process with taskkill
                                                                                                      PID:1460
                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                    "cmd.exe" /c taskkill /f /im beamer.exe >nul 2>&1
                                                                                                    2⤵
                                                                                                      PID:2276
                                                                                                      • C:\Windows\SysWOW64\taskkill.exe
                                                                                                        taskkill /f /im beamer.exe
                                                                                                        3⤵
                                                                                                        • Kills process with taskkill
                                                                                                        PID:2444
                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                      "cmd.exe" /c taskkill /f /im UD.exe >nul 2>&1
                                                                                                      2⤵
                                                                                                        PID:2860
                                                                                                        • C:\Windows\SysWOW64\taskkill.exe
                                                                                                          taskkill /f /im UD.exe
                                                                                                          3⤵
                                                                                                          • Kills process with taskkill
                                                                                                          PID:2420
                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                        "cmd.exe" /c taskkill /f /im Dbg32.exe >nul 2>&1
                                                                                                        2⤵
                                                                                                          PID:1560
                                                                                                          • C:\Windows\SysWOW64\taskkill.exe
                                                                                                            taskkill /f /im Dbg32.exe
                                                                                                            3⤵
                                                                                                            • Kills process with taskkill
                                                                                                            PID:1032
                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                          "cmd.exe" /c C:\Nexus\zhjers.exe /SU auto
                                                                                                          2⤵
                                                                                                            PID:2648
                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                            "cmd.exe" /c sc stop HTTPDebuggerPro >nul 2>&1
                                                                                                            2⤵
                                                                                                              PID:1432
                                                                                                              • C:\Windows\SysWOW64\sc.exe
                                                                                                                sc stop HTTPDebuggerPro
                                                                                                                3⤵
                                                                                                                • Launches sc.exe
                                                                                                                PID:1644
                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                              "cmd.exe" /c C:\Nexus\zhjers.exe /SS "Default string"
                                                                                                              2⤵
                                                                                                                PID:1664
                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                "cmd.exe" /c C:\Nexus\zhjers.exe /SV "1.0"
                                                                                                                2⤵
                                                                                                                  PID:1496
                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                  "cmd.exe" /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&1
                                                                                                                  2⤵
                                                                                                                    PID:2196
                                                                                                                    • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                      taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T
                                                                                                                      3⤵
                                                                                                                      • Kills process with taskkill
                                                                                                                      PID:1592
                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                    "cmd.exe" /c C:\Nexus\zhjers.exe /CSK "Default string"
                                                                                                                    2⤵
                                                                                                                      PID:1648
                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                      "cmd.exe" /c C:\Nexus\zhjers.exe /CM "Default string"
                                                                                                                      2⤵
                                                                                                                        PID:1492
                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                        "cmd.exe" /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
                                                                                                                        2⤵
                                                                                                                          PID:1824
                                                                                                                          • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                            taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                                                                                                                            3⤵
                                                                                                                            • Kills process with taskkill
                                                                                                                            PID:2140
                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                          "cmd.exe" /c C:\Nexus\zhjers.exe /SP "MS-7D22"
                                                                                                                          2⤵
                                                                                                                            PID:2412
                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                            "cmd.exe" /c C:\Nexus\zhjers.exe /SM "Micro-Star International Co., Ltd."
                                                                                                                            2⤵
                                                                                                                              PID:2236
                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                              "cmd.exe" /c C:\Nexus\zhjers.exe /SK "Default string"
                                                                                                                              2⤵
                                                                                                                                PID:2364
                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                "cmd.exe" /c C:\Nexus\zhjers.exe /SF "Default string"
                                                                                                                                2⤵
                                                                                                                                  PID:984
                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                  "cmd.exe" /c C:\Nexus\zhjers.exe /BM "Micro-Star International Co., Ltd."
                                                                                                                                  2⤵
                                                                                                                                    PID:1548
                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                    "cmd.exe" /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&1
                                                                                                                                    2⤵
                                                                                                                                      PID:1112
                                                                                                                                      • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                        taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T
                                                                                                                                        3⤵
                                                                                                                                        • Kills process with taskkill
                                                                                                                                        PID:528
                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                      "cmd.exe" /c C:\Nexus\zhjers.exe /BP "H510M-A PRO (MS-7D22)"
                                                                                                                                      2⤵
                                                                                                                                        PID:2120
                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                        "cmd.exe" /c C:\Nexus\zhjers.exe /BV "1.0"
                                                                                                                                        2⤵
                                                                                                                                          PID:1864
                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                          "cmd.exe" /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&1
                                                                                                                                          2⤵
                                                                                                                                            PID:2752
                                                                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                              taskkill /f /im HTTPDebuggerUI.exe
                                                                                                                                              3⤵
                                                                                                                                              • Kills process with taskkill
                                                                                                                                              PID:584
                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                            "cmd.exe" /c C:\Nexus\zhjers.exe /BT "Default string"
                                                                                                                                            2⤵
                                                                                                                                              PID:2684
                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                              "cmd.exe" /c C:\Nexus\zhjers.exe /BLC "Default string"
                                                                                                                                              2⤵
                                                                                                                                                PID:1220
                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                "cmd.exe" /c C:\Nexus\zhjers.exe /PSN "To Be Filled By O.E.M."
                                                                                                                                                2⤵
                                                                                                                                                  PID:2532
                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                  "cmd.exe" /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&1
                                                                                                                                                  2⤵
                                                                                                                                                    PID:2088
                                                                                                                                                    • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                      taskkill /f /im HTTPDebuggerSvc.exe
                                                                                                                                                      3⤵
                                                                                                                                                      • Kills process with taskkill
                                                                                                                                                      PID:1752
                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                    "cmd.exe" /c C:\Nexus\zhjers.exe /PAT "To Be Filled By O.E.M."
                                                                                                                                                    2⤵
                                                                                                                                                      PID:1932
                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                      "cmd.exe" /c C:\Nexus\zhjers.exe /PPN "To Be Filled By O.E.M."
                                                                                                                                                      2⤵
                                                                                                                                                        PID:1812
                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                        "cmd.exe" /c C:\Nexus\zhjers.exe /CSK "Default string"
                                                                                                                                                        2⤵
                                                                                                                                                          PID:1028
                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                          "cmd.exe" /c C:\Nexus\zhjers.exe /CS "Default string"
                                                                                                                                                          2⤵
                                                                                                                                                            PID:2164
                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                            "cmd.exe" /c C:\Nexus\zhjers.exe /CV "1.0"
                                                                                                                                                            2⤵
                                                                                                                                                              PID:2980
                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                              "cmd.exe" /c sc stop HTTPDebuggerPro >nul 2>&1
                                                                                                                                                              2⤵
                                                                                                                                                                PID:2920
                                                                                                                                                                • C:\Windows\SysWOW64\sc.exe
                                                                                                                                                                  sc stop HTTPDebuggerPro
                                                                                                                                                                  3⤵
                                                                                                                                                                  • Launches sc.exe
                                                                                                                                                                  PID:2056
                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                "cmd.exe" /c C:\Nexus\zhjers.exe /CM "Micro-Star International Co., Ltd."
                                                                                                                                                                2⤵
                                                                                                                                                                  PID:268
                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                  "cmd.exe" /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&1
                                                                                                                                                                  2⤵
                                                                                                                                                                    PID:2232
                                                                                                                                                                    • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                      taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T
                                                                                                                                                                      3⤵
                                                                                                                                                                      • Kills process with taskkill
                                                                                                                                                                      PID:1800
                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                    "cmd.exe" /c C:\Nexus\zhjers.exe /CA "Default string"
                                                                                                                                                                    2⤵
                                                                                                                                                                      PID:3052
                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                      "cmd.exe" /c C:\Nexus\zhjers.exe /CO "0000 0000h"
                                                                                                                                                                      2⤵
                                                                                                                                                                        PID:2312
                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                        "cmd.exe" /c C:\Nexus\zhjers.exe /CT "03h"
                                                                                                                                                                        2⤵
                                                                                                                                                                          PID:2216
                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                          "cmd.exe" /c C:\Nexus\zhjers.exe /IV "3.80"
                                                                                                                                                                          2⤵
                                                                                                                                                                            PID:2624
                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                            "cmd.exe" /c C:\Nexus\zhjers.exe /IVN "American Megatrends International, LLC."
                                                                                                                                                                            2⤵
                                                                                                                                                                              PID:2304
                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                              "cmd.exe" /c C:\Nexus\zhjers.exe /BS "%random%%random%%random%%random%%random%"
                                                                                                                                                                              2⤵
                                                                                                                                                                                PID:2104
                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                "cmd.exe" /c net stop winmgmt /y && net start winmgmt /y && sc stop winmgmt && sc start winmgmt
                                                                                                                                                                                2⤵
                                                                                                                                                                                  PID:564
                                                                                                                                                                                  • C:\Windows\SysWOW64\net.exe
                                                                                                                                                                                    net stop winmgmt /y
                                                                                                                                                                                    3⤵
                                                                                                                                                                                      PID:1920
                                                                                                                                                                                      • C:\Windows\SysWOW64\net1.exe
                                                                                                                                                                                        C:\Windows\system32\net1 stop winmgmt /y
                                                                                                                                                                                        4⤵
                                                                                                                                                                                          PID:2536
                                                                                                                                                                                      • C:\Windows\SysWOW64\net.exe
                                                                                                                                                                                        net start winmgmt /y
                                                                                                                                                                                        3⤵
                                                                                                                                                                                          PID:1200
                                                                                                                                                                                          • C:\Windows\SysWOW64\net1.exe
                                                                                                                                                                                            C:\Windows\system32\net1 start winmgmt /y
                                                                                                                                                                                            4⤵
                                                                                                                                                                                              PID:1224
                                                                                                                                                                                          • C:\Windows\SysWOW64\sc.exe
                                                                                                                                                                                            sc stop winmgmt
                                                                                                                                                                                            3⤵
                                                                                                                                                                                            • Launches sc.exe
                                                                                                                                                                                            PID:880
                                                                                                                                                                                          • C:\Windows\SysWOW64\sc.exe
                                                                                                                                                                                            sc start winmgmt
                                                                                                                                                                                            3⤵
                                                                                                                                                                                            • Launches sc.exe
                                                                                                                                                                                            PID:2608
                                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                          "cmd.exe" /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
                                                                                                                                                                                          2⤵
                                                                                                                                                                                            PID:2844
                                                                                                                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                              taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                                                                                                                                                                                              3⤵
                                                                                                                                                                                              • Kills process with taskkill
                                                                                                                                                                                              PID:1900
                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                            "cmd.exe" /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&1
                                                                                                                                                                                            2⤵
                                                                                                                                                                                              PID:2404
                                                                                                                                                                                              • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T
                                                                                                                                                                                                3⤵
                                                                                                                                                                                                • Kills process with taskkill
                                                                                                                                                                                                PID:1244
                                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                              "cmd.exe" /c taskkill /FI "IMAGENAME eq x64dbg*" /IM * /F /T >nul 2>&1
                                                                                                                                                                                              2⤵
                                                                                                                                                                                                PID:2168
                                                                                                                                                                                                • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                  taskkill /FI "IMAGENAME eq x64dbg*" /IM * /F /T
                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                  • Kills process with taskkill
                                                                                                                                                                                                  PID:1608
                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                "cmd.exe" /c taskkill /FI "IMAGENAME eq x32dbg*" /IM * /F /T >nul 2>&1
                                                                                                                                                                                                2⤵
                                                                                                                                                                                                  PID:2196
                                                                                                                                                                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                    taskkill /FI "IMAGENAME eq x32dbg*" /IM * /F /T
                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                    • Kills process with taskkill
                                                                                                                                                                                                    PID:1492
                                                                                                                                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe"
                                                                                                                                                                                                1⤵
                                                                                                                                                                                                • Enumerates system info in registry
                                                                                                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                                • Suspicious use of SendNotifyMessage
                                                                                                                                                                                                • Suspicious use of WriteProcessMemory
                                                                                                                                                                                                PID:1528
                                                                                                                                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7949758,0x7fef7949768,0x7fef7949778
                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                    PID:2280
                                                                                                                                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1100 --field-trial-handle=1384,i,3553499826257524814,7194484909270953979,131072 /prefetch:2
                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                      PID:564
                                                                                                                                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1516 --field-trial-handle=1384,i,3553499826257524814,7194484909270953979,131072 /prefetch:8
                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                        PID:2212
                                                                                                                                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1620 --field-trial-handle=1384,i,3553499826257524814,7194484909270953979,131072 /prefetch:8
                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                          PID:324
                                                                                                                                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2300 --field-trial-handle=1384,i,3553499826257524814,7194484909270953979,131072 /prefetch:1
                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                            PID:1444
                                                                                                                                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2308 --field-trial-handle=1384,i,3553499826257524814,7194484909270953979,131072 /prefetch:1
                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                              PID:1532
                                                                                                                                                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1396 --field-trial-handle=1384,i,3553499826257524814,7194484909270953979,131072 /prefetch:2
                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                PID:2720
                                                                                                                                                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3200 --field-trial-handle=1384,i,3553499826257524814,7194484909270953979,131072 /prefetch:1
                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                  PID:1972
                                                                                                                                                                                                              • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                                                                                                                                                                                                "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                  PID:576
                                                                                                                                                                                                                • C:\Windows\system32\conhost.exe
                                                                                                                                                                                                                  \??\C:\Windows\system32\conhost.exe "-86344212-1143930285-1994729898-77954442-80298439-407573142-20918188211754253298"
                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                    PID:2660
                                                                                                                                                                                                                  • C:\Windows\system32\conhost.exe
                                                                                                                                                                                                                    \??\C:\Windows\system32\conhost.exe "-4612172662349421831644231472-1098195572-81300733-501849301093688758-1462584363"
                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                      PID:956
                                                                                                                                                                                                                    • C:\Windows\system32\conhost.exe
                                                                                                                                                                                                                      \??\C:\Windows\system32\conhost.exe "-332725593-2777766311812288265146321060-7927014539790636122136272957-2100325901"
                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                        PID:2212

                                                                                                                                                                                                                      Network

                                                                                                                                                                                                                      MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                      Replay Monitor

                                                                                                                                                                                                                      Loading Replay Monitor...

                                                                                                                                                                                                                      Downloads

                                                                                                                                                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        67KB

                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                        753df6889fd7410a2e9fe333da83a429

                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                        3c425f16e8267186061dd48ac1c77c122962456e

                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                        b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                        9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

                                                                                                                                                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        344B

                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                        9cddc5b3957b705d1b77cb26c652caf4

                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                        7effab9f3e0297ad71ff663fa42a55f15e8dd4e1

                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                        8ff5b0ca75d2e2d2ee09131808fdf11bbe84cf6a82ec8bd76421df7a23fd8b48

                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                        30d9d981786ed4373b61aff638a091149583eded6d076bebf9e2043b6cd413ac3bc6b7a04c5ec991b3d9bbffd3ccdbea2741358450339a58e1e4a6d94497f90e

                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        264KB

                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                        f50f89a0a91564d0b8a211f8921aa7de

                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                        112403a17dd69d5b9018b8cede023cb3b54eab7d

                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                        b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                        bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\000007.dbtmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        16B

                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                        18e723571b00fb1694a3bad6c78e4054

                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                        afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                        8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                        43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\da6de6e9-5198-4df1-a590-3e3061a92bc8.tmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        15KB

                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                        ce45d0ce7e81bc1f3f896a89ffcf52af

                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                        3d8717cabbf36b774dfad853812797e1f04684e1

                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                        6d78edebed9dfc82c6ff3e5bfe34af56787ff8520cb15978baefa3228abe0983

                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                        210321840c5b7c9ef2102542f8f012d4dad7f856e031175de8fd1fbf3612d436eca00ce8130ba1549eeb13cba3a25140374531e974893b1db31dca9509621ae1

                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\CabBB84.tmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        65KB

                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                        ac05d27423a85adc1622c714f2cb6184

                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                        b0fe2b1abddb97837ea0195be70ab2ff14d43198

                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                        c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                        6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\TarBD30.tmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        175KB

                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                        dd73cead4b93366cf3465c8cd32e2796

                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                        74546226dfe9ceb8184651e920d1dbfb432b314e

                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                        a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                        ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

                                                                                                                                                                                                                      • memory/2612-2-0x0000000000C40000-0x0000000000C80000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        256KB

                                                                                                                                                                                                                      • memory/2612-1-0x0000000074B20000-0x000000007520E000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        6.9MB

                                                                                                                                                                                                                      • memory/2612-0-0x00000000012D0000-0x00000000012EC000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        112KB

                                                                                                                                                                                                                      • memory/2612-197-0x0000000074B20000-0x000000007520E000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        6.9MB

                                                                                                                                                                                                                      • memory/2612-198-0x0000000000C40000-0x0000000000C80000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        256KB