Analysis

  • max time kernel
    149s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25/10/2024, 01:29

General

  • Target

    75a6e471f546f407031f9d7dc71e3fe9_JaffaCakes118.exe

  • Size

    867KB

  • MD5

    75a6e471f546f407031f9d7dc71e3fe9

  • SHA1

    4e95d3aab37c18fe8227f5bff852f202c0eeb3eb

  • SHA256

    9b8a5b8cbd57e504d47454e1e1b3c85e39de4d2d941cd3b90c3c54d99a12c63f

  • SHA512

    635afb5a8ac26243a21872758948c16a4c1a1a16a5e23bbcb7827ccf53e207c92eabe1f30f40ccb0cd8e0bb103916d950173b179876801282c306746743a6fb8

  • SSDEEP

    24576:z9CdFrar4Guj/gYOX/VbBXcV31iXhzDtFCi8OLrIoU9jx:zodFr+huj/K/XXO1iXNDtFCROLrujx

Malware Config

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies WinLogon for persistence 2 TTPs 27 IoCs
  • Sets file to hidden 1 TTPs 52 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Executes dropped EXE 54 IoCs
  • Loads dropped DLL 64 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Drops file in System32 directory 64 IoCs
  • UPX packed file 45 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 52 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 27 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 52 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\75a6e471f546f407031f9d7dc71e3fe9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\75a6e471f546f407031f9d7dc71e3fe9_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1640
    • C:\Users\Admin\AppData\Local\Temp\hh.exe
      "C:\Users\Admin\AppData\Local\Temp\hh.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2568
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\hh.exe" +s +h
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1980
        • C:\Windows\SysWOW64\attrib.exe
          attrib "C:\Users\Admin\AppData\Local\Temp\hh.exe" +s +h
          4⤵
          • Sets file to hidden
          • System Location Discovery: System Language Discovery
          • Views/modifies file attributes
          PID:2712
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2852
        • C:\Windows\SysWOW64\attrib.exe
          attrib "C:\Users\Admin\AppData\Local\Temp" +s +h
          4⤵
          • Sets file to hidden
          • Views/modifies file attributes
          PID:2700
      • C:\Users\Admin\AppData\Local\Temp\129660.DEVID.INFO.EXE
        "C:\Users\Admin\AppData\Local\Temp\129660.DEVID.INFO.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        PID:2648
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Users\Admin\AppData\Local\Temp\hh.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Suspicious use of WriteProcessMemory
        PID:1760
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1 -n 4
          4⤵
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:3044
      • C:\Windows\SysWOW64\svc\svch0stc.exe
        "C:\Windows\system32\svc\svch0stc.exe"
        3⤵
        • Modifies WinLogon for persistence
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in System32 directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2964
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2024
          • C:\Windows\SysWOW64\attrib.exe
            attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h
            5⤵
            • Sets file to hidden
            • Views/modifies file attributes
            PID:1796
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc" +s +h
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1860
          • C:\Windows\SysWOW64\attrib.exe
            attrib "C:\Windows\SysWOW64\svc" +s +h
            5⤵
            • Sets file to hidden
            • Drops file in System32 directory
            • Views/modifies file attributes
            PID:2112
        • C:\Users\Admin\AppData\Local\Temp\129660.DEVID.INFO.EXE
          "C:\Users\Admin\AppData\Local\Temp\129660.DEVID.INFO.EXE"
          4⤵
          • Executes dropped EXE
          • Suspicious use of FindShellTrayWindow
          PID:2428
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\svc\svch0stc.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          PID:1088
          • C:\Windows\SysWOW64\PING.EXE
            ping 127.0.0.1 -n 4
            5⤵
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:1852
        • C:\Windows\SysWOW64\svc\svch0stc.exe
          "C:\Windows\system32\svc\svch0stc.exe"
          4⤵
          • Modifies WinLogon for persistence
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in System32 directory
          • Suspicious use of AdjustPrivilegeToken
          PID:848
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h
            5⤵
            • System Location Discovery: System Language Discovery
            PID:1584
            • C:\Windows\SysWOW64\attrib.exe
              attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h
              6⤵
              • Sets file to hidden
              • Views/modifies file attributes
              PID:1608
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc" +s +h
            5⤵
            • System Location Discovery: System Language Discovery
            PID:348
            • C:\Windows\SysWOW64\attrib.exe
              attrib "C:\Windows\SysWOW64\svc" +s +h
              6⤵
              • Sets file to hidden
              • Drops file in System32 directory
              • Views/modifies file attributes
              PID:1228
          • C:\Users\Admin\AppData\Local\Temp\129660.DEVID.INFO.EXE
            "C:\Users\Admin\AppData\Local\Temp\129660.DEVID.INFO.EXE"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of FindShellTrayWindow
            PID:600
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\svc\svch0stc.exe"
            5⤵
            • System Location Discovery: System Language Discovery
            • System Network Configuration Discovery: Internet Connection Discovery
            PID:1276
            • C:\Windows\SysWOW64\PING.EXE
              ping 127.0.0.1 -n 4
              6⤵
              • System Location Discovery: System Language Discovery
              • System Network Configuration Discovery: Internet Connection Discovery
              • Runs ping.exe
              PID:2272
          • C:\Windows\SysWOW64\svc\svch0stc.exe
            "C:\Windows\system32\svc\svch0stc.exe"
            5⤵
            • Modifies WinLogon for persistence
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            PID:280
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h
              6⤵
                PID:2504
                • C:\Windows\SysWOW64\attrib.exe
                  attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h
                  7⤵
                  • Sets file to hidden
                  • Drops file in System32 directory
                  • Views/modifies file attributes
                  PID:1904
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc" +s +h
                6⤵
                  PID:2436
                  • C:\Windows\SysWOW64\attrib.exe
                    attrib "C:\Windows\SysWOW64\svc" +s +h
                    7⤵
                    • Sets file to hidden
                    • Drops file in System32 directory
                    • Views/modifies file attributes
                    PID:2076
                • C:\Users\Admin\AppData\Local\Temp\129660.DEVID.INFO.EXE
                  "C:\Users\Admin\AppData\Local\Temp\129660.DEVID.INFO.EXE"
                  6⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of FindShellTrayWindow
                  PID:1828
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\svc\svch0stc.exe"
                  6⤵
                  • System Network Configuration Discovery: Internet Connection Discovery
                  PID:1900
                  • C:\Windows\SysWOW64\PING.EXE
                    ping 127.0.0.1 -n 4
                    7⤵
                    • System Network Configuration Discovery: Internet Connection Discovery
                    • Runs ping.exe
                    PID:2740
                • C:\Windows\SysWOW64\svc\svch0stc.exe
                  "C:\Windows\system32\svc\svch0stc.exe"
                  6⤵
                  • Modifies WinLogon for persistence
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Adds Run key to start application
                  • Drops file in System32 directory
                  PID:1624
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h
                    7⤵
                    • System Location Discovery: System Language Discovery
                    PID:2828
                    • C:\Windows\SysWOW64\attrib.exe
                      attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h
                      8⤵
                      • Sets file to hidden
                      • Views/modifies file attributes
                      PID:1916
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc" +s +h
                    7⤵
                      PID:2924
                      • C:\Windows\SysWOW64\attrib.exe
                        attrib "C:\Windows\SysWOW64\svc" +s +h
                        8⤵
                        • Sets file to hidden
                        • Drops file in System32 directory
                        • Views/modifies file attributes
                        PID:2688
                    • C:\Users\Admin\AppData\Local\Temp\129660.DEVID.INFO.EXE
                      "C:\Users\Admin\AppData\Local\Temp\129660.DEVID.INFO.EXE"
                      7⤵
                      • Executes dropped EXE
                      • Suspicious use of FindShellTrayWindow
                      PID:2796
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\svc\svch0stc.exe"
                      7⤵
                      • System Network Configuration Discovery: Internet Connection Discovery
                      PID:2536
                      • C:\Windows\SysWOW64\PING.EXE
                        ping 127.0.0.1 -n 4
                        8⤵
                        • System Network Configuration Discovery: Internet Connection Discovery
                        • Runs ping.exe
                        PID:2932
                    • C:\Windows\SysWOW64\svc\svch0stc.exe
                      "C:\Windows\system32\svc\svch0stc.exe"
                      7⤵
                      • Modifies WinLogon for persistence
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Adds Run key to start application
                      • Drops file in System32 directory
                      PID:2100
                      • C:\Windows\SysWOW64\cmd.exe
                        "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h
                        8⤵
                          PID:2452
                          • C:\Windows\SysWOW64\attrib.exe
                            attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h
                            9⤵
                            • Sets file to hidden
                            • Views/modifies file attributes
                            PID:536
                        • C:\Windows\SysWOW64\cmd.exe
                          "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc" +s +h
                          8⤵
                            PID:2896
                            • C:\Windows\SysWOW64\attrib.exe
                              attrib "C:\Windows\SysWOW64\svc" +s +h
                              9⤵
                              • Sets file to hidden
                              • Views/modifies file attributes
                              PID:1668
                          • C:\Users\Admin\AppData\Local\Temp\129660.DEVID.INFO.EXE
                            "C:\Users\Admin\AppData\Local\Temp\129660.DEVID.INFO.EXE"
                            8⤵
                            • Executes dropped EXE
                            • Suspicious use of FindShellTrayWindow
                            PID:1508
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\svc\svch0stc.exe"
                            8⤵
                            • System Network Configuration Discovery: Internet Connection Discovery
                            PID:2944
                            • C:\Windows\SysWOW64\PING.EXE
                              ping 127.0.0.1 -n 4
                              9⤵
                              • System Network Configuration Discovery: Internet Connection Discovery
                              • Runs ping.exe
                              PID:832
                          • C:\Windows\SysWOW64\svc\svch0stc.exe
                            "C:\Windows\system32\svc\svch0stc.exe"
                            8⤵
                            • Modifies WinLogon for persistence
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Adds Run key to start application
                            • Drops file in System32 directory
                            • System Location Discovery: System Language Discovery
                            PID:2620
                            • C:\Windows\SysWOW64\cmd.exe
                              "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h
                              9⤵
                              • System Location Discovery: System Language Discovery
                              PID:1320
                              • C:\Windows\SysWOW64\attrib.exe
                                attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h
                                10⤵
                                • Sets file to hidden
                                • Views/modifies file attributes
                                PID:908
                            • C:\Windows\SysWOW64\cmd.exe
                              "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc" +s +h
                              9⤵
                                PID:960
                                • C:\Windows\SysWOW64\attrib.exe
                                  attrib "C:\Windows\SysWOW64\svc" +s +h
                                  10⤵
                                  • Sets file to hidden
                                  • Views/modifies file attributes
                                  PID:900
                              • C:\Users\Admin\AppData\Local\Temp\129660.DEVID.INFO.EXE
                                "C:\Users\Admin\AppData\Local\Temp\129660.DEVID.INFO.EXE"
                                9⤵
                                • Executes dropped EXE
                                • Suspicious use of FindShellTrayWindow
                                PID:1472
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\svc\svch0stc.exe"
                                9⤵
                                • System Network Configuration Discovery: Internet Connection Discovery
                                PID:764
                                • C:\Windows\SysWOW64\PING.EXE
                                  ping 127.0.0.1 -n 4
                                  10⤵
                                  • System Location Discovery: System Language Discovery
                                  • System Network Configuration Discovery: Internet Connection Discovery
                                  • Runs ping.exe
                                  PID:992
                              • C:\Windows\SysWOW64\svc\svch0stc.exe
                                "C:\Windows\system32\svc\svch0stc.exe"
                                9⤵
                                • Modifies WinLogon for persistence
                                • Executes dropped EXE
                                • Loads dropped DLL
                                • Adds Run key to start application
                                • Drops file in System32 directory
                                PID:3032
                                • C:\Windows\SysWOW64\cmd.exe
                                  "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h
                                  10⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:1952
                                  • C:\Windows\SysWOW64\attrib.exe
                                    attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h
                                    11⤵
                                    • Sets file to hidden
                                    • Drops file in System32 directory
                                    • Views/modifies file attributes
                                    PID:1652
                                • C:\Windows\SysWOW64\cmd.exe
                                  "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc" +s +h
                                  10⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:1948
                                  • C:\Windows\SysWOW64\attrib.exe
                                    attrib "C:\Windows\SysWOW64\svc" +s +h
                                    11⤵
                                    • Sets file to hidden
                                    • System Location Discovery: System Language Discovery
                                    • Views/modifies file attributes
                                    PID:352
                                • C:\Users\Admin\AppData\Local\Temp\129660.DEVID.INFO.EXE
                                  "C:\Users\Admin\AppData\Local\Temp\129660.DEVID.INFO.EXE"
                                  10⤵
                                  • Executes dropped EXE
                                  • Suspicious use of FindShellTrayWindow
                                  PID:1984
                                • C:\Windows\SysWOW64\cmd.exe
                                  "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\svc\svch0stc.exe"
                                  10⤵
                                  • System Location Discovery: System Language Discovery
                                  • System Network Configuration Discovery: Internet Connection Discovery
                                  PID:2836
                                  • C:\Windows\SysWOW64\PING.EXE
                                    ping 127.0.0.1 -n 4
                                    11⤵
                                    • System Network Configuration Discovery: Internet Connection Discovery
                                    • Runs ping.exe
                                    PID:1828
                                • C:\Windows\SysWOW64\svc\svch0stc.exe
                                  "C:\Windows\system32\svc\svch0stc.exe"
                                  10⤵
                                  • Modifies WinLogon for persistence
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Adds Run key to start application
                                  • Drops file in System32 directory
                                  PID:2264
                                  • C:\Windows\SysWOW64\cmd.exe
                                    "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h
                                    11⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:2972
                                    • C:\Windows\SysWOW64\attrib.exe
                                      attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h
                                      12⤵
                                      • Sets file to hidden
                                      • Drops file in System32 directory
                                      • Views/modifies file attributes
                                      PID:2656
                                  • C:\Windows\SysWOW64\cmd.exe
                                    "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc" +s +h
                                    11⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:3004
                                    • C:\Windows\SysWOW64\attrib.exe
                                      attrib "C:\Windows\SysWOW64\svc" +s +h
                                      12⤵
                                      • Sets file to hidden
                                      • Drops file in System32 directory
                                      • System Location Discovery: System Language Discovery
                                      • Views/modifies file attributes
                                      PID:2676
                                  • C:\Users\Admin\AppData\Local\Temp\129660.DEVID.INFO.EXE
                                    "C:\Users\Admin\AppData\Local\Temp\129660.DEVID.INFO.EXE"
                                    11⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious use of FindShellTrayWindow
                                    PID:2688
                                  • C:\Windows\SysWOW64\cmd.exe
                                    "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\svc\svch0stc.exe"
                                    11⤵
                                    • System Network Configuration Discovery: Internet Connection Discovery
                                    PID:2652
                                    • C:\Windows\SysWOW64\PING.EXE
                                      ping 127.0.0.1 -n 4
                                      12⤵
                                      • System Network Configuration Discovery: Internet Connection Discovery
                                      • Runs ping.exe
                                      PID:2448
                                  • C:\Windows\SysWOW64\svc\svch0stc.exe
                                    "C:\Windows\system32\svc\svch0stc.exe"
                                    11⤵
                                    • Modifies WinLogon for persistence
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • Adds Run key to start application
                                    • Drops file in System32 directory
                                    PID:808
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h
                                      12⤵
                                        PID:2088
                                        • C:\Windows\SysWOW64\attrib.exe
                                          attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h
                                          13⤵
                                          • Sets file to hidden
                                          • Views/modifies file attributes
                                          PID:2604
                                      • C:\Windows\SysWOW64\cmd.exe
                                        "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc" +s +h
                                        12⤵
                                          PID:1516
                                          • C:\Windows\SysWOW64\attrib.exe
                                            attrib "C:\Windows\SysWOW64\svc" +s +h
                                            13⤵
                                            • Sets file to hidden
                                            • Drops file in System32 directory
                                            • Views/modifies file attributes
                                            PID:1712
                                        • C:\Users\Admin\AppData\Local\Temp\129660.DEVID.INFO.EXE
                                          "C:\Users\Admin\AppData\Local\Temp\129660.DEVID.INFO.EXE"
                                          12⤵
                                          • Executes dropped EXE
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious use of FindShellTrayWindow
                                          PID:2996
                                        • C:\Windows\SysWOW64\cmd.exe
                                          "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\svc\svch0stc.exe"
                                          12⤵
                                          • System Network Configuration Discovery: Internet Connection Discovery
                                          PID:1376
                                          • C:\Windows\SysWOW64\PING.EXE
                                            ping 127.0.0.1 -n 4
                                            13⤵
                                            • System Network Configuration Discovery: Internet Connection Discovery
                                            • Runs ping.exe
                                            PID:1968
                                        • C:\Windows\SysWOW64\svc\svch0stc.exe
                                          "C:\Windows\system32\svc\svch0stc.exe"
                                          12⤵
                                          • Modifies WinLogon for persistence
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • Adds Run key to start application
                                          • Drops file in System32 directory
                                          PID:2160
                                          • C:\Windows\SysWOW64\cmd.exe
                                            "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h
                                            13⤵
                                              PID:1752
                                              • C:\Windows\SysWOW64\attrib.exe
                                                attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h
                                                14⤵
                                                • Sets file to hidden
                                                • Drops file in System32 directory
                                                • Views/modifies file attributes
                                                PID:1632
                                            • C:\Windows\SysWOW64\cmd.exe
                                              "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc" +s +h
                                              13⤵
                                                PID:2736
                                                • C:\Windows\SysWOW64\attrib.exe
                                                  attrib "C:\Windows\SysWOW64\svc" +s +h
                                                  14⤵
                                                  • Sets file to hidden
                                                  • Drops file in System32 directory
                                                  • System Location Discovery: System Language Discovery
                                                  • Views/modifies file attributes
                                                  PID:1472
                                              • C:\Users\Admin\AppData\Local\Temp\129660.DEVID.INFO.EXE
                                                "C:\Users\Admin\AppData\Local\Temp\129660.DEVID.INFO.EXE"
                                                13⤵
                                                • Executes dropped EXE
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious use of FindShellTrayWindow
                                                PID:2428
                                              • C:\Windows\SysWOW64\cmd.exe
                                                "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\svc\svch0stc.exe"
                                                13⤵
                                                • System Location Discovery: System Language Discovery
                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                PID:2508
                                                • C:\Windows\SysWOW64\PING.EXE
                                                  ping 127.0.0.1 -n 4
                                                  14⤵
                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                  • Runs ping.exe
                                                  PID:1100
                                              • C:\Windows\SysWOW64\svc\svch0stc.exe
                                                "C:\Windows\system32\svc\svch0stc.exe"
                                                13⤵
                                                • Modifies WinLogon for persistence
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                • Adds Run key to start application
                                                • Drops file in System32 directory
                                                • System Location Discovery: System Language Discovery
                                                PID:2556
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h
                                                  14⤵
                                                    PID:1792
                                                    • C:\Windows\SysWOW64\attrib.exe
                                                      attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h
                                                      15⤵
                                                      • Sets file to hidden
                                                      • Views/modifies file attributes
                                                      PID:2676
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc" +s +h
                                                    14⤵
                                                      PID:2856
                                                      • C:\Windows\SysWOW64\attrib.exe
                                                        attrib "C:\Windows\SysWOW64\svc" +s +h
                                                        15⤵
                                                        • Sets file to hidden
                                                        • Views/modifies file attributes
                                                        PID:1920
                                                    • C:\Users\Admin\AppData\Local\Temp\129660.DEVID.INFO.EXE
                                                      "C:\Users\Admin\AppData\Local\Temp\129660.DEVID.INFO.EXE"
                                                      14⤵
                                                      • Executes dropped EXE
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious use of FindShellTrayWindow
                                                      PID:2192
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\svc\svch0stc.exe"
                                                      14⤵
                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                      PID:2116
                                                      • C:\Windows\SysWOW64\PING.EXE
                                                        ping 127.0.0.1 -n 4
                                                        15⤵
                                                        • System Network Configuration Discovery: Internet Connection Discovery
                                                        • Runs ping.exe
                                                        PID:748
                                                    • C:\Windows\SysWOW64\svc\svch0stc.exe
                                                      "C:\Windows\system32\svc\svch0stc.exe"
                                                      14⤵
                                                      • Modifies WinLogon for persistence
                                                      • Executes dropped EXE
                                                      • Loads dropped DLL
                                                      • Adds Run key to start application
                                                      PID:536
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h
                                                        15⤵
                                                          PID:2976
                                                          • C:\Windows\SysWOW64\attrib.exe
                                                            attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h
                                                            16⤵
                                                            • Sets file to hidden
                                                            • Drops file in System32 directory
                                                            • Views/modifies file attributes
                                                            PID:3068
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc" +s +h
                                                          15⤵
                                                            PID:2568
                                                            • C:\Windows\SysWOW64\attrib.exe
                                                              attrib "C:\Windows\SysWOW64\svc" +s +h
                                                              16⤵
                                                              • Sets file to hidden
                                                              • System Location Discovery: System Language Discovery
                                                              • Views/modifies file attributes
                                                              PID:1712
                                                          • C:\Users\Admin\AppData\Local\Temp\129660.DEVID.INFO.EXE
                                                            "C:\Users\Admin\AppData\Local\Temp\129660.DEVID.INFO.EXE"
                                                            15⤵
                                                            • Executes dropped EXE
                                                            • Suspicious use of FindShellTrayWindow
                                                            PID:2404
                                                          • C:\Windows\SysWOW64\cmd.exe
                                                            "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\svc\svch0stc.exe"
                                                            15⤵
                                                            • System Network Configuration Discovery: Internet Connection Discovery
                                                            PID:2336
                                                            • C:\Windows\SysWOW64\PING.EXE
                                                              ping 127.0.0.1 -n 4
                                                              16⤵
                                                              • System Location Discovery: System Language Discovery
                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                              • Runs ping.exe
                                                              PID:2768
                                                          • C:\Windows\SysWOW64\svc\svch0stc.exe
                                                            "C:\Windows\system32\svc\svch0stc.exe"
                                                            15⤵
                                                            • Modifies WinLogon for persistence
                                                            • Executes dropped EXE
                                                            • Loads dropped DLL
                                                            • Adds Run key to start application
                                                            • Drops file in System32 directory
                                                            PID:1364
                                                            • C:\Windows\SysWOW64\cmd.exe
                                                              "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h
                                                              16⤵
                                                                PID:1728
                                                                • C:\Windows\SysWOW64\attrib.exe
                                                                  attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h
                                                                  17⤵
                                                                  • Sets file to hidden
                                                                  • Drops file in System32 directory
                                                                  • Views/modifies file attributes
                                                                  PID:1652
                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc" +s +h
                                                                16⤵
                                                                  PID:1632
                                                                  • C:\Windows\SysWOW64\attrib.exe
                                                                    attrib "C:\Windows\SysWOW64\svc" +s +h
                                                                    17⤵
                                                                    • Sets file to hidden
                                                                    • System Location Discovery: System Language Discovery
                                                                    • Views/modifies file attributes
                                                                    PID:2280
                                                                • C:\Users\Admin\AppData\Local\Temp\129660.DEVID.INFO.EXE
                                                                  "C:\Users\Admin\AppData\Local\Temp\129660.DEVID.INFO.EXE"
                                                                  16⤵
                                                                  • Executes dropped EXE
                                                                  • Suspicious use of FindShellTrayWindow
                                                                  PID:1816
                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                  "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\svc\svch0stc.exe"
                                                                  16⤵
                                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                                  PID:1100
                                                                  • C:\Windows\SysWOW64\PING.EXE
                                                                    ping 127.0.0.1 -n 4
                                                                    17⤵
                                                                    • System Network Configuration Discovery: Internet Connection Discovery
                                                                    • Runs ping.exe
                                                                    PID:1984
                                                                • C:\Windows\SysWOW64\svc\svch0stc.exe
                                                                  "C:\Windows\system32\svc\svch0stc.exe"
                                                                  16⤵
                                                                  • Modifies WinLogon for persistence
                                                                  • Executes dropped EXE
                                                                  • Loads dropped DLL
                                                                  • Adds Run key to start application
                                                                  • Drops file in System32 directory
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:2960
                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                    "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h
                                                                    17⤵
                                                                      PID:3040
                                                                      • C:\Windows\SysWOW64\attrib.exe
                                                                        attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h
                                                                        18⤵
                                                                        • Sets file to hidden
                                                                        • System Location Discovery: System Language Discovery
                                                                        • Views/modifies file attributes
                                                                        PID:896
                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                      "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc" +s +h
                                                                      17⤵
                                                                        PID:3044
                                                                        • C:\Windows\SysWOW64\attrib.exe
                                                                          attrib "C:\Windows\SysWOW64\svc" +s +h
                                                                          18⤵
                                                                          • Sets file to hidden
                                                                          • System Location Discovery: System Language Discovery
                                                                          • Views/modifies file attributes
                                                                          PID:2700
                                                                      • C:\Users\Admin\AppData\Local\Temp\129660.DEVID.INFO.EXE
                                                                        "C:\Users\Admin\AppData\Local\Temp\129660.DEVID.INFO.EXE"
                                                                        17⤵
                                                                        • Executes dropped EXE
                                                                        • Suspicious use of FindShellTrayWindow
                                                                        PID:1224
                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                        "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\svc\svch0stc.exe"
                                                                        17⤵
                                                                        • System Network Configuration Discovery: Internet Connection Discovery
                                                                        PID:1492
                                                                        • C:\Windows\SysWOW64\PING.EXE
                                                                          ping 127.0.0.1 -n 4
                                                                          18⤵
                                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                                          • Runs ping.exe
                                                                          PID:900
                                                                      • C:\Windows\SysWOW64\svc\svch0stc.exe
                                                                        "C:\Windows\system32\svc\svch0stc.exe"
                                                                        17⤵
                                                                        • Modifies WinLogon for persistence
                                                                        • Executes dropped EXE
                                                                        • Loads dropped DLL
                                                                        • Adds Run key to start application
                                                                        • Drops file in System32 directory
                                                                        PID:2444
                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                          "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h
                                                                          18⤵
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:1420
                                                                          • C:\Windows\SysWOW64\attrib.exe
                                                                            attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h
                                                                            19⤵
                                                                            • Sets file to hidden
                                                                            • Drops file in System32 directory
                                                                            • System Location Discovery: System Language Discovery
                                                                            • Views/modifies file attributes
                                                                            PID:584
                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                          "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc" +s +h
                                                                          18⤵
                                                                            PID:1588
                                                                            • C:\Windows\SysWOW64\attrib.exe
                                                                              attrib "C:\Windows\SysWOW64\svc" +s +h
                                                                              19⤵
                                                                              • Sets file to hidden
                                                                              • Drops file in System32 directory
                                                                              • Views/modifies file attributes
                                                                              PID:2996
                                                                          • C:\Users\Admin\AppData\Local\Temp\129660.DEVID.INFO.EXE
                                                                            "C:\Users\Admin\AppData\Local\Temp\129660.DEVID.INFO.EXE"
                                                                            18⤵
                                                                            • Executes dropped EXE
                                                                            • Suspicious use of FindShellTrayWindow
                                                                            PID:2760
                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                            "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\svc\svch0stc.exe"
                                                                            18⤵
                                                                            • System Network Configuration Discovery: Internet Connection Discovery
                                                                            PID:848
                                                                            • C:\Windows\SysWOW64\PING.EXE
                                                                              ping 127.0.0.1 -n 4
                                                                              19⤵
                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                              • Runs ping.exe
                                                                              PID:2840
                                                                          • C:\Windows\SysWOW64\svc\svch0stc.exe
                                                                            "C:\Windows\system32\svc\svch0stc.exe"
                                                                            18⤵
                                                                            • Modifies WinLogon for persistence
                                                                            • Executes dropped EXE
                                                                            • Loads dropped DLL
                                                                            • Adds Run key to start application
                                                                            • Drops file in System32 directory
                                                                            PID:280
                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                              "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h
                                                                              19⤵
                                                                                PID:2952
                                                                                • C:\Windows\SysWOW64\attrib.exe
                                                                                  attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h
                                                                                  20⤵
                                                                                  • Sets file to hidden
                                                                                  • Drops file in System32 directory
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  • Views/modifies file attributes
                                                                                  PID:1468
                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc" +s +h
                                                                                19⤵
                                                                                  PID:1928
                                                                                  • C:\Windows\SysWOW64\attrib.exe
                                                                                    attrib "C:\Windows\SysWOW64\svc" +s +h
                                                                                    20⤵
                                                                                    • Sets file to hidden
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    • Views/modifies file attributes
                                                                                    PID:2556
                                                                                • C:\Users\Admin\AppData\Local\Temp\129660.DEVID.INFO.EXE
                                                                                  "C:\Users\Admin\AppData\Local\Temp\129660.DEVID.INFO.EXE"
                                                                                  19⤵
                                                                                  • Executes dropped EXE
                                                                                  • Suspicious use of FindShellTrayWindow
                                                                                  PID:2948
                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                  "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\svc\svch0stc.exe"
                                                                                  19⤵
                                                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                                                  PID:2380
                                                                                  • C:\Windows\SysWOW64\PING.EXE
                                                                                    ping 127.0.0.1 -n 4
                                                                                    20⤵
                                                                                    • System Network Configuration Discovery: Internet Connection Discovery
                                                                                    • Runs ping.exe
                                                                                    PID:2724
                                                                                • C:\Windows\SysWOW64\svc\svch0stc.exe
                                                                                  "C:\Windows\system32\svc\svch0stc.exe"
                                                                                  19⤵
                                                                                  • Modifies WinLogon for persistence
                                                                                  • Executes dropped EXE
                                                                                  • Loads dropped DLL
                                                                                  • Adds Run key to start application
                                                                                  • Drops file in System32 directory
                                                                                  PID:2960
                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                    "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h
                                                                                    20⤵
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    PID:772
                                                                                    • C:\Windows\SysWOW64\attrib.exe
                                                                                      attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h
                                                                                      21⤵
                                                                                      • Sets file to hidden
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      • Views/modifies file attributes
                                                                                      PID:1740
                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                    "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc" +s +h
                                                                                    20⤵
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    PID:924
                                                                                    • C:\Windows\SysWOW64\attrib.exe
                                                                                      attrib "C:\Windows\SysWOW64\svc" +s +h
                                                                                      21⤵
                                                                                      • Sets file to hidden
                                                                                      • Drops file in System32 directory
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      • Views/modifies file attributes
                                                                                      PID:1012
                                                                                  • C:\Users\Admin\AppData\Local\Temp\129660.DEVID.INFO.EXE
                                                                                    "C:\Users\Admin\AppData\Local\Temp\129660.DEVID.INFO.EXE"
                                                                                    20⤵
                                                                                    • Executes dropped EXE
                                                                                    • Suspicious use of FindShellTrayWindow
                                                                                    PID:1680
                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                    "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\svc\svch0stc.exe"
                                                                                    20⤵
                                                                                    • System Network Configuration Discovery: Internet Connection Discovery
                                                                                    PID:984
                                                                                    • C:\Windows\SysWOW64\PING.EXE
                                                                                      ping 127.0.0.1 -n 4
                                                                                      21⤵
                                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                                      • Runs ping.exe
                                                                                      PID:2840
                                                                                  • C:\Windows\SysWOW64\svc\svch0stc.exe
                                                                                    "C:\Windows\system32\svc\svch0stc.exe"
                                                                                    20⤵
                                                                                    • Modifies WinLogon for persistence
                                                                                    • Executes dropped EXE
                                                                                    • Loads dropped DLL
                                                                                    • Adds Run key to start application
                                                                                    • Drops file in System32 directory
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    PID:2388
                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                      "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h
                                                                                      21⤵
                                                                                        PID:576
                                                                                        • C:\Windows\SysWOW64\attrib.exe
                                                                                          attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h
                                                                                          22⤵
                                                                                          • Sets file to hidden
                                                                                          • Views/modifies file attributes
                                                                                          PID:1788
                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                        "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc" +s +h
                                                                                        21⤵
                                                                                          PID:468
                                                                                          • C:\Windows\SysWOW64\attrib.exe
                                                                                            attrib "C:\Windows\SysWOW64\svc" +s +h
                                                                                            22⤵
                                                                                            • Sets file to hidden
                                                                                            • Drops file in System32 directory
                                                                                            • Views/modifies file attributes
                                                                                            PID:2428
                                                                                        • C:\Users\Admin\AppData\Local\Temp\129660.DEVID.INFO.EXE
                                                                                          "C:\Users\Admin\AppData\Local\Temp\129660.DEVID.INFO.EXE"
                                                                                          21⤵
                                                                                          • Executes dropped EXE
                                                                                          • Suspicious use of FindShellTrayWindow
                                                                                          PID:2688
                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                          "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\svc\svch0stc.exe"
                                                                                          21⤵
                                                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                                                          PID:2948
                                                                                          • C:\Windows\SysWOW64\PING.EXE
                                                                                            ping 127.0.0.1 -n 4
                                                                                            22⤵
                                                                                            • System Network Configuration Discovery: Internet Connection Discovery
                                                                                            • Runs ping.exe
                                                                                            PID:1652
                                                                                        • C:\Windows\SysWOW64\svc\svch0stc.exe
                                                                                          "C:\Windows\system32\svc\svch0stc.exe"
                                                                                          21⤵
                                                                                          • Modifies WinLogon for persistence
                                                                                          • Executes dropped EXE
                                                                                          • Loads dropped DLL
                                                                                          • Adds Run key to start application
                                                                                          • Drops file in System32 directory
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          PID:2720
                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                            "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h
                                                                                            22⤵
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            PID:1836
                                                                                            • C:\Windows\SysWOW64\attrib.exe
                                                                                              attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h
                                                                                              23⤵
                                                                                              • Sets file to hidden
                                                                                              • Views/modifies file attributes
                                                                                              PID:1920
                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                            "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc" +s +h
                                                                                            22⤵
                                                                                              PID:2444
                                                                                              • C:\Windows\SysWOW64\attrib.exe
                                                                                                attrib "C:\Windows\SysWOW64\svc" +s +h
                                                                                                23⤵
                                                                                                • Sets file to hidden
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                • Views/modifies file attributes
                                                                                                PID:2760
                                                                                            • C:\Users\Admin\AppData\Local\Temp\129660.DEVID.INFO.EXE
                                                                                              "C:\Users\Admin\AppData\Local\Temp\129660.DEVID.INFO.EXE"
                                                                                              22⤵
                                                                                              • Executes dropped EXE
                                                                                              • Suspicious use of FindShellTrayWindow
                                                                                              PID:1668
                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                              "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\svc\svch0stc.exe"
                                                                                              22⤵
                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                              PID:1364
                                                                                              • C:\Windows\SysWOW64\PING.EXE
                                                                                                ping 127.0.0.1 -n 4
                                                                                                23⤵
                                                                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                • Runs ping.exe
                                                                                                PID:316
                                                                                            • C:\Windows\SysWOW64\svc\svch0stc.exe
                                                                                              "C:\Windows\system32\svc\svch0stc.exe"
                                                                                              22⤵
                                                                                              • Modifies WinLogon for persistence
                                                                                              • Executes dropped EXE
                                                                                              • Loads dropped DLL
                                                                                              • Adds Run key to start application
                                                                                              • Drops file in System32 directory
                                                                                              PID:908
                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h
                                                                                                23⤵
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                PID:2200
                                                                                                • C:\Windows\SysWOW64\attrib.exe
                                                                                                  attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h
                                                                                                  24⤵
                                                                                                  • Sets file to hidden
                                                                                                  • Views/modifies file attributes
                                                                                                  PID:844
                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc" +s +h
                                                                                                23⤵
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                PID:2248
                                                                                                • C:\Windows\SysWOW64\attrib.exe
                                                                                                  attrib "C:\Windows\SysWOW64\svc" +s +h
                                                                                                  24⤵
                                                                                                  • Sets file to hidden
                                                                                                  • Views/modifies file attributes
                                                                                                  PID:620
                                                                                              • C:\Users\Admin\AppData\Local\Temp\129660.DEVID.INFO.EXE
                                                                                                "C:\Users\Admin\AppData\Local\Temp\129660.DEVID.INFO.EXE"
                                                                                                23⤵
                                                                                                • Executes dropped EXE
                                                                                                • Suspicious use of FindShellTrayWindow
                                                                                                PID:2608
                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\svc\svch0stc.exe"
                                                                                                23⤵
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                PID:3048
                                                                                                • C:\Windows\SysWOW64\PING.EXE
                                                                                                  ping 127.0.0.1 -n 4
                                                                                                  24⤵
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                  • Runs ping.exe
                                                                                                  PID:2672
                                                                                              • C:\Windows\SysWOW64\svc\svch0stc.exe
                                                                                                "C:\Windows\system32\svc\svch0stc.exe"
                                                                                                23⤵
                                                                                                • Modifies WinLogon for persistence
                                                                                                • Executes dropped EXE
                                                                                                • Adds Run key to start application
                                                                                                PID:928
                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                  "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h
                                                                                                  24⤵
                                                                                                    PID:1628
                                                                                                    • C:\Windows\SysWOW64\attrib.exe
                                                                                                      attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h
                                                                                                      25⤵
                                                                                                      • Sets file to hidden
                                                                                                      • Drops file in System32 directory
                                                                                                      • Views/modifies file attributes
                                                                                                      PID:1192
                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                    "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc" +s +h
                                                                                                    24⤵
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    PID:2032
                                                                                                    • C:\Windows\SysWOW64\attrib.exe
                                                                                                      attrib "C:\Windows\SysWOW64\svc" +s +h
                                                                                                      25⤵
                                                                                                      • Sets file to hidden
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      • Views/modifies file attributes
                                                                                                      PID:1620
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\129660.DEVID.INFO.EXE
                                                                                                    "C:\Users\Admin\AppData\Local\Temp\129660.DEVID.INFO.EXE"
                                                                                                    24⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    • Suspicious use of FindShellTrayWindow
                                                                                                    PID:2216
                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                    "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\svc\svch0stc.exe"
                                                                                                    24⤵
                                                                                                    • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                    PID:1788
                                                                                                    • C:\Windows\SysWOW64\PING.EXE
                                                                                                      ping 127.0.0.1 -n 4
                                                                                                      25⤵
                                                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                      • Runs ping.exe
                                                                                                      PID:2152
                                                                                                  • C:\Windows\SysWOW64\svc\svch0stc.exe
                                                                                                    "C:\Windows\system32\svc\svch0stc.exe"
                                                                                                    24⤵
                                                                                                    • Modifies WinLogon for persistence
                                                                                                    • Executes dropped EXE
                                                                                                    • Adds Run key to start application
                                                                                                    • Drops file in System32 directory
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    PID:2428
                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                      "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h
                                                                                                      25⤵
                                                                                                        PID:2204
                                                                                                        • C:\Windows\SysWOW64\attrib.exe
                                                                                                          attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h
                                                                                                          26⤵
                                                                                                          • Sets file to hidden
                                                                                                          • Drops file in System32 directory
                                                                                                          • Views/modifies file attributes
                                                                                                          PID:2192
                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                        "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc" +s +h
                                                                                                        25⤵
                                                                                                          PID:2820
                                                                                                          • C:\Windows\SysWOW64\attrib.exe
                                                                                                            attrib "C:\Windows\SysWOW64\svc" +s +h
                                                                                                            26⤵
                                                                                                            • Sets file to hidden
                                                                                                            • Drops file in System32 directory
                                                                                                            • Views/modifies file attributes
                                                                                                            PID:1680
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\129660.DEVID.INFO.EXE
                                                                                                          "C:\Users\Admin\AppData\Local\Temp\129660.DEVID.INFO.EXE"
                                                                                                          25⤵
                                                                                                          • Executes dropped EXE
                                                                                                          • Suspicious use of FindShellTrayWindow
                                                                                                          PID:1444
                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                          "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\svc\svch0stc.exe"
                                                                                                          25⤵
                                                                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                          PID:2932
                                                                                                          • C:\Windows\SysWOW64\PING.EXE
                                                                                                            ping 127.0.0.1 -n 4
                                                                                                            26⤵
                                                                                                            • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                            • Runs ping.exe
                                                                                                            PID:908
                                                                                                        • C:\Windows\SysWOW64\svc\svch0stc.exe
                                                                                                          "C:\Windows\system32\svc\svch0stc.exe"
                                                                                                          25⤵
                                                                                                          • Modifies WinLogon for persistence
                                                                                                          • Executes dropped EXE
                                                                                                          • Adds Run key to start application
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          PID:2760
                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                            "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h
                                                                                                            26⤵
                                                                                                              PID:352
                                                                                                              • C:\Windows\SysWOW64\attrib.exe
                                                                                                                attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h
                                                                                                                27⤵
                                                                                                                • Sets file to hidden
                                                                                                                • Drops file in System32 directory
                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                • Views/modifies file attributes
                                                                                                                PID:928
                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                              "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc" +s +h
                                                                                                              26⤵
                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                              PID:992
                                                                                                              • C:\Windows\SysWOW64\attrib.exe
                                                                                                                attrib "C:\Windows\SysWOW64\svc" +s +h
                                                                                                                27⤵
                                                                                                                • Sets file to hidden
                                                                                                                • Drops file in System32 directory
                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                • Views/modifies file attributes
                                                                                                                PID:1620
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\129660.DEVID.INFO.EXE
                                                                                                              "C:\Users\Admin\AppData\Local\Temp\129660.DEVID.INFO.EXE"
                                                                                                              26⤵
                                                                                                              • Executes dropped EXE
                                                                                                              • Suspicious use of FindShellTrayWindow
                                                                                                              PID:264
                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                              "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\svc\svch0stc.exe"
                                                                                                              26⤵
                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              PID:2428
                                                                                                              • C:\Windows\SysWOW64\PING.EXE
                                                                                                                ping 127.0.0.1 -n 4
                                                                                                                27⤵
                                                                                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                • Runs ping.exe
                                                                                                                PID:2052
                                                                                                            • C:\Windows\SysWOW64\svc\svch0stc.exe
                                                                                                              "C:\Windows\system32\svc\svch0stc.exe"
                                                                                                              26⤵
                                                                                                              • Modifies WinLogon for persistence
                                                                                                              • Executes dropped EXE
                                                                                                              • Adds Run key to start application
                                                                                                              • Drops file in System32 directory
                                                                                                              PID:280
                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h
                                                                                                                27⤵
                                                                                                                  PID:2940
                                                                                                                  • C:\Windows\SysWOW64\attrib.exe
                                                                                                                    attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h
                                                                                                                    28⤵
                                                                                                                    • Sets file to hidden
                                                                                                                    • Drops file in System32 directory
                                                                                                                    • Views/modifies file attributes
                                                                                                                    PID:2760
                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                  "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc" +s +h
                                                                                                                  27⤵
                                                                                                                    PID:2192
                                                                                                                    • C:\Windows\SysWOW64\attrib.exe
                                                                                                                      attrib "C:\Windows\SysWOW64\svc" +s +h
                                                                                                                      28⤵
                                                                                                                      • Sets file to hidden
                                                                                                                      • Views/modifies file attributes
                                                                                                                      PID:2936
                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\129660.DEVID.INFO.EXE
                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\129660.DEVID.INFO.EXE"
                                                                                                                    27⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Suspicious use of FindShellTrayWindow
                                                                                                                    PID:1460
                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                    "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\svc\svch0stc.exe"
                                                                                                                    27⤵
                                                                                                                    • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                    PID:3148
                                                                                                                    • C:\Windows\SysWOW64\PING.EXE
                                                                                                                      ping 127.0.0.1 -n 4
                                                                                                                      28⤵
                                                                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                      • Runs ping.exe
                                                                                                                      PID:3200
                                                                                                                  • C:\Windows\SysWOW64\svc\svch0stc.exe
                                                                                                                    "C:\Windows\system32\svc\svch0stc.exe"
                                                                                                                    27⤵
                                                                                                                    • Modifies WinLogon for persistence
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Adds Run key to start application
                                                                                                                    • Drops file in System32 directory
                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                    PID:3184
                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                      "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h
                                                                                                                      28⤵
                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                      PID:3276
                                                                                                                      • C:\Windows\SysWOW64\attrib.exe
                                                                                                                        attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h
                                                                                                                        29⤵
                                                                                                                        • Sets file to hidden
                                                                                                                        • Views/modifies file attributes
                                                                                                                        PID:3352
                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                      "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc" +s +h
                                                                                                                      28⤵
                                                                                                                        PID:3292
                                                                                                                        • C:\Windows\SysWOW64\attrib.exe
                                                                                                                          attrib "C:\Windows\SysWOW64\svc" +s +h
                                                                                                                          29⤵
                                                                                                                          • Sets file to hidden
                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                          • Views/modifies file attributes
                                                                                                                          PID:3364
                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\129660.DEVID.INFO.EXE
                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\129660.DEVID.INFO.EXE"
                                                                                                                        28⤵
                                                                                                                        • Executes dropped EXE
                                                                                                                        • Suspicious use of FindShellTrayWindow
                                                                                                                        PID:3312
                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                        "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\svc\svch0stc.exe"
                                                                                                                        28⤵
                                                                                                                        • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                        PID:3456
                                                                                                                        • C:\Windows\SysWOW64\PING.EXE
                                                                                                                          ping 127.0.0.1 -n 4
                                                                                                                          29⤵
                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                          • Runs ping.exe
                                                                                                                          PID:3492
                                                                                                                      • C:\Windows\SysWOW64\svc\svch0stc.exe
                                                                                                                        "C:\Windows\system32\svc\svch0stc.exe"
                                                                                                                        28⤵
                                                                                                                        • Modifies WinLogon for persistence
                                                                                                                        • Executes dropped EXE
                                                                                                                        • Adds Run key to start application
                                                                                                                        • Drops file in System32 directory
                                                                                                                        PID:3512
                                                                  • C:\Users\Admin\AppData\Local\Temp\129660.devid.info.exe
                                                                    "C:\Users\Admin\AppData\Local\Temp\129660.devid.info.exe"
                                                                    2⤵
                                                                    • Executes dropped EXE
                                                                    • Suspicious use of FindShellTrayWindow
                                                                    PID:1460
                                                                • C:\Windows\system32\conhost.exe
                                                                  \??\C:\Windows\system32\conhost.exe "-19775052651164897806-18649838961684695883-1989070087-1864114646-1588095307-755794087"
                                                                  1⤵
                                                                    PID:2996

                                                                  Network

                                                                  MITRE ATT&CK Enterprise v15

                                                                  Replay Monitor

                                                                  Loading Replay Monitor...

                                                                  Downloads

                                                                  • C:\Users\Admin\AppData\Local\Temp\129660.devid.info.exe

                                                                    Filesize

                                                                    152KB

                                                                    MD5

                                                                    0464f7cd5a269ce6d73e113ff88e40c2

                                                                    SHA1

                                                                    e3536313e6444849ae348bdeac2b7c7ae0f35c73

                                                                    SHA256

                                                                    0c5309e712ab405e1ea0e5b44ca653df714f5a6f1c009fd5e858d7f6966e1d5a

                                                                    SHA512

                                                                    11fc5b0c14037fe1e337358abe3936ff1d54cbbdcebb443db91caec1ec347cbe8c1254fa17892904979acb633ab067316c412fc225ca26e79018dbeb221f5a06

                                                                  • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.001\devconx86.exe

                                                                    Filesize

                                                                    54KB

                                                                    MD5

                                                                    c4b470269324517ee838789c7cf5e606

                                                                    SHA1

                                                                    7005597d55fb26c6260e0772f301c79f030e6d56

                                                                    SHA256

                                                                    5f9b898315ad8192e87e21a499fd87d31b886513bb39d368476174aaa89a2bf9

                                                                    SHA512

                                                                    dbadca544434a847238bf107e59aa84bf8df9df899d0c2da2ee62cc28e12d175a81d4e4e0f85d7c394323bf66fb4ac0f413c949700ecdec9a73ed5cf9340aebb

                                                                  • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.001\devid.info.setup.exe

                                                                    Filesize

                                                                    124KB

                                                                    MD5

                                                                    53b4d555c26e8ab79f37b1a080bd1021

                                                                    SHA1

                                                                    0ecb19d93247302667667537c80091c8b20b52a7

                                                                    SHA256

                                                                    7ffd04c501481418f40d0e060692380f454f58447ea05368a6377e8e0873fa88

                                                                    SHA512

                                                                    e388d4d4234fbfd73677c524f0e4123616bd21eb179103b68e6332d9948c202ff0f58f062464f96c401b35306a072533e48caa8c83868eb13fde3047318f9377

                                                                  • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.001\devid.info.url

                                                                    Filesize

                                                                    96B

                                                                    MD5

                                                                    995e05476319ea9d3e4788cd4be7c4d7

                                                                    SHA1

                                                                    728844ebbe6edbd7100fb4111fdd464e1b1588e2

                                                                    SHA256

                                                                    ed04a5d4f98937341704abf7d3f45525ad99cdadc75ad2d9758eb3b8a5cabc25

                                                                    SHA512

                                                                    891f01db8c0e4f8da4eb81fd3419c8caedaf593f9b96cf9cbbccfc11cf88d67b0888a0b70e9b0e93f29e60aa94debb32b9788227abef1fb4307e81a87ace39a9

                                                                  • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.001\netamd.inf

                                                                    Filesize

                                                                    25KB

                                                                    MD5

                                                                    69f5462fbb07514b12fbdaded96179a5

                                                                    SHA1

                                                                    a46a12c4925b1fb4950c8b2cbb8642c254817fff

                                                                    SHA256

                                                                    8a94fd96bc4a69686fa04576ee5c886368c5a1870ea6d8212332c96bc00267e3

                                                                    SHA512

                                                                    8b6f7398cabde07035d41973eb75b5a6be7e1c21c36ae2ff034f715e5b7699db93ff4a5bb4456b7a88f95c603d577caa112298cde41fcb5580e92b69a0b07d46

                                                                  • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.001\pcntpci5.sys

                                                                    Filesize

                                                                    35KB

                                                                    MD5

                                                                    ccf453c1d9ef8f5720d409df6e5d149e

                                                                    SHA1

                                                                    2c298fd46ebb8eee934b9d6d447feaea9f1e9f12

                                                                    SHA256

                                                                    03b9ee5ce4c4eaefcdb042555594cc2133344f173f0b30068a83563fee5b864e

                                                                    SHA512

                                                                    0f757f7350ae16e3dd8526095b2ea63c6bd5640d99afdc1311d34f62a4011de7768b7b6516da182a6b99c76e7fd706daf980376572f8ffc2e4fe0f907754c29b

                                                                  • C:\Users\Admin\AppData\Local\Temp\hh.exe

                                                                    Filesize

                                                                    831KB

                                                                    MD5

                                                                    fbd1bf7fbed25ea9ba00f02dfdd9df86

                                                                    SHA1

                                                                    0d0bdc9132c72ff3de86d32b4659b5a7bb4b613c

                                                                    SHA256

                                                                    171eb2b75643e66deb5cc6b1a7c6f9633e72fafd6012e7a17e1d97f9c2a513d0

                                                                    SHA512

                                                                    5577328bfe7bb521cf3c8e1a9872ef251a42e2c7d5f86fc9c4275edf7ec59295d8f354a1c7568cab588bd63719edd3de12a769fe0423a2a6173c246e780a3834

                                                                  • memory/264-773-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/264-795-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/280-820-0x0000000001E10000-0x0000000001E32000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/280-188-0x0000000000400000-0x00000000004DD000-memory.dmp

                                                                    Filesize

                                                                    884KB

                                                                  • memory/280-822-0x0000000000400000-0x00000000004DD000-memory.dmp

                                                                    Filesize

                                                                    884KB

                                                                  • memory/280-162-0x00000000036B0000-0x00000000036D2000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/280-570-0x00000000036B0000-0x00000000036D2000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/280-591-0x0000000000400000-0x00000000004DD000-memory.dmp

                                                                    Filesize

                                                                    884KB

                                                                  • memory/536-475-0x0000000000400000-0x00000000004DD000-memory.dmp

                                                                    Filesize

                                                                    884KB

                                                                  • memory/536-453-0x00000000035F0000-0x0000000003612000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/600-156-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/808-389-0x0000000000400000-0x00000000004DD000-memory.dmp

                                                                    Filesize

                                                                    884KB

                                                                  • memory/848-154-0x0000000000400000-0x00000000004DD000-memory.dmp

                                                                    Filesize

                                                                    884KB

                                                                  • memory/848-127-0x0000000003730000-0x0000000003752000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/908-704-0x0000000000400000-0x00000000004DD000-memory.dmp

                                                                    Filesize

                                                                    884KB

                                                                  • memory/928-735-0x0000000000400000-0x00000000004DD000-memory.dmp

                                                                    Filesize

                                                                    884KB

                                                                  • memory/928-713-0x0000000002170000-0x0000000002192000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/1224-538-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/1364-506-0x0000000000400000-0x00000000004DD000-memory.dmp

                                                                    Filesize

                                                                    884KB

                                                                  • memory/1364-484-0x00000000025A0000-0x00000000025C2000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/1444-767-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/1444-763-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/1460-821-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/1460-826-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/1460-45-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/1460-21-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/1472-268-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/1508-260-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/1624-223-0x0000000000400000-0x00000000004DD000-memory.dmp

                                                                    Filesize

                                                                    884KB

                                                                  • memory/1624-198-0x00000000033B0000-0x00000000033D2000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/1640-16-0x00000000031B0000-0x00000000031D2000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/1640-0-0x0000000000400000-0x000000000050A000-memory.dmp

                                                                    Filesize

                                                                    1.0MB

                                                                  • memory/1640-20-0x0000000000400000-0x000000000050A000-memory.dmp

                                                                    Filesize

                                                                    1.0MB

                                                                  • memory/1668-678-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/1680-622-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/1816-508-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/1816-485-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/1828-191-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/1984-329-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/2100-257-0x0000000000400000-0x00000000004DD000-memory.dmp

                                                                    Filesize

                                                                    884KB

                                                                  • memory/2100-233-0x00000000022B0000-0x00000000022D2000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/2160-416-0x0000000000400000-0x00000000004DD000-memory.dmp

                                                                    Filesize

                                                                    884KB

                                                                  • memory/2192-448-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/2216-714-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/2216-737-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/2264-359-0x0000000000400000-0x00000000004DD000-memory.dmp

                                                                    Filesize

                                                                    884KB

                                                                  • memory/2264-334-0x0000000002760000-0x0000000002782000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/2388-648-0x0000000000400000-0x00000000004DD000-memory.dmp

                                                                    Filesize

                                                                    884KB

                                                                  • memory/2388-627-0x00000000026B0000-0x00000000026D2000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/2404-479-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/2404-454-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/2428-122-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/2428-420-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/2428-395-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/2428-764-0x0000000000400000-0x00000000004DD000-memory.dmp

                                                                    Filesize

                                                                    884KB

                                                                  • memory/2428-95-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/2428-762-0x0000000003410000-0x0000000003432000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/2444-563-0x0000000000400000-0x00000000004DD000-memory.dmp

                                                                    Filesize

                                                                    884KB

                                                                  • memory/2556-446-0x0000000000400000-0x00000000004DD000-memory.dmp

                                                                    Filesize

                                                                    884KB

                                                                  • memory/2556-425-0x0000000003480000-0x00000000034A2000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/2568-46-0x0000000000400000-0x00000000004DD000-memory.dmp

                                                                    Filesize

                                                                    884KB

                                                                  • memory/2568-85-0x0000000000400000-0x00000000004DD000-memory.dmp

                                                                    Filesize

                                                                    884KB

                                                                  • memory/2568-52-0x0000000003370000-0x0000000003392000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/2608-708-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/2608-683-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/2620-267-0x0000000001FE0000-0x0000000002002000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/2620-292-0x0000000000400000-0x00000000004DD000-memory.dmp

                                                                    Filesize

                                                                    884KB

                                                                  • memory/2648-55-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/2648-88-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/2688-361-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/2688-337-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/2688-651-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/2720-676-0x0000000000400000-0x00000000004DD000-memory.dmp

                                                                    Filesize

                                                                    884KB

                                                                  • memory/2760-772-0x00000000020E0000-0x0000000002102000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/2760-565-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/2760-794-0x0000000000400000-0x00000000004DD000-memory.dmp

                                                                    Filesize

                                                                    884KB

                                                                  • memory/2796-226-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/2796-199-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/2948-595-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/2960-620-0x0000000000400000-0x00000000004DD000-memory.dmp

                                                                    Filesize

                                                                    884KB

                                                                  • memory/2960-513-0x00000000022F0000-0x0000000002312000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/2960-534-0x0000000000400000-0x00000000004DD000-memory.dmp

                                                                    Filesize

                                                                    884KB

                                                                  • memory/2964-121-0x0000000000400000-0x00000000004DD000-memory.dmp

                                                                    Filesize

                                                                    884KB

                                                                  • memory/2996-368-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/2996-390-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/3032-301-0x00000000037F0000-0x0000000003812000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/3032-326-0x0000000000400000-0x00000000004DD000-memory.dmp

                                                                    Filesize

                                                                    884KB

                                                                  • memory/3184-831-0x00000000037F0000-0x0000000003812000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/3184-852-0x0000000000400000-0x00000000004DD000-memory.dmp

                                                                    Filesize

                                                                    884KB