Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    113s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/10/2024, 22:02

General

  • Target

    SyncSpoofer.exe

  • Size

    4.5MB

  • MD5

    a83ef3022abbf90408e3d524f1aa7a8b

  • SHA1

    d871478b0d72d51ab3d3325bf45688a9c0c5efd5

  • SHA256

    24d5a4217ca7cbac8b0d33663c7eac767c0248ed2e83c42ac242fd7b9007d42f

  • SHA512

    361cce9ad65fd939a3e78d150931dd468ddacba99b5ba148ba3799ceb2b2ec00904a769601d076d81218d4b732cd82210f88a714418261ad2edce02619ff3293

  • SSDEEP

    98304:uEnVwl1p8jfC2ajXVRONMJ/A2CQsHXst4R6D:12v8ja1WNMhA1Cd

Malware Config

Extracted

Family

stealc

Botnet

soft

C2

http://193.233.112.44

Attributes
  • url_path

    /383ccd496f3c5eee.php

Signatures

  • Stealc

    Stealc is an infostealer written in C++.

  • Detected Nirsoft tools 2 IoCs

    Free utilities often used by attackers which can steal passwords, product keys, etc.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 64 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 5 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 30 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Maps connected drives based on registry 3 TTPs 64 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 37 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 23 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SyncSpoofer.exe
    "C:\Users\Admin\AppData\Local\Temp\SyncSpoofer.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1708
    • C:\Users\Admin\AppData\Roaming\sWsmPty.exe
      "C:\Users\Admin\AppData\Roaming\sWsmPty.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      PID:1052
    • C:\Users\Admin\AppData\Roaming\VC_redistx64.exe
      "C:\Users\Admin\AppData\Roaming\VC_redistx64.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:1768
    • C:\Users\Admin\AppData\Roaming\HpsrSpoof.exe
      "C:\Users\Admin\AppData\Roaming\HpsrSpoof.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of WriteProcessMemory
      PID:2864
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe c: LOSO-781A
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:892
        • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
          C:\ProgramData\Microsoft\Windows\Volumeid64.exe c: LOSO-781A
          4⤵
          • Executes dropped EXE
          PID:468
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Disk.bat
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4856
        • C:\ProgramData\Microsoft\Windows\DevManView.exe
          C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "WAN Miniport*" /use_wildcard""
          4⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Maps connected drives based on registry
          • Checks SCSI registry key(s)
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3300
        • C:\ProgramData\Microsoft\Windows\DevManView.exe
          C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "Disk drive*" /use_wildcard""
          4⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Maps connected drives based on registry
          • Checks SCSI registry key(s)
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2932
        • C:\ProgramData\Microsoft\Windows\DevManView.exe
          C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "C:\"
          4⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Maps connected drives based on registry
          • Checks SCSI registry key(s)
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4596
        • C:\ProgramData\Microsoft\Windows\DevManView.exe
          C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "D:\"
          4⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Maps connected drives based on registry
          • Checks SCSI registry key(s)
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4548
        • C:\ProgramData\Microsoft\Windows\DevManView.exe
          C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "E:\"
          4⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Maps connected drives based on registry
          • Checks SCSI registry key(s)
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3056
        • C:\ProgramData\Microsoft\Windows\DevManView.exe
          C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "F:\"
          4⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Maps connected drives based on registry
          • Checks SCSI registry key(s)
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1492
        • C:\ProgramData\Microsoft\Windows\DevManView.exe
          C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "G:\"
          4⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Maps connected drives based on registry
          • Checks SCSI registry key(s)
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4816
        • C:\ProgramData\Microsoft\Windows\DevManView.exe
          C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "Disk"
          4⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Maps connected drives based on registry
          • Checks SCSI registry key(s)
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1120
        • C:\ProgramData\Microsoft\Windows\DevManView.exe
          C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "disk"
          4⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Maps connected drives based on registry
          • Checks SCSI registry key(s)
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1464
        • C:\ProgramData\Microsoft\Windows\DevManView.exe
          C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "Disk&*" /use_wildcard""
          4⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Maps connected drives based on registry
          • Checks SCSI registry key(s)
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2512
        • C:\ProgramData\Microsoft\Windows\DevManView.exe
          C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "SWD\WPDBUSENUM*" /use_wildcard""
          4⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Maps connected drives based on registry
          • Checks SCSI registry key(s)
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5116
        • C:\ProgramData\Microsoft\Windows\DevManView.exe
          C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "USBSTOR*" /use_wildcard""
          4⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Maps connected drives based on registry
          • Checks SCSI registry key(s)
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4528
        • C:\ProgramData\Microsoft\Windows\DevManView.exe
          C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "SCSI\Disk*" /use_wildcard""
          4⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Maps connected drives based on registry
          • Drops file in Windows directory
          • Checks SCSI registry key(s)
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4956
        • C:\ProgramData\Microsoft\Windows\DevManView.exe
          C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "STORAGE*" /use_wildcard""
          4⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Maps connected drives based on registry
          • Drops file in Windows directory
          • Checks SCSI registry key(s)
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1580
        • C:\ProgramData\Microsoft\Windows\DevManView.exe
          C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "WAN Miniport*" /use_wildcard""
          4⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Maps connected drives based on registry
          • Checks SCSI registry key(s)
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1176
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SS %RANDOM%HP-TRGT%RANDOM%AB
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:60
        • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
          C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SS 22390HP-TRGT32506AB
          4⤵
          • Executes dropped EXE
          PID:208
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SV 2%RANDOM%HP-TRGT%RANDOM%RV
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1068
        • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
          C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SV 222393HP-TRGT10487RV
          4⤵
          • Executes dropped EXE
          PID:4172
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 8%RANDOM%HP-TRGT%RANDOM%SG
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2264
        • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
          C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 822393HP-TRGT10487SG
          4⤵
          • Executes dropped EXE
          PID:1156
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SU auto
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1892
        • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
          C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SU auto
          4⤵
          • Executes dropped EXE
          PID:1092
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 5%RANDOM%HP-TRGT%RANDOM%SL
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3828
        • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
          C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 522393HP-TRGT10487SL
          4⤵
          • Executes dropped EXE
          PID:2708
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BM 4%RANDOM%HP-TRGT%RANDOM%FA
        3⤵
          PID:1632
          • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
            C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BM 422393HP-TRGT10487FA
            4⤵
            • Executes dropped EXE
            PID:1912
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BS 6%RANDOM%HP-TRGT%RANDOM%FU
          3⤵
            PID:5076
            • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
              C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BS 622393HP-TRGT10487FU
              4⤵
              • Executes dropped EXE
              PID:4588
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BV 3%RANDOM%HP-TRGT%RANDOM%DQ
            3⤵
              PID:2428
              • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BV 322393HP-TRGT10487DQ
                4⤵
                • Executes dropped EXE
                PID:1680
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /PSN 7%RANDOM%HP-TRGT%RANDOM%MST
              3⤵
                PID:2720
                • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                  C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /PSN 722393HP-TRGT10487MST
                  4⤵
                  • Executes dropped EXE
                  PID:4476
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SM HOPESA-RSPPOF
                3⤵
                  PID:3820
                  • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                    C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SM HOPESA-RSPPOF
                    4⤵
                    • Executes dropped EXE
                    PID:792
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SS %RANDOM%HP-TRGT%RANDOM%AB
                  3⤵
                    PID:3212
                    • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                      C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SS 22413HP-TRGT9441AB
                      4⤵
                      • Executes dropped EXE
                      PID:4540
                  • C:\Windows\System32\cmd.exe
                    "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SV 2%RANDOM%HP-TRGT%RANDOM%RV
                    3⤵
                      PID:1436
                      • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                        C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SV 222413HP-TRGT9441RV
                        4⤵
                        • Executes dropped EXE
                        PID:2916
                    • C:\Windows\System32\cmd.exe
                      "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 8%RANDOM%HP-TRGT%RANDOM%SG
                      3⤵
                        PID:4400
                        • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                          C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 822413HP-TRGT9441SG
                          4⤵
                          • Executes dropped EXE
                          PID:936
                      • C:\Windows\System32\cmd.exe
                        "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SU auto
                        3⤵
                          PID:4980
                          • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                            C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SU auto
                            4⤵
                            • Executes dropped EXE
                            PID:3424
                        • C:\Windows\System32\cmd.exe
                          "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 5%RANDOM%HP-TRGT%RANDOM%SL
                          3⤵
                            PID:3040
                            • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                              C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 522413HP-TRGT9441SL
                              4⤵
                              • Executes dropped EXE
                              PID:4240
                          • C:\Windows\System32\cmd.exe
                            "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BM 4%RANDOM%HP-TRGT%RANDOM%FA
                            3⤵
                              PID:4876
                              • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BM 422413HP-TRGT9441FA
                                4⤵
                                • Executes dropped EXE
                                PID:4880
                            • C:\Windows\System32\cmd.exe
                              "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BS 6%RANDOM%HP-TRGT%RANDOM%FU
                              3⤵
                                PID:2488
                                • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                  C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BS 622413HP-TRGT9441FU
                                  4⤵
                                  • Executes dropped EXE
                                  PID:2316
                              • C:\Windows\System32\cmd.exe
                                "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BV 3%RANDOM%HP-TRGT%RANDOM%DQ
                                3⤵
                                  PID:3516
                                  • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                    C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BV 322413HP-TRGT9441DQ
                                    4⤵
                                    • Executes dropped EXE
                                    PID:4376
                                • C:\Windows\System32\cmd.exe
                                  "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /PSN 7%RANDOM%HP-TRGT%RANDOM%MST
                                  3⤵
                                    PID:3220
                                    • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                      C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /PSN 722413HP-TRGT9441MST
                                      4⤵
                                      • Executes dropped EXE
                                      PID:3768
                                  • C:\Windows\System32\cmd.exe
                                    "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SM HOPESA-RSPPOF
                                    3⤵
                                      PID:1364
                                      • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                        C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SM HOPESA-RSPPOF
                                        4⤵
                                        • Executes dropped EXE
                                        PID:2092
                                    • C:\Windows\System32\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SS %RANDOM%HP-TRGT%RANDOM%AB
                                      3⤵
                                        PID:2932
                                        • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                          C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SS 22429HP-TRGT30415AB
                                          4⤵
                                          • Executes dropped EXE
                                          PID:2920
                                      • C:\Windows\System32\cmd.exe
                                        "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SV 2%RANDOM%HP-TRGT%RANDOM%RV
                                        3⤵
                                          PID:3020
                                          • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                            C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SV 222429HP-TRGT30415RV
                                            4⤵
                                            • Executes dropped EXE
                                            PID:2800
                                        • C:\Windows\System32\cmd.exe
                                          "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 8%RANDOM%HP-TRGT%RANDOM%SG
                                          3⤵
                                            PID:3260
                                            • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                              C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 822429HP-TRGT30415SG
                                              4⤵
                                              • Executes dropped EXE
                                              PID:1540
                                          • C:\Windows\System32\cmd.exe
                                            "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SU auto
                                            3⤵
                                              PID:4952
                                              • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SU auto
                                                4⤵
                                                • Executes dropped EXE
                                                PID:224
                                            • C:\Windows\System32\cmd.exe
                                              "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 5%RANDOM%HP-TRGT%RANDOM%SL
                                              3⤵
                                                PID:216
                                                • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                  C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 522429HP-TRGT30415SL
                                                  4⤵
                                                  • Executes dropped EXE
                                                  PID:3968
                                              • C:\Windows\System32\cmd.exe
                                                "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BM 4%RANDOM%HP-TRGT%RANDOM%FA
                                                3⤵
                                                  PID:3956
                                                  • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                    C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BM 422429HP-TRGT30415FA
                                                    4⤵
                                                    • Executes dropped EXE
                                                    PID:4560
                                                • C:\Windows\System32\cmd.exe
                                                  "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BS 6%RANDOM%HP-TRGT%RANDOM%FU
                                                  3⤵
                                                    PID:3804
                                                    • C:\Windows\System32\Conhost.exe
                                                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      4⤵
                                                        PID:60
                                                      • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                        C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BS 622429HP-TRGT30415FU
                                                        4⤵
                                                        • Executes dropped EXE
                                                        PID:4148
                                                    • C:\Windows\System32\cmd.exe
                                                      "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BV 3%RANDOM%HP-TRGT%RANDOM%DQ
                                                      3⤵
                                                        PID:3384
                                                        • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                          C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BV 322429HP-TRGT30415DQ
                                                          4⤵
                                                          • Executes dropped EXE
                                                          PID:2936
                                                      • C:\Windows\System32\cmd.exe
                                                        "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /PSN 7%RANDOM%HP-TRGT%RANDOM%MST
                                                        3⤵
                                                          PID:1092
                                                          • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                            C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /PSN 722429HP-TRGT30415MST
                                                            4⤵
                                                            • Executes dropped EXE
                                                            PID:2744
                                                        • C:\Windows\System32\cmd.exe
                                                          "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SM HOPESA-RSPPOF
                                                          3⤵
                                                            PID:1876
                                                            • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                              C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SM HOPESA-RSPPOF
                                                              4⤵
                                                              • Executes dropped EXE
                                                              PID:1584
                                                          • C:\Windows\System32\cmd.exe
                                                            "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe a: 5THV-74I0
                                                            3⤵
                                                              PID:3648
                                                              • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                C:\ProgramData\Microsoft\Windows\Volumeid64.exe a: 5THV-74I0
                                                                4⤵
                                                                • Executes dropped EXE
                                                                PID:4540
                                                            • C:\Windows\System32\cmd.exe
                                                              "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe b: HR74-87AT
                                                              3⤵
                                                                PID:4804
                                                                • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                  C:\ProgramData\Microsoft\Windows\Volumeid64.exe b: HR74-87AT
                                                                  4⤵
                                                                  • Executes dropped EXE
                                                                  PID:760
                                                              • C:\Windows\System32\cmd.exe
                                                                "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe c: 0BEA-LJC3
                                                                3⤵
                                                                  PID:3988
                                                                  • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                    C:\ProgramData\Microsoft\Windows\Volumeid64.exe c: 0BEA-LJC3
                                                                    4⤵
                                                                    • Executes dropped EXE
                                                                    PID:972
                                                                • C:\Windows\System32\cmd.exe
                                                                  "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe d: FII2-FRJ9
                                                                  3⤵
                                                                    PID:3564
                                                                    • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                      C:\ProgramData\Microsoft\Windows\Volumeid64.exe d: FII2-FRJ9
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      PID:4672
                                                                  • C:\Windows\System32\cmd.exe
                                                                    "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe e: EFBN-MPPK
                                                                    3⤵
                                                                      PID:4996
                                                                      • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                        C:\ProgramData\Microsoft\Windows\Volumeid64.exe e: EFBN-MPPK
                                                                        4⤵
                                                                        • Executes dropped EXE
                                                                        PID:892
                                                                    • C:\Windows\System32\cmd.exe
                                                                      "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe f: 4ZTV-VFG7
                                                                      3⤵
                                                                        PID:2712
                                                                        • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                          C:\ProgramData\Microsoft\Windows\Volumeid64.exe f: 4ZTV-VFG7
                                                                          4⤵
                                                                          • Executes dropped EXE
                                                                          PID:1120
                                                                      • C:\Windows\System32\cmd.exe
                                                                        "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe g: FHPD-MJEK
                                                                        3⤵
                                                                          PID:3264
                                                                          • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                            C:\ProgramData\Microsoft\Windows\Volumeid64.exe g: FHPD-MJEK
                                                                            4⤵
                                                                            • Executes dropped EXE
                                                                            PID:3392
                                                                        • C:\Windows\System32\cmd.exe
                                                                          "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe h: K5DT-B4KH
                                                                          3⤵
                                                                            PID:4684
                                                                            • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                              C:\ProgramData\Microsoft\Windows\Volumeid64.exe h: K5DT-B4KH
                                                                              4⤵
                                                                              • Executes dropped EXE
                                                                              PID:4692
                                                                          • C:\Windows\System32\cmd.exe
                                                                            "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe i: O8DJ-5HG2
                                                                            3⤵
                                                                              PID:3632
                                                                              • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                C:\ProgramData\Microsoft\Windows\Volumeid64.exe i: O8DJ-5HG2
                                                                                4⤵
                                                                                • Executes dropped EXE
                                                                                PID:1984
                                                                            • C:\Windows\System32\cmd.exe
                                                                              "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe j: 1TFR-24JZ
                                                                              3⤵
                                                                                PID:3172
                                                                                • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                  C:\ProgramData\Microsoft\Windows\Volumeid64.exe j: 1TFR-24JZ
                                                                                  4⤵
                                                                                  • Executes dropped EXE
                                                                                  PID:1976
                                                                              • C:\Windows\System32\cmd.exe
                                                                                "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe k: NITZ-D29O
                                                                                3⤵
                                                                                  PID:3048
                                                                                  • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                    C:\ProgramData\Microsoft\Windows\Volumeid64.exe k: NITZ-D29O
                                                                                    4⤵
                                                                                    • Executes dropped EXE
                                                                                    PID:2708
                                                                                • C:\Windows\System32\cmd.exe
                                                                                  "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe l: V842-TI5K
                                                                                  3⤵
                                                                                    PID:4780
                                                                                    • C:\Windows\System32\Conhost.exe
                                                                                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                      4⤵
                                                                                        PID:4588
                                                                                      • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                        C:\ProgramData\Microsoft\Windows\Volumeid64.exe l: V842-TI5K
                                                                                        4⤵
                                                                                        • Executes dropped EXE
                                                                                        PID:2512
                                                                                    • C:\Windows\System32\cmd.exe
                                                                                      "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe m: P1OI-2SMZ
                                                                                      3⤵
                                                                                        PID:2920
                                                                                        • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                          C:\ProgramData\Microsoft\Windows\Volumeid64.exe m: P1OI-2SMZ
                                                                                          4⤵
                                                                                          • Executes dropped EXE
                                                                                          PID:3512
                                                                                      • C:\Windows\System32\cmd.exe
                                                                                        "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe n: ANLI-UZU2
                                                                                        3⤵
                                                                                          PID:3872
                                                                                          • C:\Windows\System32\Conhost.exe
                                                                                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            4⤵
                                                                                              PID:3804
                                                                                            • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                              C:\ProgramData\Microsoft\Windows\Volumeid64.exe n: ANLI-UZU2
                                                                                              4⤵
                                                                                              • Executes dropped EXE
                                                                                              PID:3044
                                                                                          • C:\Windows\System32\cmd.exe
                                                                                            "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe o: BUMC-ZER1
                                                                                            3⤵
                                                                                              PID:624
                                                                                              • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                C:\ProgramData\Microsoft\Windows\Volumeid64.exe o: BUMC-ZER1
                                                                                                4⤵
                                                                                                • Executes dropped EXE
                                                                                                PID:416
                                                                                            • C:\Windows\System32\cmd.exe
                                                                                              "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe p: E8Z0-N5JH
                                                                                              3⤵
                                                                                                PID:392
                                                                                                • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                  C:\ProgramData\Microsoft\Windows\Volumeid64.exe p: E8Z0-N5JH
                                                                                                  4⤵
                                                                                                    PID:2908
                                                                                                • C:\Windows\System32\cmd.exe
                                                                                                  "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe r: 9GVG-7V24
                                                                                                  3⤵
                                                                                                    PID:1888
                                                                                                    • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                      C:\ProgramData\Microsoft\Windows\Volumeid64.exe r: 9GVG-7V24
                                                                                                      4⤵
                                                                                                        PID:5056
                                                                                                    • C:\Windows\System32\cmd.exe
                                                                                                      "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe s: 56GP-J7IS
                                                                                                      3⤵
                                                                                                        PID:4272
                                                                                                        • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                          C:\ProgramData\Microsoft\Windows\Volumeid64.exe s: 56GP-J7IS
                                                                                                          4⤵
                                                                                                            PID:3464
                                                                                                        • C:\Windows\System32\cmd.exe
                                                                                                          "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe t: 74A8-BAR3
                                                                                                          3⤵
                                                                                                            PID:3676
                                                                                                            • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                              C:\ProgramData\Microsoft\Windows\Volumeid64.exe t: 74A8-BAR3
                                                                                                              4⤵
                                                                                                                PID:4012
                                                                                                            • C:\Windows\System32\cmd.exe
                                                                                                              "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe u: FDVU-S7J3
                                                                                                              3⤵
                                                                                                                PID:1056
                                                                                                                • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                                  C:\ProgramData\Microsoft\Windows\Volumeid64.exe u: FDVU-S7J3
                                                                                                                  4⤵
                                                                                                                    PID:1444
                                                                                                                • C:\Windows\System32\cmd.exe
                                                                                                                  "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe v: T1ES-05RT
                                                                                                                  3⤵
                                                                                                                    PID:2448
                                                                                                                    • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                                      C:\ProgramData\Microsoft\Windows\Volumeid64.exe v: T1ES-05RT
                                                                                                                      4⤵
                                                                                                                        PID:2032
                                                                                                                    • C:\Windows\System32\cmd.exe
                                                                                                                      "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe y: 4JPU-KHEL
                                                                                                                      3⤵
                                                                                                                        PID:3988
                                                                                                                        • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                                          C:\ProgramData\Microsoft\Windows\Volumeid64.exe y: 4JPU-KHEL
                                                                                                                          4⤵
                                                                                                                            PID:4284
                                                                                                                        • C:\Windows\System32\cmd.exe
                                                                                                                          "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe z: BKHE-2AE3
                                                                                                                          3⤵
                                                                                                                            PID:3040
                                                                                                                            • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                                              C:\ProgramData\Microsoft\Windows\Volumeid64.exe z: BKHE-2AE3
                                                                                                                              4⤵
                                                                                                                                PID:1476
                                                                                                                            • C:\Windows\System32\cmd.exe
                                                                                                                              "C:\Windows\System32\cmd.exe" /C del C:\ProgramData\Microsoft\Windows\DevManView.cfg
                                                                                                                              3⤵
                                                                                                                                PID:3564
                                                                                                                              • C:\Windows\System32\cmd.exe
                                                                                                                                "C:\Windows\System32\cmd.exe" /C del C:\ProgramData\Microsoft\Windows\DevManView.chm
                                                                                                                                3⤵
                                                                                                                                  PID:400
                                                                                                                                • C:\Windows\System32\cmd.exe
                                                                                                                                  "C:\Windows\System32\cmd.exe" /C del C:\ProgramData\Microsoft\Windows\DevManView.exe
                                                                                                                                  3⤵
                                                                                                                                    PID:4376
                                                                                                                                  • C:\Windows\System32\cmd.exe
                                                                                                                                    "C:\Windows\System32\cmd.exe" /C del C:\ProgramData\Microsoft\Windows\amide.sys
                                                                                                                                    3⤵
                                                                                                                                      PID:1364
                                                                                                                                    • C:\Windows\System32\cmd.exe
                                                                                                                                      "C:\Windows\System32\cmd.exe" /C del C:\ProgramData\Microsoft\Windows\amifldrv64.sys
                                                                                                                                      3⤵
                                                                                                                                        PID:2248
                                                                                                                                      • C:\Windows\System32\cmd.exe
                                                                                                                                        "C:\Windows\System32\cmd.exe" /C del C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                                                                                                        3⤵
                                                                                                                                          PID:4480
                                                                                                                                        • C:\Windows\System32\cmd.exe
                                                                                                                                          "C:\Windows\System32\cmd.exe" /C del C:\ProgramData\Microsoft\Windows\Disk.bat
                                                                                                                                          3⤵
                                                                                                                                            PID:2784

                                                                                                                                      Network

                                                                                                                                      MITRE ATT&CK Enterprise v15

                                                                                                                                      Replay Monitor

                                                                                                                                      Loading Replay Monitor...

                                                                                                                                      Downloads

                                                                                                                                      • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe

                                                                                                                                        Filesize

                                                                                                                                        452KB

                                                                                                                                        MD5

                                                                                                                                        c4d09d3b3516550ad2ded3b09e28c10c

                                                                                                                                        SHA1

                                                                                                                                        7a5e77bb9ba74cf57cb1d119325b0b7f64199824

                                                                                                                                        SHA256

                                                                                                                                        66433a06884f28fdabb85a73c682d1587767e1dfa116907559ec00ed8d0919d3

                                                                                                                                        SHA512

                                                                                                                                        2e7800aae592d38c4a6c854b11d0883de70f938b29d78e257ab47a8a2bbf09121145d0a9aea9b56c16e18cde31b693d31d7ebfcd0473b7c15df5d7ae6708bbd2

                                                                                                                                      • C:\ProgramData\Microsoft\Windows\DevManView.cfg

                                                                                                                                        Filesize

                                                                                                                                        1KB

                                                                                                                                        MD5

                                                                                                                                        43b37d0f48bad1537a4de59ffda50ffe

                                                                                                                                        SHA1

                                                                                                                                        48ca09a0ed8533bf462a56c43b8db6e7b6c6ffa8

                                                                                                                                        SHA256

                                                                                                                                        fc258dfb3e49be04041ac24540ef544192c2e57300186f777f301d586f900288

                                                                                                                                        SHA512

                                                                                                                                        cfb1d98328aed36d2fe9df008a95c489192f01d4bb20de329e69e0386129aff4634e6fd63a8d49e14fc96da75c9b5ed3a218425846907d0122267d50fc8d7a82

                                                                                                                                      • C:\ProgramData\Microsoft\Windows\DevManView.exe

                                                                                                                                        Filesize

                                                                                                                                        162KB

                                                                                                                                        MD5

                                                                                                                                        33d7a84f8ef67fd005f37142232ae97e

                                                                                                                                        SHA1

                                                                                                                                        1f560717d8038221c9b161716affb7cd6b14056e

                                                                                                                                        SHA256

                                                                                                                                        a1be60039f125080560edf1eebee5b6d9e2d6039f5f5ac478e6273e05edadb4b

                                                                                                                                        SHA512

                                                                                                                                        c059db769b9d8a9f1726709c9ad71e565b8081a879b55d0f906d6927409166e1d5716c784146feba41114a2cf44ee90cf2e0891831245752238f20c41590b3f5

                                                                                                                                      • C:\ProgramData\Microsoft\Windows\Disk.bat

                                                                                                                                        Filesize

                                                                                                                                        1KB

                                                                                                                                        MD5

                                                                                                                                        250e75ba9aac6e2e9349bdebc5ef104e

                                                                                                                                        SHA1

                                                                                                                                        7efdaef5ec1752e7e29d8cc4641615d14ac1855f

                                                                                                                                        SHA256

                                                                                                                                        7d50c4fdcf6d8716c7d0d39517d479b3eeee02d2020ed635327405ae49c42516

                                                                                                                                        SHA512

                                                                                                                                        7f0d7d41c9eafcd65daa674b5182cf52e11aa0f6d6baaee74fe4c4ffc08a163277c4981cd123af0cb1857ae6fd223b5e8c676d9dc5c646a870fbd9bc4001c438

                                                                                                                                      • C:\ProgramData\Microsoft\Windows\Volumeid64.exe

                                                                                                                                        Filesize

                                                                                                                                        165KB

                                                                                                                                        MD5

                                                                                                                                        81a45f1a91448313b76d2e6d5308aa7a

                                                                                                                                        SHA1

                                                                                                                                        0d615343d5de03da03bce52e11b233093b404083

                                                                                                                                        SHA256

                                                                                                                                        fb0d02ea26bb1e5df5a07147931caf1ae3d7d1d9b4d83f168b678e7f3a1c0ecd

                                                                                                                                        SHA512

                                                                                                                                        675662f84dfcbf33311f5830db70bff50b6e8a34a4a926de6369c446ea2b1cf8a63e9c94e5a5c2e1d226248f0361a1698448f82118ac4de5a92b64d8fdf8815d

                                                                                                                                      • C:\ProgramData\Microsoft\Windows\amifldrv64.sys

                                                                                                                                        Filesize

                                                                                                                                        18KB

                                                                                                                                        MD5

                                                                                                                                        785045f8b25cd2e937ddc6b09debe01a

                                                                                                                                        SHA1

                                                                                                                                        029c678674f482ababe8bbfdb93152392457109d

                                                                                                                                        SHA256

                                                                                                                                        37073e42ffa0322500f90cd7e3c8d02c4cdd695d31c77e81560abec20bfb68ba

                                                                                                                                        SHA512

                                                                                                                                        40bbeb41816146c7172aa3cf27dace538908b7955171968e1cddcd84403b2588e0d8437a3596c2714ccdf4476eefa3d4e61d90ea118982b729f50b03df1104a9

                                                                                                                                      • C:\ProgramData\mozglue.dll

                                                                                                                                        Filesize

                                                                                                                                        593KB

                                                                                                                                        MD5

                                                                                                                                        c8fd9be83bc728cc04beffafc2907fe9

                                                                                                                                        SHA1

                                                                                                                                        95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                                                                                                        SHA256

                                                                                                                                        ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                                                                                                        SHA512

                                                                                                                                        fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                                                                                                      • C:\ProgramData\nss3.dll

                                                                                                                                        Filesize

                                                                                                                                        2.0MB

                                                                                                                                        MD5

                                                                                                                                        1cc453cdf74f31e4d913ff9c10acdde2

                                                                                                                                        SHA1

                                                                                                                                        6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                                                                                                                        SHA256

                                                                                                                                        ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                                                                                                                        SHA512

                                                                                                                                        dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                                                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771

                                                                                                                                        Filesize

                                                                                                                                        2KB

                                                                                                                                        MD5

                                                                                                                                        d7fccd24c354031cffbaefd432f2d66f

                                                                                                                                        SHA1

                                                                                                                                        4645d248a382971a241d897dbeaf68ef917cb887

                                                                                                                                        SHA256

                                                                                                                                        2b0e88917fb03940860ccd67fca36696af9444b0a6f7528489ad7159bd6f8354

                                                                                                                                        SHA512

                                                                                                                                        f20af6776f8d4438715aeb2e9eabc185538ba83889adeb7e0897a78709aead5de6d58dc6e712f4a31a5b8bd88f37355cd5de3d5292d43fd62c35f691198cda87

                                                                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D

                                                                                                                                        Filesize

                                                                                                                                        1KB

                                                                                                                                        MD5

                                                                                                                                        f2efda2902bd8619b56a46af6c0f8f34

                                                                                                                                        SHA1

                                                                                                                                        82a709de22d26a672c7de6c8a8ef9af51993e031

                                                                                                                                        SHA256

                                                                                                                                        ed488c51231223660a16b0d990a7c639964a57dff3bb274478a812aa8256984e

                                                                                                                                        SHA512

                                                                                                                                        f65db0c03071f81a5ec260ad2d91efa30a407252c4aabf35b9b2bbdb715060ad39acfca79ded67af792b0c856605805a14c954612904d5c69758116539a9f7b1

                                                                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771

                                                                                                                                        Filesize

                                                                                                                                        450B

                                                                                                                                        MD5

                                                                                                                                        f1d859aa1cd91ccfa6e1e61049e392ed

                                                                                                                                        SHA1

                                                                                                                                        8fc246418d6e9dbda1c8a81b26e7b7ac97d98c48

                                                                                                                                        SHA256

                                                                                                                                        0e02fcd65cd162b8eb7ac90e6eec15ba35597a98413ce2e4e6da5878a77064bb

                                                                                                                                        SHA512

                                                                                                                                        eabc6609a055a856de6766fe8ef3977deb1e42089bbe8d394f37b8f4387ec4aec4ffb026fa6daffd23d10ee5dc2fd5a3b1abca9c6ff38649aa4859f914824ace

                                                                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D

                                                                                                                                        Filesize

                                                                                                                                        458B

                                                                                                                                        MD5

                                                                                                                                        c17a523e3472cb51c6474f66d64e5558

                                                                                                                                        SHA1

                                                                                                                                        a993745d33c8b092990dcea054243abb643dd0f8

                                                                                                                                        SHA256

                                                                                                                                        fdea545bd41620d71b4329cd23ac53b6293d596e3c39623c6c204ecf3808219b

                                                                                                                                        SHA512

                                                                                                                                        7a17146d4770299e53dc838ef1ff8253bcd986d74ed39850371f8630cd4279eb52549ae0becd1457f68447fd29e30e0207cc49d379a6172879201a8c891882c6

                                                                                                                                      • C:\Users\Admin\AppData\Roaming\HpsrSpoof.exe

                                                                                                                                        Filesize

                                                                                                                                        905KB

                                                                                                                                        MD5

                                                                                                                                        dd1313842898ffaf72d79df643637ded

                                                                                                                                        SHA1

                                                                                                                                        93a34cb05fdf76869769af09a22711deea44ed28

                                                                                                                                        SHA256

                                                                                                                                        81b27a565d2eb4701c404e03398a4bca48480e592460121bf8ec62c5f4b061df

                                                                                                                                        SHA512

                                                                                                                                        db8cdcbfca205e64f1838fc28ea98107c854a4f31f617914e45c25d37da731b876afc36f816a78839d7b48b3c2b90f81856c821818f27239a504ab4253fe28f9

                                                                                                                                      • C:\Users\Admin\AppData\Roaming\VC_redistx64.exe

                                                                                                                                        Filesize

                                                                                                                                        2.9MB

                                                                                                                                        MD5

                                                                                                                                        507acc8f3249adef7468989fee931211

                                                                                                                                        SHA1

                                                                                                                                        4d66286973a21e76b0e2c746bac00fa28d446ca9

                                                                                                                                        SHA256

                                                                                                                                        6abb77dce6d4af42005e673cb089b6d41e0ef0b88a6411f4d5dfd8e8b4858154

                                                                                                                                        SHA512

                                                                                                                                        2faee963523b401bf1e588c86bfeef899067456f22848d299525acde5d2ce28a66f769d741deea2e6b218b4e1b0c0f7f4cc08cfc1c2fd8eac5375b3c183b7ee3

                                                                                                                                      • C:\Users\Admin\AppData\Roaming\sWsmPty.exe

                                                                                                                                        Filesize

                                                                                                                                        328KB

                                                                                                                                        MD5

                                                                                                                                        ea6989e3a607d753377b05bae55140d8

                                                                                                                                        SHA1

                                                                                                                                        5c67ca11e96875c9beb0d320170e000698a65148

                                                                                                                                        SHA256

                                                                                                                                        9e857e6656ff0d6da789faa05f9fb49c323bdcea03b0b7887bbac919122f32fb

                                                                                                                                        SHA512

                                                                                                                                        80b021d768456c797e8ff1e44f6e1c4699705917cb4b735d1286e470251c279cf4273fc0ff8360e77142bdec02e5213aa251a0cedfbb1bc315810ea89f32e1c2

                                                                                                                                      • memory/1052-14-0x0000000000370000-0x00000000005D4000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        2.4MB

                                                                                                                                      • memory/1052-75-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        972KB

                                                                                                                                      • memory/1052-232-0x0000000000370000-0x00000000005D4000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        2.4MB

                                                                                                                                      • memory/1708-4-0x000000001BB90000-0x000000001BFEC000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        4.4MB

                                                                                                                                      • memory/1708-33-0x00007FFB1A9C0000-0x00007FFB1B481000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        10.8MB

                                                                                                                                      • memory/1708-0-0x00007FFB1A9C3000-0x00007FFB1A9C5000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        8KB

                                                                                                                                      • memory/1708-5-0x0000000001530000-0x0000000001536000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        24KB

                                                                                                                                      • memory/1708-3-0x00007FFB1A9C0000-0x00007FFB1B481000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        10.8MB

                                                                                                                                      • memory/1708-2-0x0000000001520000-0x0000000001526000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        24KB

                                                                                                                                      • memory/1708-1-0x0000000000800000-0x0000000000C7A000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        4.5MB

                                                                                                                                      • memory/1768-32-0x00000000778E4000-0x00000000778E6000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        8KB

                                                                                                                                      • memory/1768-29-0x0000000000400000-0x0000000000B78000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        7.5MB

                                                                                                                                      • memory/1768-149-0x0000000000400000-0x0000000000B78000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        7.5MB

                                                                                                                                      • memory/1768-34-0x0000000000400000-0x0000000000B78000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        7.5MB

                                                                                                                                      • memory/1768-35-0x0000000000400000-0x0000000000B78000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        7.5MB