Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    29/10/2024, 23:14

General

  • Target

    https://cdn.discordapp.com/attachments/1300886873148756050/1300960864043663533/winws.exe?ex=6722bdb8&is=67216c38&hm=6421a3d612c9b6c41279c7a97310aba4b86dbc69dc16a3bc8027d28cde7073e8&

Malware Config

Extracted

Family

orcus

Botnet

Roblox

C2

89.23.100.155:1337

Mutex

52641f3c61234743ba12f855fdae3135

Attributes
  • autostart_method

    Registry

  • enable_keylogger

    true

  • install_path

    %AppData%\Windows\Helper\WinHelper32.exe

  • reconnect_delay

    10000

  • registry_keyname

    WinHelper32.exe

  • taskscheduler_taskname

    WinHelper32

  • watchdog_path

    AppData\WinHelperWatchdog.exe

Signatures

  • Contains code to disable Windows Defender 1 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Modifies WinLogon for persistence 2 TTPs 6 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 7 IoCs
  • Orcus

    Orcus is a Remote Access Trojan that is being sold on underground forums.

  • Orcus family
  • Orcus main payload 1 IoCs
  • Process spawned unexpected child process 18 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 6 IoCs
  • DCRat payload 1 IoCs
  • Orcurs Rat Executable 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 8 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file
  • Drops startup file 1 IoCs
  • Executes dropped EXE 14 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 12 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Hijack Execution Flow: Executable Installer File Permissions Weakness 1 TTPs 2 IoCs

    Possible Turn off User Account Control's privilege elevation for standard users.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Drops file in System32 directory 5 IoCs
  • Drops file in Program Files directory 9 IoCs
  • Drops file in Windows directory 2 IoCs
  • Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs

    When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 14 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 4 IoCs
  • NTFS ADS 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 17 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 14 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://cdn.discordapp.com/attachments/1300886873148756050/1300960864043663533/winws.exe?ex=6722bdb8&is=67216c38&hm=6421a3d612c9b6c41279c7a97310aba4b86dbc69dc16a3bc8027d28cde7073e8&
    1⤵
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2956
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x104,0x108,0x10c,0x100,0x110,0x7ff9a8e43cb8,0x7ff9a8e43cc8,0x7ff9a8e43cd8
      2⤵
        PID:2376
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1852,14198194376935239734,6307159841698945962,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1864 /prefetch:2
        2⤵
          PID:1356
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1852,14198194376935239734,6307159841698945962,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2404 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:3544
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1852,14198194376935239734,6307159841698945962,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2504 /prefetch:8
          2⤵
            PID:1940
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,14198194376935239734,6307159841698945962,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:1
            2⤵
              PID:4932
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,14198194376935239734,6307159841698945962,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:1
              2⤵
                PID:3716
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,14198194376935239734,6307159841698945962,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:1
                2⤵
                  PID:2112
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1852,14198194376935239734,6307159841698945962,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5620 /prefetch:8
                  2⤵
                    PID:1920
                  • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1852,14198194376935239734,6307159841698945962,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5912 /prefetch:8
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:4360
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,14198194376935239734,6307159841698945962,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4636 /prefetch:1
                    2⤵
                      PID:4888
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,14198194376935239734,6307159841698945962,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:1
                      2⤵
                        PID:4980
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,14198194376935239734,6307159841698945962,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:1
                        2⤵
                          PID:2136
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,14198194376935239734,6307159841698945962,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6036 /prefetch:1
                          2⤵
                            PID:2516
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1852,14198194376935239734,6307159841698945962,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3868 /prefetch:8
                            2⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:4140
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1852,14198194376935239734,6307159841698945962,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4644 /prefetch:8
                            2⤵
                            • Subvert Trust Controls: Mark-of-the-Web Bypass
                            • NTFS ADS
                            • Suspicious behavior: EnumeratesProcesses
                            PID:1560
                          • C:\Users\Admin\Downloads\winws.exe
                            "C:\Users\Admin\Downloads\winws.exe"
                            2⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of SetWindowsHookEx
                            PID:576
                            • C:\Program Files\Java\jre-1.8\bin\javaw.exe
                              "C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\Downloads\winws.exe"
                              3⤵
                              • Drops startup file
                              • Suspicious use of SetWindowsHookEx
                              PID:4340
                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:SystemDrive) -Force
                                4⤵
                                • Command and Scripting Interpreter: PowerShell
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1152
                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:SystemDrive) -Force
                                4⤵
                                • Command and Scripting Interpreter: PowerShell
                                PID:4872
                              • C:\Users\Admin\AppData\Roaming\WinSFXConnectDevicesPlatform\WinHelper32.exe
                                C:\Users\Admin\AppData\Roaming\WinSFXConnectDevicesPlatform\WinHelper32.exe
                                4⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                • Modifies registry class
                                • Suspicious use of SetWindowsHookEx
                                PID:3776
                                • C:\Windows\SysWOW64\WScript.exe
                                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Windows\Defender\yjJlDaeiCtZ3rPY3voT8EfypAtNWVOHqwTO.vbe"
                                  5⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:2964
                                  • C:\Windows\SysWOW64\cmd.exe
                                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Windows\Defender\zHxvwMPtXsd9EflNyF6bR38DTMh313hvK806W5p8W9mTT85g.bat" "
                                    6⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:2576
                                    • C:\Users\Admin\AppData\Roaming\Windows\Defender\RunShell.exe
                                      "C:\Users\Admin\AppData\Roaming\Windows/Defender/RunShell.exe"
                                      7⤵
                                      • Modifies WinLogon for persistence
                                      • Executes dropped EXE
                                      • Adds Run key to start application
                                      • Drops file in Program Files directory
                                      • Modifies registry class
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:848
                                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\1xwp4lxu\1xwp4lxu.cmdline"
                                        8⤵
                                        • Drops file in System32 directory
                                        PID:968
                                        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD7CD.tmp" "c:\Windows\System32\CSCAFE86041B48049A2AD46C45A28484B1D.TMP"
                                          9⤵
                                            PID:2888
                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Uninstall Information\StartMenuExperienceHost.exe'
                                          8⤵
                                          • Command and Scripting Interpreter: PowerShell
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:4976
                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\wscript.exe'
                                          8⤵
                                          • Command and Scripting Interpreter: PowerShell
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:3880
                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          "powershell" -Command Add-MpPreference -ExclusionPath 'C:\blockComAgentdll\msedge.exe'
                                          8⤵
                                          • Command and Scripting Interpreter: PowerShell
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:2460
                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default User\StartMenuExperienceHost.exe'
                                          8⤵
                                          • Command and Scripting Interpreter: PowerShell
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:3912
                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\RuntimeBroker.exe'
                                          8⤵
                                          • Command and Scripting Interpreter: PowerShell
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:104
                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Windows\Defender\RunShell.exe'
                                          8⤵
                                          • Command and Scripting Interpreter: PowerShell
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:1436
                                        • C:\Windows\System32\cmd.exe
                                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\RM3bvOfJXa.bat"
                                          8⤵
                                            PID:3172
                                            • C:\Windows\system32\chcp.com
                                              chcp 65001
                                              9⤵
                                                PID:1064
                                              • C:\Windows\system32\w32tm.exe
                                                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                9⤵
                                                  PID:4968
                                                • C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\RuntimeBroker.exe
                                                  "C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\RuntimeBroker.exe"
                                                  9⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:1832
                                        • C:\Users\Admin\AppData\Roaming\Windows\Defender\xdwd.exe
                                          "C:\Users\Admin\AppData\Roaming\Windows\Defender\xdwd.exe"
                                          5⤵
                                          • Modifies Windows Defender Real-time Protection settings
                                          • UAC bypass
                                          • Executes dropped EXE
                                          • Windows security modification
                                          • Checks whether UAC is enabled
                                          • Hijack Execution Flow: Executable Installer File Permissions Weakness
                                          • Drops file in System32 directory
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          • System policy modification
                                          PID:2164
                                          • C:\Windows\SysWOW64\WindowsInput.exe
                                            "C:\Windows\SysWOW64\WindowsInput.exe" --install
                                            6⤵
                                            • Executes dropped EXE
                                            • Drops file in System32 directory
                                            PID:4288
                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            "powershell" Get-MpPreference -verbose
                                            6⤵
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:4736
                                          • C:\Users\Admin\AppData\Roaming\Windows\Helper\WinHelper32.exe
                                            "C:\Users\Admin\AppData\Roaming\Windows\Helper\WinHelper32.exe"
                                            6⤵
                                            • Modifies Windows Defender Real-time Protection settings
                                            • UAC bypass
                                            • Executes dropped EXE
                                            • Windows security modification
                                            • Checks whether UAC is enabled
                                            • Hijack Execution Flow: Executable Installer File Permissions Weakness
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious use of AdjustPrivilegeToken
                                            • Suspicious use of SetWindowsHookEx
                                            • System policy modification
                                            PID:3972
                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              "powershell" Get-MpPreference -verbose
                                              7⤵
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:5016
                                            • C:\Users\Admin\AppData\Roaming\WinHelperWatchdog.exe
                                              "C:\Users\Admin\AppData\Roaming\WinHelperWatchdog.exe" /launchSelfAndExit "C:\Users\Admin\AppData\Roaming\Windows\Helper\WinHelper32.exe" 3972 /protectFile
                                              7⤵
                                              • Executes dropped EXE
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:1280
                                              • C:\Users\Admin\AppData\Roaming\WinHelperWatchdog.exe
                                                "C:\Users\Admin\AppData\Roaming\WinHelperWatchdog.exe" /watchProcess "C:\Users\Admin\AppData\Roaming\Windows\Helper\WinHelper32.exe" 3972 "/protectFile"
                                                8⤵
                                                • Executes dropped EXE
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:1736
                                        • C:\Users\Admin\AppData\Roaming\Windows\Defender\Boostrapper.exe
                                          "C:\Users\Admin\AppData\Roaming\Windows\Defender\Boostrapper.exe"
                                          5⤵
                                          • Executes dropped EXE
                                          • System Location Discovery: System Language Discovery
                                          • Modifies registry class
                                          • Suspicious use of SetWindowsHookEx
                                          PID:3412
                                          • C:\Windows\SysWOW64\WScript.exe
                                            "C:\Windows\System32\WScript.exe" "C:\blockComAgentdll\l2A594olLEJWUEUfw4GfnauDbYxQl.vbe"
                                            6⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:792
                                            • C:\Windows\SysWOW64\cmd.exe
                                              C:\Windows\system32\cmd.exe /c ""C:\blockComAgentdll\Q5HIcCBrM4kJ2gRS.bat" "
                                              7⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:5040
                                              • C:\blockComAgentdll\hypercommonSvc.exe
                                                "C:\blockComAgentdll/hypercommonSvc.exe"
                                                8⤵
                                                • Executes dropped EXE
                                                • Drops file in Program Files directory
                                                • Drops file in Windows directory
                                                • Modifies registry class
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:3584
                                                • C:\Windows\System32\cmd.exe
                                                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\kvAdD40QhI.bat"
                                                  9⤵
                                                    PID:3176
                                                    • C:\Windows\system32\chcp.com
                                                      chcp 65001
                                                      10⤵
                                                        PID:3364
                                                      • C:\Windows\system32\PING.EXE
                                                        ping -n 10 localhost
                                                        10⤵
                                                        • System Network Configuration Discovery: Internet Connection Discovery
                                                        • Runs ping.exe
                                                        PID:3776
                                                      • C:\Windows\Migration\WTR\msedge.exe
                                                        "C:\Windows\Migration\WTR\msedge.exe"
                                                        10⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:3568
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1852,14198194376935239734,6307159841698945962,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=3876 /prefetch:2
                                        2⤵
                                          PID:3408
                                      • C:\Windows\System32\CompPkgSrv.exe
                                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                                        1⤵
                                          PID:848
                                        • C:\Windows\System32\CompPkgSrv.exe
                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                          1⤵
                                            PID:2032
                                          • C:\Windows\SysWOW64\WindowsInput.exe
                                            "C:\Windows\SysWOW64\WindowsInput.exe"
                                            1⤵
                                            • Executes dropped EXE
                                            PID:1944
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 13 /tr "'C:\Program Files\Uninstall Information\StartMenuExperienceHost.exe'" /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:1576
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Program Files\Uninstall Information\StartMenuExperienceHost.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:1484
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 11 /tr "'C:\Program Files\Uninstall Information\StartMenuExperienceHost.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:4648
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "wscriptw" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\wscript.exe'" /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:1164
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "wscript" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\wscript.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:5112
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "wscriptw" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\wscript.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:4568
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "msedgem" /sc MINUTE /mo 9 /tr "'C:\blockComAgentdll\msedge.exe'" /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:576
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "msedge" /sc ONLOGON /tr "'C:\blockComAgentdll\msedge.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:4880
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "msedgem" /sc MINUTE /mo 6 /tr "'C:\blockComAgentdll\msedge.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:916
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 10 /tr "'C:\Users\Default User\StartMenuExperienceHost.exe'" /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2028
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Users\Default User\StartMenuExperienceHost.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2248
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 11 /tr "'C:\Users\Default User\StartMenuExperienceHost.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:4696
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\RuntimeBroker.exe'" /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2856
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\RuntimeBroker.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:4620
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\RuntimeBroker.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2344
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "RunShellR" /sc MINUTE /mo 8 /tr "'C:\Users\Admin\AppData\Roaming\Windows\Defender\RunShell.exe'" /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:4996
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "RunShell" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Roaming\Windows\Defender\RunShell.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:1560
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "RunShellR" /sc MINUTE /mo 6 /tr "'C:\Users\Admin\AppData\Roaming\Windows\Defender\RunShell.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2452
                                          • C:\Users\Admin\AppData\Roaming\Windows\Helper\WinHelper32.exe
                                            C:\Users\Admin\AppData\Roaming\Windows\Helper\WinHelper32.exe
                                            1⤵
                                            • Executes dropped EXE
                                            • System Location Discovery: System Language Discovery
                                            PID:2612

                                          Network

                                          MITRE ATT&CK Enterprise v15

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads

                                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                            Filesize

                                            2KB

                                            MD5

                                            627073ee3ca9676911bee35548eff2b8

                                            SHA1

                                            4c4b68c65e2cab9864b51167d710aa29ebdcff2e

                                            SHA256

                                            85b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c

                                            SHA512

                                            3c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb

                                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\WinHelperWatchdog.exe.log

                                            Filesize

                                            425B

                                            MD5

                                            bb27934be8860266d478c13f2d65f45e

                                            SHA1

                                            a69a0e171864dcac9ade1b04fc0313e6b4024ccb

                                            SHA256

                                            85ad0d9909461517acf2e24ff116ca350e9b7000b4eefb23aa3647423c9745b4

                                            SHA512

                                            87dd77feac509a25b30c76c119752cc25020cca9c53276c2082aef2a8c75670ef67e1e70024a63d44ae442b64f4bc464aee6691e80c525376bb7421929cfa3bb

                                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                            Filesize

                                            2KB

                                            MD5

                                            d0c46cad6c0778401e21910bd6b56b70

                                            SHA1

                                            7be418951ea96326aca445b8dfe449b2bfa0dca6

                                            SHA256

                                            9600b3fdf0565ccb49e21656aa4b24d7c18f776bfd04d9ee984b134707550f02

                                            SHA512

                                            057531b468f7fbbb2175a696a8aab274dec0d17d9f71df309edcff35e064f3378050066a3df47ccd03048fac461594ec75e3d4fe64f9dd79949d129f51e02949

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                            Filesize

                                            152B

                                            MD5

                                            003b92b33b2eb97e6c1a0929121829b8

                                            SHA1

                                            6f18e96c7a2e07fb5a80acb3c9916748fd48827a

                                            SHA256

                                            8001f251d5932a62bfe17b0ba3686ce255ecf9adb95a06ecb954faa096be3e54

                                            SHA512

                                            18005c6c07475e6dd1ec310fe511353381cf0f15d086cf20dc6ed8825c872944185c767f80306e56fec9380804933aa37a8f12c720398b4b3b42cb216b41cf77

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                            Filesize

                                            152B

                                            MD5

                                            051a939f60dced99602add88b5b71f58

                                            SHA1

                                            a71acd61be911ff6ff7e5a9e5965597c8c7c0765

                                            SHA256

                                            2cff121889a0a77f49cdc4564bdd1320cf588c9dcd36012dbc3669cf73015d10

                                            SHA512

                                            a9c72ed43b895089a9e036aba6da96213fedd2f05f0a69ae8d1fa07851ac8263e58af86c7103ce4b4f9cfe92f9c9d0a46085c066a54ce825ef53505fdb988d1f

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000001

                                            Filesize

                                            113KB

                                            MD5

                                            7cf417d06a24c1ade73ec6d8ae589077

                                            SHA1

                                            128516790f9c6d8ac1d33a9f1f2b854162d94942

                                            SHA256

                                            270723a06c0f917204923693f09cc0d6cd2cc9cefd59fc051cfbf920d26f17d8

                                            SHA512

                                            3f5615b04489cfc755e19efc30fe619026dfacd250bb1c1677e1c55ceb6f69a80d0f05760c157696985e1090c34e8e403b453e5680fb981f274bdd66e2fcb5bb

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                            Filesize

                                            186B

                                            MD5

                                            094ab275342c45551894b7940ae9ad0d

                                            SHA1

                                            2e7ce26fe2eb9be641ae929d0c9cc0dfa26c018e

                                            SHA256

                                            ef1739b833a1048ee1bd55dcbac5b1397396faca1ad771f4d6c2fe58899495a3

                                            SHA512

                                            19d0c688dc1121569247111e45de732b2ab86c71aecdde34b157cfd1b25c53473ed3ade49a97f8cb2ddc4711be78fa26c9330887094e031e9a71bb5c29080b0d

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                            Filesize

                                            5KB

                                            MD5

                                            a08811213468bf8442574c68f8f476ee

                                            SHA1

                                            b6a527b5ffbb9ab33690e726a5ae282245cc081c

                                            SHA256

                                            4893e1383257ebe58f906ffc149b62ebf43ce5f2985aa235efc33cdfca3b8d37

                                            SHA512

                                            210f7b6a0f5eb68a721ba7aac4bed96ac8e96f87afd0fc8374eb2b07d32ec1edabca6269eff10313d6bb1daef760069fceda0376f0688660af18b336665fdfce

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                            Filesize

                                            5KB

                                            MD5

                                            cd8bab9c5db3c7b0ca042e99f1139568

                                            SHA1

                                            f0e4e14ca609c13551c0485f127cb26fbf1db850

                                            SHA256

                                            7e55294dcf96ef55d2d2cedd0d8d677236648909e8f8bb2d634411dff09bdd91

                                            SHA512

                                            6af832db9121eae600b574e3ff75f933489146317d6052162a22b853752a02c9d5897f1a3d64cb304d7919afde50630c51400c967ed5f2b833f1dac130275f66

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                            Filesize

                                            5KB

                                            MD5

                                            c7c787bc0c72f81301190c899c80512a

                                            SHA1

                                            79c336ecf8a6d771a58530aca7fc14398c57b53c

                                            SHA256

                                            5b0bff9db9168045f9d7f1ac6380dfd009340d15a1298a24d3410c9fc38f76b6

                                            SHA512

                                            c5dd43fb3a2d818852222848ee3e3ca9ebcf4a090d80a0ecffd1c345f30e4b71ee84b10a72e1950db5adcbef3244cbb2c7bcb8ededb0dd2f5ce431daecb7213e

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                            Filesize

                                            16B

                                            MD5

                                            46295cac801e5d4857d09837238a6394

                                            SHA1

                                            44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                            SHA256

                                            0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                            SHA512

                                            8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                            Filesize

                                            16B

                                            MD5

                                            206702161f94c5cd39fadd03f4014d98

                                            SHA1

                                            bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                            SHA256

                                            1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                            SHA512

                                            0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                            Filesize

                                            11KB

                                            MD5

                                            ad6f09e540aa9cfd5cdf9fc28f5f3c9f

                                            SHA1

                                            6c5f1f779d817b238e9793afa3c247faeaa40697

                                            SHA256

                                            51fb2e0bafc435dbc45931edf9e99272761caefb9f30e521a2585b6904391580

                                            SHA512

                                            811c932d9ee8baae022e71e337c89548b0de8e3f45efe520beb530c7de49ec3457d35bd5e1c0d0ade29998400806db95e258baa1ba7671c4e22bfb0a4551de40

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                            Filesize

                                            11KB

                                            MD5

                                            8e0a2e74bf16886f7fa795ebb66acb96

                                            SHA1

                                            02e69d0d44aced7f8c5ca820fee1575440b834b4

                                            SHA256

                                            e48b6ce2f747a45398bc5ceb22d3e9dc8147bd286273da2ab755ccce26a65fc0

                                            SHA512

                                            572ef9fdd5bf53997c5176e68391462b241f499d08463e502c17e28dbe434ca83d667005f17bebfb12cae6cce588f525ae987142af806c2db1ad0c76109ab076

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                            Filesize

                                            8KB

                                            MD5

                                            375490311ca68f4e6f4d636781903788

                                            SHA1

                                            71973f109e84ce952339509decf3bc58091c3e06

                                            SHA256

                                            10af59c7c9dfc37b9bf68a1b4f1a34272f8af0f45c41c4b9f192c8afc71b9bc3

                                            SHA512

                                            07c7f521e855f2515b407b674d8508a450bd236e120f1544dcdc63b4b7e2c4e1ac5b26e5150b1c8d8249cc79266fc7eca4089b50f7dfe84db8f1c11df7e13746

                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                            Filesize

                                            944B

                                            MD5

                                            e3840d9bcedfe7017e49ee5d05bd1c46

                                            SHA1

                                            272620fb2605bd196df471d62db4b2d280a363c6

                                            SHA256

                                            3ac83e70415b9701ee71a4560232d7998e00c3db020fde669eb01b8821d2746f

                                            SHA512

                                            76adc88ab3930acc6b8b7668e2de797b8c00edcfc41660ee4485259c72a8adf162db62c2621ead5a9950f12bfe8a76ccab79d02fda11860afb0e217812cac376

                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                            Filesize

                                            18KB

                                            MD5

                                            7033c289c90d0f9ed16ac4ed6652c972

                                            SHA1

                                            eea04bee9b322003832b9514d6b291ed1b75abe1

                                            SHA256

                                            fa2ef70e69d8d10d2addd0df92a86509855d33f6d5f2cc5319aae2b9a4a9b5e5

                                            SHA512

                                            bc3d81aeab954a01f30bbe151d15cfd8d568e00abd9014f88a8913a3ecd3bbb2a5fe9ad136bb779e029ff35acc80cad428e68293c34e4d5908e5046d5a5564fe

                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                            Filesize

                                            944B

                                            MD5

                                            6344564097353c8e7e68991fffa80d88

                                            SHA1

                                            2ac4d108a30ec3fbd2938b0563eb912415ea7c62

                                            SHA256

                                            d0af6d69f8bc0c98e9fb61dead6327bbc8b4f5292529313515382d8f883de0da

                                            SHA512

                                            e2b37a9001a91cb05483d72f88bd70a61ca5655939c2290fd1580710eec9d8d26a5fedbcb5223f5413b5dcc46f1d8b6b408e57be0e4ad4b37b55cbce9023a303

                                          • C:\Users\Admin\AppData\Local\Temp\RESD7CD.tmp

                                            Filesize

                                            1KB

                                            MD5

                                            33af950a420084e5735a89bfc66608ea

                                            SHA1

                                            7051ccb9e33949c19ec62027146dfa5024cd546e

                                            SHA256

                                            9b31ba5fa8422dc2461a1c9525883d81a92da3a0abc4d16ac17287eba0707024

                                            SHA512

                                            ca4a7658aace5a33b7dc67c8962d78b87f72481ca8a9413670abcd83d2cf261811a4074af792fba9afcf51821759e2156f05272d1ac43a9dbf599ef1f3991752

                                          • C:\Users\Admin\AppData\Local\Temp\RM3bvOfJXa.bat

                                            Filesize

                                            257B

                                            MD5

                                            7897162a852cb1b3dd7faffe284ebde3

                                            SHA1

                                            103ba53f9271a246e7fafba303354593066cd767

                                            SHA256

                                            6bb6ecbca17efb83ee94a839e5883e286886023a8e10aaff8005f611ff369076

                                            SHA512

                                            fea40032dd637efef6269cf7292adb2178e3905000f17407ae05081a871c43349c1667dc9e14c9dc68c8eaea7d0272551654a1f303c8509d99d081854365d07e

                                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_krw3txum.e13.ps1

                                            Filesize

                                            60B

                                            MD5

                                            d17fe0a3f47be24a6453e9ef58c94641

                                            SHA1

                                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                            SHA256

                                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                            SHA512

                                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                          • C:\Users\Admin\AppData\Local\Temp\kvAdD40QhI.bat

                                            Filesize

                                            163B

                                            MD5

                                            5c50d98736b363a6cbae193a93b31f78

                                            SHA1

                                            2645e2dcf1605b5b76abfe9dda6d0fc8df362bbf

                                            SHA256

                                            bdf69702883a50b209edb42d8663bfd81b79c39e61c6c230f1e389184ae9cda1

                                            SHA512

                                            cb21cfde10e35cf39a04a4dbccedb7cf54d8fa04b276ba7f7cc0ea0412af0d3bb603288deea71ebfc1786c28b5e62b551aeb14589ae9c9ee1e13904f441cf072

                                          • C:\Users\Admin\AppData\Roaming\WinHelperWatchdog.exe

                                            Filesize

                                            9KB

                                            MD5

                                            7a195b6c9de2d5cab015f649da6931a1

                                            SHA1

                                            89f7372dd92a90a8e13b74ee512b464412e4cf9b

                                            SHA256

                                            30183935449a625c2a61f6342dc3b9907028194173f2e3d594eaa3126ee316bc

                                            SHA512

                                            3c2aeef85b51e7f955072fba042bcedf8dd0b66ad813def58c0134355665ba56a713d58005a322561c62be5777d0adea2803da214459f362f22fe2a0dba5a1c7

                                          • C:\Users\Admin\AppData\Roaming\WinSFXConnectDevicesPlatform\WinHelper32.exe

                                            Filesize

                                            4.9MB

                                            MD5

                                            72982e4d77aaee2ef6d16876037b3dbe

                                            SHA1

                                            bfffbe69bfc0cb1fb5e23199dba5ea69c4f3d9df

                                            SHA256

                                            bbe1c2a2af47b4e32fa9b6e8a44da455473604bd1aae5481524403f878a86662

                                            SHA512

                                            cb28f33f6c3acaa74ddb3e9f50922e764926fbf2b8a3d7317f13b57f6f30e259a5a8b0213c77dee27cf542ad860762909c1f46f695f2b2c45bb778de957f02db

                                          • C:\Users\Admin\AppData\Roaming\Windows\Defender\Boostrapper.exe

                                            Filesize

                                            2.2MB

                                            MD5

                                            f21f63c5ac1e7afc50125b10c75e30af

                                            SHA1

                                            09be95306a2e9f48934b6f3ec4e789eefaaefc94

                                            SHA256

                                            a4bf1fbf3c41613a6ca44ec770bca60ed1a23206bd01a2296513c302ff63e046

                                            SHA512

                                            681ba321321fe8c856a1d6d3de10f23e4f313d943e0e83abfa4ab575cc8932b8be28024eaec282f21dabafa4848b9305d4a15bbd3db7591bccf46d1ee369d58c

                                          • C:\Users\Admin\AppData\Roaming\Windows\Defender\RunShell.exe

                                            Filesize

                                            427KB

                                            MD5

                                            8d860de39a47014bb85432844205defc

                                            SHA1

                                            16b6485662cc4b57af26f1ee2fe5e5595156264d

                                            SHA256

                                            6f64566b9adc350458221bc7312acaa09290c58241659336b9921c3dcf27fbbb

                                            SHA512

                                            c76408b4390d9aeae243f7333c5acdc68b6fe08efd1694c774069627d09e91e97ab1a5ccf55b60a247f3b00e8b95166d3dfcc41ac92150f00dfb897480a5a539

                                          • C:\Users\Admin\AppData\Roaming\Windows\Defender\xdwd.exe

                                            Filesize

                                            3.0MB

                                            MD5

                                            c33b516c2f5105562cc621929d2f3a5a

                                            SHA1

                                            ac89044573fc5b586b43c1bf784c3bcc50a46c1f

                                            SHA256

                                            42fcea19c41fd2e09ce01b6f0f48027f7f58aac75f93b7aeae8d24af7eb23f3c

                                            SHA512

                                            eace4742d8f75a2093cfeab3cd20f8ddb23514f6d5a598b16927621afc6e2bc4dff58d775e0c2c261f7c1ffc20a4b7d1004fe1ef8c7f904d8ef1cd94636caec6

                                          • C:\Users\Admin\AppData\Roaming\Windows\Defender\yjJlDaeiCtZ3rPY3voT8EfypAtNWVOHqwTO.vbe

                                            Filesize

                                            249B

                                            MD5

                                            5299f191d092a082374029620d0184cd

                                            SHA1

                                            154c0f2d892c0dde9914e1d2e114995ab5f1a8cb

                                            SHA256

                                            9c46745f3776d8f344029103da41e060516a4bf324e7238b112a3069abececf9

                                            SHA512

                                            670159a1352e91ad4739903c7d5bbca2b91e81ab542ac6b4532db8701d5bf01b900909812164db6ce4dbdc2fc1af59593d9abc84daff835de07eb7d383869e39

                                          • C:\Users\Admin\AppData\Roaming\Windows\Defender\zHxvwMPtXsd9EflNyF6bR38DTMh313hvK806W5p8W9mTT85g.bat

                                            Filesize

                                            104B

                                            MD5

                                            b33c8997ecd39b1b7e8af929abd526c7

                                            SHA1

                                            e30e21ca9e74d508cfc35e9affd57a7fbc089a77

                                            SHA256

                                            71340cb564242cd1454892eaa33aae6eaf8e444d9301731753a9aa993bb9785c

                                            SHA512

                                            394a9df69628162228d6a8934d6df532d5055a65a41788ef7d2b8170fae3bd586d80c8592ebc10e32650b81d43efd2eefdef865523d687b6def20fe4374afefc

                                          • C:\Users\Admin\Downloads\winws.exe:Zone.Identifier

                                            Filesize

                                            217B

                                            MD5

                                            5671dedf50bf0cf8dc9308d28901a49d

                                            SHA1

                                            6dfab43ab6d386da67e0b009b31d3a82beec03dd

                                            SHA256

                                            77b50da9d2e4bf111aeb478fbdf84367df25c405cc78047f0a5a52e263eecfef

                                            SHA512

                                            7e79ffcd8f0e9d4493230b7863c1e9f1f0012deab5e41ac4d0d7c2a8fde2256ca553819914ac6464bca8d3fd47fbeb016f6e73f849820dce8320401d1d326c37

                                          • C:\Windows\SysWOW64\WindowsInput.exe

                                            Filesize

                                            21KB

                                            MD5

                                            f6285edd247fa58161be33f8cf662d31

                                            SHA1

                                            e2b49bca43cd0bd6cc1eee582ba58f0ed6de1470

                                            SHA256

                                            bc16993d1a774793044ca37eb2ce84ecbdb5c578e3c710ed82879e07dcef2fec

                                            SHA512

                                            6f3e6073a1dafc679da1caa4a4c9cb7cc2da79c3f81034d7b7b7b1d855fd5421cbb517a7d3f9520f49d4d3b7f9577f4f8f92486994c8b78fabff5033b390a788

                                          • C:\Windows\SysWOW64\WindowsInput.exe.config

                                            Filesize

                                            349B

                                            MD5

                                            89817519e9e0b4e703f07e8c55247861

                                            SHA1

                                            4636de1f6c997a25c3190f73f46a3fd056238d78

                                            SHA256

                                            f40dfaa50dcbff93611d45607009158f798e9cd845170939b1d6088a7d10ee13

                                            SHA512

                                            b017cb7a522b9c6794f3691cb7266ec82f565a90d7d07cc9beb53b939d2e9bf34275bc25f6f32d9a9c7136a0aab2189d9556af7244450c610d11ed7a4f584ba3

                                          • C:\blockComAgentdll\Q5HIcCBrM4kJ2gRS.bat

                                            Filesize

                                            98B

                                            MD5

                                            1316b7f40530ee0c903a091d248c63dd

                                            SHA1

                                            6e9322f825d3d18a712458d98430a54b17c9f904

                                            SHA256

                                            43c1d785f81931b200e0be0a9fc40a736f26f397fda6571e26f52c21acf1065f

                                            SHA512

                                            1c9a435ca6d25466b715d2d4505dc33d42ab33fe192e89820929ee01b1962a2128c0ce9281ae96d27a9c18a4d035e55d912f673e17c6e7936d96160fea253345

                                          • C:\blockComAgentdll\hypercommonSvc.exe

                                            Filesize

                                            1.9MB

                                            MD5

                                            c9cda0ef2f246e5a640c25ff468a87a4

                                            SHA1

                                            44c7046f6251c49905cc569d1836361d0ae7856a

                                            SHA256

                                            cc66b2f2a0bcd9104078ed351c6b313a488f6b895c5fef9743b227c0397c4d6f

                                            SHA512

                                            2731df92281b29a4421b5071891676a4048bb39378956674c99dddea5b27f7684c71b7e3808942fd758c3c60e3eae93da535de95d702a3ae6f8829aae598ff21

                                          • C:\blockComAgentdll\l2A594olLEJWUEUfw4GfnauDbYxQl.vbe

                                            Filesize

                                            211B

                                            MD5

                                            386552a2a95b01f9b62bbf076f55204a

                                            SHA1

                                            4b202d016dc86a72837fdcb080caea7b8761842c

                                            SHA256

                                            be3ca473daa12562ac27843de069cca900d4413f08703b0cefee87303b8ec414

                                            SHA512

                                            dbba55a57db75cb351606a7dbc89cd0cf37dd333fa7456f94c6c2f9fd0480af28a27c29ca411cc5745c9929a92222123f770a870b046a84b25b23f4417ec62c4

                                          • \??\c:\Users\Admin\AppData\Local\Temp\1xwp4lxu\1xwp4lxu.0.cs

                                            Filesize

                                            398B

                                            MD5

                                            fbc061fa90933f317ded3325b86dc67d

                                            SHA1

                                            b3a34a7182fefb7bfd9ee956ed2fd0b6a3a2c626

                                            SHA256

                                            8f54081ae7a3612b30cf97ab03cfc9184721e460746cb3e8f8f730ebbeab7766

                                            SHA512

                                            f3dad7784e4e0ff1b5640916d4f009835752d91dab97097b65cc31d73c44203c6b84e55b98980754ba9c13c12a50abfc6dbd429a3b9ec48f091b67dcd31bdb0b

                                          • \??\c:\Users\Admin\AppData\Local\Temp\1xwp4lxu\1xwp4lxu.cmdline

                                            Filesize

                                            235B

                                            MD5

                                            1c8b8cb854d0026c9003e1b346d170de

                                            SHA1

                                            36d0061ccd2bbafc9ac6b91771b0ae42166fecbf

                                            SHA256

                                            d8fe785b022932ba53ec585fe6acfc0125a6b607d6cc6873ac2024884c9bc90d

                                            SHA512

                                            d9da789858a7b518f4f4f0ae7e84ff3eb6f9de323cf138121c18cc16d1940025a4f2afab974f71416a8cbbccea937b5063a52b155480b0f0cbf62d9ada7ad322

                                          • \??\c:\Windows\System32\CSCAFE86041B48049A2AD46C45A28484B1D.TMP

                                            Filesize

                                            1KB

                                            MD5

                                            7900d176b9cdbbde19613359be2ccd9b

                                            SHA1

                                            79136520641dd7be900091daec74b15c9537d71f

                                            SHA256

                                            bfd9f0d5dc52c3e289afe9ea4e675e1d9d7f24a9f5fca6fcf25005cf4ec76832

                                            SHA512

                                            dc41823539b0d0c0bc287aea339afc8f21e9d7e69eb7015d07176e4ff9af08d54c595758a94340ccd06761e870648848e3501d1995f12792998d94b5970e9cf8

                                          • memory/576-253-0x0000000000400000-0x000000000041E000-memory.dmp

                                            Filesize

                                            120KB

                                          • memory/848-352-0x000000001B6E0000-0x000000001B730000-memory.dmp

                                            Filesize

                                            320KB

                                          • memory/848-354-0x000000001B690000-0x000000001B6A8000-memory.dmp

                                            Filesize

                                            96KB

                                          • memory/848-356-0x0000000002760000-0x000000000276E000-memory.dmp

                                            Filesize

                                            56KB

                                          • memory/848-351-0x00000000027C0000-0x00000000027DC000-memory.dmp

                                            Filesize

                                            112KB

                                          • memory/848-349-0x0000000002750000-0x000000000275E000-memory.dmp

                                            Filesize

                                            56KB

                                          • memory/848-347-0x000000001B1C0000-0x000000001B292000-memory.dmp

                                            Filesize

                                            840KB

                                          • memory/848-346-0x0000000000670000-0x0000000000678000-memory.dmp

                                            Filesize

                                            32KB

                                          • memory/848-358-0x0000000002780000-0x000000000278C000-memory.dmp

                                            Filesize

                                            48KB

                                          • memory/1152-163-0x00000253E9B30000-0x00000253E9B52000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/1280-601-0x0000000000200000-0x0000000000208000-memory.dmp

                                            Filesize

                                            32KB

                                          • memory/1944-293-0x000000001AB50000-0x000000001AC5A000-memory.dmp

                                            Filesize

                                            1.0MB

                                          • memory/2164-329-0x0000000009800000-0x000000000980E000-memory.dmp

                                            Filesize

                                            56KB

                                          • memory/2164-266-0x0000000005420000-0x00000000054B2000-memory.dmp

                                            Filesize

                                            584KB

                                          • memory/2164-316-0x0000000008090000-0x00000000080DC000-memory.dmp

                                            Filesize

                                            304KB

                                          • memory/2164-325-0x00000000093E0000-0x00000000093FE000-memory.dmp

                                            Filesize

                                            120KB

                                          • memory/2164-326-0x0000000009400000-0x00000000094A4000-memory.dmp

                                            Filesize

                                            656KB

                                          • memory/2164-327-0x0000000009670000-0x000000000967A000-memory.dmp

                                            Filesize

                                            40KB

                                          • memory/2164-328-0x00000000097D0000-0x00000000097E1000-memory.dmp

                                            Filesize

                                            68KB

                                          • memory/2164-314-0x0000000007270000-0x00000000072D6000-memory.dmp

                                            Filesize

                                            408KB

                                          • memory/2164-330-0x0000000009810000-0x0000000009825000-memory.dmp

                                            Filesize

                                            84KB

                                          • memory/2164-331-0x0000000009860000-0x000000000987A000-memory.dmp

                                            Filesize

                                            104KB

                                          • memory/2164-332-0x0000000009890000-0x0000000009898000-memory.dmp

                                            Filesize

                                            32KB

                                          • memory/2164-313-0x0000000007B30000-0x0000000007E87000-memory.dmp

                                            Filesize

                                            3.3MB

                                          • memory/2164-312-0x0000000006E30000-0x0000000006E7A000-memory.dmp

                                            Filesize

                                            296KB

                                          • memory/2164-311-0x0000000006640000-0x000000000665E000-memory.dmp

                                            Filesize

                                            120KB

                                          • memory/2164-310-0x0000000006720000-0x0000000006786000-memory.dmp

                                            Filesize

                                            408KB

                                          • memory/2164-309-0x0000000006680000-0x0000000006716000-memory.dmp

                                            Filesize

                                            600KB

                                          • memory/2164-308-0x00000000074B0000-0x0000000007B2A000-memory.dmp

                                            Filesize

                                            6.5MB

                                          • memory/2164-307-0x00000000065A0000-0x00000000065D6000-memory.dmp

                                            Filesize

                                            216KB

                                          • memory/2164-306-0x0000000006540000-0x000000000655A000-memory.dmp

                                            Filesize

                                            104KB

                                          • memory/2164-297-0x0000000006800000-0x0000000006E2A000-memory.dmp

                                            Filesize

                                            6.2MB

                                          • memory/2164-260-0x00000000003F0000-0x00000000006F2000-memory.dmp

                                            Filesize

                                            3.0MB

                                          • memory/2164-263-0x0000000002AD0000-0x0000000002ADE000-memory.dmp

                                            Filesize

                                            56KB

                                          • memory/2164-264-0x0000000005240000-0x000000000529C000-memory.dmp

                                            Filesize

                                            368KB

                                          • memory/2164-265-0x0000000005930000-0x0000000005ED6000-memory.dmp

                                            Filesize

                                            5.6MB

                                          • memory/2164-315-0x0000000007310000-0x0000000007332000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/2164-267-0x0000000005410000-0x0000000005422000-memory.dmp

                                            Filesize

                                            72KB

                                          • memory/2164-272-0x0000000005F10000-0x0000000005F32000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/2164-271-0x0000000005900000-0x0000000005908000-memory.dmp

                                            Filesize

                                            32KB

                                          • memory/2164-270-0x00000000058F0000-0x00000000058FA000-memory.dmp

                                            Filesize

                                            40KB

                                          • memory/2164-268-0x00000000058D0000-0x00000000058D8000-memory.dmp

                                            Filesize

                                            32KB

                                          • memory/2164-269-0x00000000058E0000-0x00000000058E8000-memory.dmp

                                            Filesize

                                            32KB

                                          • memory/3584-524-0x0000000000B00000-0x0000000000CF0000-memory.dmp

                                            Filesize

                                            1.9MB

                                          • memory/3584-543-0x0000000002E60000-0x0000000002E68000-memory.dmp

                                            Filesize

                                            32KB

                                          • memory/3584-541-0x0000000002E50000-0x0000000002E5C000-memory.dmp

                                            Filesize

                                            48KB

                                          • memory/3584-539-0x0000000001590000-0x000000000159E000-memory.dmp

                                            Filesize

                                            56KB

                                          • memory/3972-563-0x0000000008F50000-0x0000000008F8C000-memory.dmp

                                            Filesize

                                            240KB

                                          • memory/3972-520-0x000000000A130000-0x000000000A145000-memory.dmp

                                            Filesize

                                            84KB

                                          • memory/3972-494-0x0000000006310000-0x000000000635E000-memory.dmp

                                            Filesize

                                            312KB

                                          • memory/3972-496-0x0000000006520000-0x0000000006538000-memory.dmp

                                            Filesize

                                            96KB

                                          • memory/3972-498-0x00000000066E0000-0x00000000066F0000-memory.dmp

                                            Filesize

                                            64KB

                                          • memory/3972-497-0x00000000068D0000-0x0000000006A92000-memory.dmp

                                            Filesize

                                            1.8MB

                                          • memory/3972-507-0x0000000008540000-0x0000000008897000-memory.dmp

                                            Filesize

                                            3.3MB

                                          • memory/3972-508-0x0000000008B40000-0x0000000008B8C000-memory.dmp

                                            Filesize

                                            304KB

                                          • memory/3972-517-0x0000000009CF0000-0x0000000009D94000-memory.dmp

                                            Filesize

                                            656KB

                                          • memory/3972-518-0x0000000009E10000-0x0000000009E21000-memory.dmp

                                            Filesize

                                            68KB

                                          • memory/3972-583-0x00000000065F0000-0x00000000065FA000-memory.dmp

                                            Filesize

                                            40KB

                                          • memory/3972-574-0x00000000090B0000-0x00000000091BA000-memory.dmp

                                            Filesize

                                            1.0MB

                                          • memory/3972-561-0x0000000008EF0000-0x0000000008F02000-memory.dmp

                                            Filesize

                                            72KB

                                          • memory/3972-559-0x000000000A130000-0x000000000A748000-memory.dmp

                                            Filesize

                                            6.1MB

                                          • memory/3972-491-0x00000000056C0000-0x00000000056D2000-memory.dmp

                                            Filesize

                                            72KB

                                          • memory/4288-286-0x0000000000BC0000-0x0000000000BCC000-memory.dmp

                                            Filesize

                                            48KB

                                          • memory/4288-288-0x0000000002D50000-0x0000000002D8C000-memory.dmp

                                            Filesize

                                            240KB

                                          • memory/4288-287-0x0000000001510000-0x0000000001522000-memory.dmp

                                            Filesize

                                            72KB

                                          • memory/4340-252-0x0000016869420000-0x0000016869421000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/4340-206-0x0000016869420000-0x0000016869421000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/4340-171-0x0000016869420000-0x0000016869421000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/4340-208-0x0000016869420000-0x0000016869421000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/4340-212-0x0000016869420000-0x0000016869421000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/4736-370-0x0000000006DE0000-0x0000000006E14000-memory.dmp

                                            Filesize

                                            208KB

                                          • memory/4736-393-0x0000000007390000-0x00000000073A5000-memory.dmp

                                            Filesize

                                            84KB

                                          • memory/4736-383-0x0000000007350000-0x0000000007361000-memory.dmp

                                            Filesize

                                            68KB

                                          • memory/4736-371-0x0000000073660000-0x00000000736AC000-memory.dmp

                                            Filesize

                                            304KB

                                          • memory/5016-573-0x0000000007010000-0x00000000070B4000-memory.dmp

                                            Filesize

                                            656KB

                                          • memory/5016-576-0x0000000007350000-0x0000000007361000-memory.dmp

                                            Filesize

                                            68KB

                                          • memory/5016-577-0x0000000007390000-0x00000000073A5000-memory.dmp

                                            Filesize

                                            84KB

                                          • memory/5016-564-0x0000000074CC0000-0x0000000074D0C000-memory.dmp

                                            Filesize

                                            304KB