Analysis

  • max time kernel
    95s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    26-01-2025 13:33

General

  • Target

    af4b66ff9b1f5830080860380efa81e4.exe

  • Size

    7.0MB

  • MD5

    af4b66ff9b1f5830080860380efa81e4

  • SHA1

    53cc9bb12117af3f77354733abc4ef48ad339932

  • SHA256

    429a6c2aa2f62fe5b656de97dd25152cd8e653d92a8dd5e75d067308b784bfaf

  • SHA512

    8796e8f5cd290dc5cbf009a886796b61d7137630c89067450d863596cd9296eed846ffd5cd53e6750a5c52ba2741f95e3d8169c010ec307371c304a056acf431

  • SSDEEP

    196608:M3NyJWZ3HC5ObjKh7+mSGZ5gPZaQC4b5DV2h:MdOWZyCUpt8b9Vy

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Modifies WinLogon for persistence 2 TTPs 6 IoCs
  • Process spawned unexpected child process 18 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 13 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 23 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Stops running service(s) 4 TTPs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 5 IoCs
  • Indicator Removal: Clear Windows Event Logs 1 TTPs 1 IoCs

    Clear Windows Event Logs to hide the activity of an intrusion.

  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 12 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Power Settings 1 TTPs 10 IoCs

    powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

  • Drops file in System32 directory 32 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Program Files directory 6 IoCs
  • Drops file in Windows directory 1 IoCs
  • Launches sc.exe 10 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies data under HKEY_USERS 6 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 20 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:432
    • C:\Windows\system32\services.exe
      C:\Windows\system32\services.exe
      1⤵
        PID:476
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k DcomLaunch
          2⤵
            PID:608
            • C:\Windows\system32\DllHost.exe
              C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
              3⤵
                PID:1200
              • C:\Windows\system32\wbem\wmiprvse.exe
                C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                3⤵
                • Checks BIOS information in registry
                • Checks processor information in registry
                • Enumerates system info in registry
                PID:2992
                • C:\Windows\system32\schtasks.exe
                  schtasks.exe /create /tn "smsss" /sc MINUTE /mo 7 /tr "'C:\Program Files\Uninstall Information\smss.exe'" /f
                  4⤵
                  • Process spawned unexpected child process
                  • Scheduled Task/Job: Scheduled Task
                  PID:2464
                • C:\Windows\system32\schtasks.exe
                  schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files\Uninstall Information\smss.exe'" /rl HIGHEST /f
                  4⤵
                  • Process spawned unexpected child process
                  • Scheduled Task/Job: Scheduled Task
                  PID:2764
                • C:\Windows\system32\schtasks.exe
                  schtasks.exe /create /tn "smsss" /sc MINUTE /mo 7 /tr "'C:\Program Files\Uninstall Information\smss.exe'" /rl HIGHEST /f
                  4⤵
                  • Process spawned unexpected child process
                  • Scheduled Task/Job: Scheduled Task
                  PID:2008
                • C:\Windows\system32\schtasks.exe
                  schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 9 /tr "'C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\spoolsv.exe'" /f
                  4⤵
                  • Process spawned unexpected child process
                  • Scheduled Task/Job: Scheduled Task
                  PID:1416
                • C:\Windows\system32\schtasks.exe
                  schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\spoolsv.exe'" /rl HIGHEST /f
                  4⤵
                  • Process spawned unexpected child process
                  • Scheduled Task/Job: Scheduled Task
                  PID:1880
                • C:\Windows\system32\schtasks.exe
                  schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 13 /tr "'C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\spoolsv.exe'" /rl HIGHEST /f
                  4⤵
                  • Process spawned unexpected child process
                  • Scheduled Task/Job: Scheduled Task
                  PID:2880
                • C:\Windows\system32\schtasks.exe
                  schtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 12 /tr "'C:\fontwin\OSPPSVC.exe'" /f
                  4⤵
                  • Process spawned unexpected child process
                  • Scheduled Task/Job: Scheduled Task
                  PID:960
                • C:\Windows\system32\schtasks.exe
                  schtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\fontwin\OSPPSVC.exe'" /rl HIGHEST /f
                  4⤵
                  • Process spawned unexpected child process
                  • Scheduled Task/Job: Scheduled Task
                  PID:2516
                • C:\Windows\system32\schtasks.exe
                  schtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 10 /tr "'C:\fontwin\OSPPSVC.exe'" /rl HIGHEST /f
                  4⤵
                  • Process spawned unexpected child process
                  • Scheduled Task/Job: Scheduled Task
                  PID:1924
                • C:\Windows\system32\schtasks.exe
                  schtasks.exe /create /tn "cmdc" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows Defender\en-US\cmd.exe'" /f
                  4⤵
                  • Process spawned unexpected child process
                  • Scheduled Task/Job: Scheduled Task
                  PID:2676
                • C:\Windows\system32\schtasks.exe
                  schtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Defender\en-US\cmd.exe'" /rl HIGHEST /f
                  4⤵
                  • Process spawned unexpected child process
                  • Scheduled Task/Job: Scheduled Task
                  PID:2740
                • C:\Windows\system32\schtasks.exe
                  schtasks.exe /create /tn "cmdc" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows Defender\en-US\cmd.exe'" /rl HIGHEST /f
                  4⤵
                  • Process spawned unexpected child process
                  • Scheduled Task/Job: Scheduled Task
                  PID:1764
                • C:\Windows\system32\schtasks.exe
                  schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 6 /tr "'C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\WmiPrvSE.exe'" /f
                  4⤵
                  • Process spawned unexpected child process
                  • Scheduled Task/Job: Scheduled Task
                  PID:2244
                • C:\Windows\system32\schtasks.exe
                  schtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\WmiPrvSE.exe'" /rl HIGHEST /f
                  4⤵
                  • Process spawned unexpected child process
                  • Scheduled Task/Job: Scheduled Task
                  PID:2448
                • C:\Windows\system32\schtasks.exe
                  schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 12 /tr "'C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\WmiPrvSE.exe'" /rl HIGHEST /f
                  4⤵
                  • Process spawned unexpected child process
                  • Scheduled Task/Job: Scheduled Task
                  PID:2088
                • C:\Windows\system32\schtasks.exe
                  schtasks.exe /create /tn "MsServerHostM" /sc MINUTE /mo 11 /tr "'C:\fontwin\MsServerHost.exe'" /f
                  4⤵
                  • Process spawned unexpected child process
                  • Scheduled Task/Job: Scheduled Task
                  PID:2352
                • C:\Windows\system32\schtasks.exe
                  schtasks.exe /create /tn "MsServerHost" /sc ONLOGON /tr "'C:\fontwin\MsServerHost.exe'" /rl HIGHEST /f
                  4⤵
                  • Process spawned unexpected child process
                  • Scheduled Task/Job: Scheduled Task
                  PID:1516
                • C:\Windows\system32\schtasks.exe
                  schtasks.exe /create /tn "MsServerHostM" /sc MINUTE /mo 10 /tr "'C:\fontwin\MsServerHost.exe'" /rl HIGHEST /f
                  4⤵
                  • Process spawned unexpected child process
                  • Scheduled Task/Job: Scheduled Task
                  PID:2736
              • C:\Windows\system32\wbem\wmiprvse.exe
                C:\Windows\system32\wbem\wmiprvse.exe -Embedding
                3⤵
                  PID:1152
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k RPCSS
                2⤵
                  PID:688
                • C:\Windows\System32\svchost.exe
                  C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
                  2⤵
                  • Indicator Removal: Clear Windows Event Logs
                  PID:764
                • C:\Windows\System32\svchost.exe
                  C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
                  2⤵
                    PID:828
                    • C:\Windows\system32\Dwm.exe
                      "C:\Windows\system32\Dwm.exe"
                      3⤵
                        PID:1172
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k netsvcs
                      2⤵
                      • Drops file in System32 directory
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      PID:856
                      • C:\Windows\system32\taskeng.exe
                        taskeng.exe {C2BE5CF9-609F-4100-8E98-3A38A2AD7ADB} S-1-5-18:NT AUTHORITY\System:Service:
                        3⤵
                        • Loads dropped DLL
                        PID:2984
                        • C:\Program Files\Google\Chrome\updater.exe
                          "C:\Program Files\Google\Chrome\updater.exe"
                          4⤵
                          • Suspicious use of NtCreateUserProcessOtherParentProcess
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          • Drops file in Program Files directory
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2064
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k LocalService
                      2⤵
                        PID:988
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k NetworkService
                        2⤵
                          PID:300
                        • C:\Windows\System32\spoolsv.exe
                          C:\Windows\System32\spoolsv.exe
                          2⤵
                            PID:928
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
                            2⤵
                              PID:1080
                            • C:\Windows\system32\taskhost.exe
                              "taskhost.exe"
                              2⤵
                                PID:1120
                              • C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE
                                "C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"
                                2⤵
                                  PID:1508
                                • C:\Windows\system32\svchost.exe
                                  C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
                                  2⤵
                                    PID:2400
                                  • C:\Windows\system32\sppsvc.exe
                                    C:\Windows\system32\sppsvc.exe
                                    2⤵
                                      PID:1920
                                  • C:\Windows\system32\lsass.exe
                                    C:\Windows\system32\lsass.exe
                                    1⤵
                                      PID:492
                                    • C:\Windows\system32\lsm.exe
                                      C:\Windows\system32\lsm.exe
                                      1⤵
                                        PID:500
                                      • C:\Windows\Explorer.EXE
                                        C:\Windows\Explorer.EXE
                                        1⤵
                                          PID:1220
                                          • C:\Users\Admin\AppData\Local\Temp\af4b66ff9b1f5830080860380efa81e4.exe
                                            "C:\Users\Admin\AppData\Local\Temp\af4b66ff9b1f5830080860380efa81e4.exe"
                                            2⤵
                                            • Loads dropped DLL
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious use of WriteProcessMemory
                                            PID:2796
                                            • C:\Users\Admin\AppData\Local\Temp\MpDefenderCoreService.exe
                                              "C:\Users\Admin\AppData\Local\Temp\MpDefenderCoreService.exe"
                                              3⤵
                                              • Executes dropped EXE
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious use of WriteProcessMemory
                                              PID:2728
                                              • C:\Windows\SysWOW64\WScript.exe
                                                "C:\Windows\System32\WScript.exe" "C:\fontwin\n5YK.vbe"
                                                4⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:1548
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  cmd /c ""C:\fontwin\eUNvwPScHJBqRVxJMAbWN67h5pJ3FqxG.bat" "
                                                  5⤵
                                                  • Loads dropped DLL
                                                  • System Location Discovery: System Language Discovery
                                                  PID:2144
                                                  • C:\fontwin\MsServerHost.exe
                                                    "C:\fontwin/MsServerHost.exe"
                                                    6⤵
                                                    • Modifies WinLogon for persistence
                                                    • Executes dropped EXE
                                                    • Adds Run key to start application
                                                    • Drops file in Program Files directory
                                                    PID:780
                                                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\h2bydji4\h2bydji4.cmdline"
                                                      7⤵
                                                      • Drops file in System32 directory
                                                      PID:2416
                                                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES57C1.tmp" "c:\Windows\System32\CSCF8C5EBB1E4745CD8FC248C1FAAB76AA.TMP"
                                                        8⤵
                                                          PID:2772
                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        "powershell" -Command Add-MpPreference -ExclusionPath 'C:/'
                                                        7⤵
                                                        • Command and Scripting Interpreter: PowerShell
                                                        PID:1720
                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        "powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'
                                                        7⤵
                                                        • Command and Scripting Interpreter: PowerShell
                                                        PID:2180
                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'
                                                        7⤵
                                                        • Command and Scripting Interpreter: PowerShell
                                                        PID:1980
                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        "powershell" -Command Add-MpPreference -ExclusionPath 'C:/fontwin/'
                                                        7⤵
                                                        • Command and Scripting Interpreter: PowerShell
                                                        PID:2100
                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        "powershell" -Command Add-MpPreference -ExclusionPath 'C:/MSOCache/'
                                                        7⤵
                                                        • Command and Scripting Interpreter: PowerShell
                                                        PID:2748
                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        "powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'
                                                        7⤵
                                                        • Command and Scripting Interpreter: PowerShell
                                                        PID:2280
                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'
                                                        7⤵
                                                        • Command and Scripting Interpreter: PowerShell
                                                        PID:2620
                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'
                                                        7⤵
                                                        • Command and Scripting Interpreter: PowerShell
                                                        PID:2520
                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        "powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'
                                                        7⤵
                                                        • Command and Scripting Interpreter: PowerShell
                                                        PID:1976
                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'
                                                        7⤵
                                                        • Command and Scripting Interpreter: PowerShell
                                                        PID:2816
                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        "powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'
                                                        7⤵
                                                        • Command and Scripting Interpreter: PowerShell
                                                        PID:824
                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'
                                                        7⤵
                                                        • Command and Scripting Interpreter: PowerShell
                                                        PID:2756
                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'
                                                        7⤵
                                                        • Command and Scripting Interpreter: PowerShell
                                                        PID:2892
                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Uninstall Information\smss.exe'
                                                        7⤵
                                                        • Command and Scripting Interpreter: PowerShell
                                                        PID:2800
                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\spoolsv.exe'
                                                        7⤵
                                                        • Command and Scripting Interpreter: PowerShell
                                                        PID:2424
                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        "powershell" -Command Add-MpPreference -ExclusionPath 'C:\fontwin\OSPPSVC.exe'
                                                        7⤵
                                                        • Command and Scripting Interpreter: PowerShell
                                                        PID:2716
                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Defender\en-US\cmd.exe'
                                                        7⤵
                                                        • Command and Scripting Interpreter: PowerShell
                                                        PID:2792
                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\WmiPrvSE.exe'
                                                        7⤵
                                                        • Command and Scripting Interpreter: PowerShell
                                                        PID:1060
                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        "powershell" -Command Add-MpPreference -ExclusionPath 'C:\fontwin\MsServerHost.exe'
                                                        7⤵
                                                        • Command and Scripting Interpreter: PowerShell
                                                        PID:1004
                                                      • C:\Windows\System32\cmd.exe
                                                        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\N1JvCD0U4V.bat"
                                                        7⤵
                                                          PID:2456
                                                          • C:\Windows\system32\chcp.com
                                                            chcp 65001
                                                            8⤵
                                                              PID:2844
                                                            • C:\Windows\system32\w32tm.exe
                                                              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                              8⤵
                                                                PID:912
                                                              • C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\WmiPrvSE.exe
                                                                "C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\WmiPrvSE.exe"
                                                                8⤵
                                                                • Executes dropped EXE
                                                                PID:2952
                                                    • C:\Users\Admin\AppData\Local\Temp\twain32.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\twain32.exe"
                                                      3⤵
                                                      • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                      • Executes dropped EXE
                                                      • Suspicious use of SetThreadContext
                                                      • Drops file in Program Files directory
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of WriteProcessMemory
                                                      PID:1792
                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                                    2⤵
                                                    • Command and Scripting Interpreter: PowerShell
                                                    • Drops file in System32 directory
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:2588
                                                  • C:\Windows\System32\cmd.exe
                                                    C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
                                                    2⤵
                                                    • Suspicious use of WriteProcessMemory
                                                    PID:2276
                                                    • C:\Windows\System32\sc.exe
                                                      sc stop UsoSvc
                                                      3⤵
                                                      • Launches sc.exe
                                                      PID:1004
                                                    • C:\Windows\System32\sc.exe
                                                      sc stop WaaSMedicSvc
                                                      3⤵
                                                      • Launches sc.exe
                                                      PID:2872
                                                    • C:\Windows\System32\sc.exe
                                                      sc stop wuauserv
                                                      3⤵
                                                      • Launches sc.exe
                                                      PID:2988
                                                    • C:\Windows\System32\sc.exe
                                                      sc stop bits
                                                      3⤵
                                                      • Launches sc.exe
                                                      PID:3012
                                                    • C:\Windows\System32\sc.exe
                                                      sc stop dosvc
                                                      3⤵
                                                      • Launches sc.exe
                                                      PID:2256
                                                  • C:\Windows\System32\cmd.exe
                                                    C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                                                    2⤵
                                                    • Power Settings
                                                    • Suspicious use of WriteProcessMemory
                                                    PID:2252
                                                    • C:\Windows\System32\powercfg.exe
                                                      powercfg /x -hibernate-timeout-ac 0
                                                      3⤵
                                                      • Power Settings
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:2908
                                                    • C:\Windows\System32\powercfg.exe
                                                      powercfg /x -hibernate-timeout-dc 0
                                                      3⤵
                                                      • Power Settings
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:1764
                                                    • C:\Windows\System32\powercfg.exe
                                                      powercfg /x -standby-timeout-ac 0
                                                      3⤵
                                                      • Power Settings
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:3028
                                                    • C:\Windows\System32\powercfg.exe
                                                      powercfg /x -standby-timeout-dc 0
                                                      3⤵
                                                      • Power Settings
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:2280
                                                  • C:\Windows\System32\dialer.exe
                                                    C:\Windows\System32\dialer.exe
                                                    2⤵
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    • Suspicious use of WriteProcessMemory
                                                    PID:2412
                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#xzibzypo#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }
                                                    2⤵
                                                    • Command and Scripting Interpreter: PowerShell
                                                    • Drops file in System32 directory
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:2668
                                                    • C:\Windows\system32\schtasks.exe
                                                      "C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"
                                                      3⤵
                                                      • Scheduled Task/Job: Scheduled Task
                                                      PID:2796
                                                  • C:\Windows\System32\schtasks.exe
                                                    C:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"
                                                    2⤵
                                                      PID:1812
                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                                      2⤵
                                                      • Command and Scripting Interpreter: PowerShell
                                                      • Drops file in System32 directory
                                                      • Modifies data under HKEY_USERS
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:284
                                                    • C:\Windows\System32\cmd.exe
                                                      C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
                                                      2⤵
                                                        PID:484
                                                        • C:\Windows\System32\sc.exe
                                                          sc stop UsoSvc
                                                          3⤵
                                                          • Launches sc.exe
                                                          PID:1516
                                                        • C:\Windows\System32\sc.exe
                                                          sc stop WaaSMedicSvc
                                                          3⤵
                                                          • Launches sc.exe
                                                          PID:912
                                                        • C:\Windows\System32\sc.exe
                                                          sc stop wuauserv
                                                          3⤵
                                                          • Launches sc.exe
                                                          PID:960
                                                        • C:\Windows\System32\sc.exe
                                                          sc stop bits
                                                          3⤵
                                                          • Launches sc.exe
                                                          PID:760
                                                        • C:\Windows\System32\sc.exe
                                                          sc stop dosvc
                                                          3⤵
                                                          • Launches sc.exe
                                                          PID:2940
                                                      • C:\Windows\System32\cmd.exe
                                                        C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                                                        2⤵
                                                        • Power Settings
                                                        PID:2080
                                                        • C:\Windows\System32\powercfg.exe
                                                          powercfg /x -hibernate-timeout-ac 0
                                                          3⤵
                                                          • Power Settings
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:1740
                                                        • C:\Windows\System32\powercfg.exe
                                                          powercfg /x -hibernate-timeout-dc 0
                                                          3⤵
                                                          • Power Settings
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:2416
                                                        • C:\Windows\System32\powercfg.exe
                                                          powercfg /x -standby-timeout-ac 0
                                                          3⤵
                                                          • Power Settings
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:2588
                                                        • C:\Windows\System32\powercfg.exe
                                                          powercfg /x -standby-timeout-dc 0
                                                          3⤵
                                                          • Power Settings
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:2956
                                                      • C:\Windows\System32\dialer.exe
                                                        C:\Windows\System32\dialer.exe
                                                        2⤵
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:1372
                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#xzibzypo#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }
                                                        2⤵
                                                        • Command and Scripting Interpreter: PowerShell
                                                        • Drops file in System32 directory
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:2948
                                                        • C:\Windows\system32\schtasks.exe
                                                          "C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"
                                                          3⤵
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:2892
                                                      • C:\Windows\System32\dialer.exe
                                                        C:\Windows\System32\dialer.exe
                                                        2⤵
                                                          PID:2432
                                                        • C:\Windows\System32\dialer.exe
                                                          C:\Windows\System32\dialer.exe
                                                          2⤵
                                                          • Modifies data under HKEY_USERS
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:1656
                                                      • C:\Windows\system32\conhost.exe
                                                        \??\C:\Windows\system32\conhost.exe "3374451471224418754-1180953492-716355101619345031760702248-278023769-1815691363"
                                                        1⤵
                                                          PID:2260
                                                        • C:\Windows\system32\conhost.exe
                                                          \??\C:\Windows\system32\conhost.exe "-954960114560193767-1195604446-20550055381571096863588642156467266401715469987"
                                                          1⤵
                                                            PID:1976
                                                          • C:\Windows\system32\conhost.exe
                                                            \??\C:\Windows\system32\conhost.exe "6689557985239156-21409593651424774707154321029611885975472098081461069740714"
                                                            1⤵
                                                              PID:2088
                                                            • C:\Windows\system32\conhost.exe
                                                              \??\C:\Windows\system32\conhost.exe "-1117317759-336522195-2102250613-1479846943-748285764-8561551872052768352-945280693"
                                                              1⤵
                                                                PID:2196
                                                              • C:\Windows\system32\conhost.exe
                                                                \??\C:\Windows\system32\conhost.exe "14179978423238053-710546584-125936801312207383846240806-512562410-230682562"
                                                                1⤵
                                                                  PID:2384
                                                                • C:\Windows\system32\conhost.exe
                                                                  \??\C:\Windows\system32\conhost.exe "1902251297-11398988291491070308-10704947451018182307-5595545417046196511086570513"
                                                                  1⤵
                                                                    PID:1068
                                                                  • C:\Windows\system32\conhost.exe
                                                                    \??\C:\Windows\system32\conhost.exe "-1310898339-1577709541562882794-8287433723437569381913197171748103354-700150610"
                                                                    1⤵
                                                                      PID:1560
                                                                    • C:\Windows\system32\conhost.exe
                                                                      \??\C:\Windows\system32\conhost.exe "960586500-1591270466-2118836754-1846547025-362143469-18351302598894664211238139124"
                                                                      1⤵
                                                                      • Suspicious use of SetWindowsHookEx
                                                                      PID:108
                                                                    • C:\Windows\system32\conhost.exe
                                                                      \??\C:\Windows\system32\conhost.exe "-1366303725950198600-154236502-617262121-394967234216368742-2145734290757686548"
                                                                      1⤵
                                                                        PID:2932
                                                                      • C:\Windows\system32\conhost.exe
                                                                        \??\C:\Windows\system32\conhost.exe "-2119130958-2048556091-12199104661650892143-1100427106614761927-2057555943-1962169928"
                                                                        1⤵
                                                                          PID:1604
                                                                        • C:\Windows\system32\conhost.exe
                                                                          \??\C:\Windows\system32\conhost.exe "294905798-619540427-1653221537-132894607818408142461603451742-848178435-1898618479"
                                                                          1⤵
                                                                            PID:2068
                                                                          • C:\Windows\system32\conhost.exe
                                                                            \??\C:\Windows\system32\conhost.exe "-382739092-35387848418645913891786016875-1056415192-139478295-17002566851875213117"
                                                                            1⤵
                                                                              PID:2396
                                                                            • C:\Windows\system32\conhost.exe
                                                                              \??\C:\Windows\system32\conhost.exe "1018596427-1085593929358862790-1536372103949961462574384359329506444-1911387684"
                                                                              1⤵
                                                                                PID:1712
                                                                              • C:\Windows\system32\conhost.exe
                                                                                \??\C:\Windows\system32\conhost.exe "-525864195-13721529781921491436-1449384342-1090231802-894628207401543811-1178412776"
                                                                                1⤵
                                                                                  PID:2960
                                                                                • C:\Windows\system32\conhost.exe
                                                                                  \??\C:\Windows\system32\conhost.exe "-18473449231339103228-3280602531115565339195121854010493304152059925514-815391280"
                                                                                  1⤵
                                                                                    PID:1964
                                                                                  • C:\Windows\system32\conhost.exe
                                                                                    \??\C:\Windows\system32\conhost.exe "6287896161317182500-12597230757385125735024525871985170015847322650-2082660202"
                                                                                    1⤵
                                                                                      PID:2592
                                                                                    • C:\Windows\system32\conhost.exe
                                                                                      \??\C:\Windows\system32\conhost.exe "158046649510823312181562678511-1575214310-116562498912875883721471609897746512515"
                                                                                      1⤵
                                                                                        PID:2824
                                                                                      • C:\Windows\system32\conhost.exe
                                                                                        \??\C:\Windows\system32\conhost.exe "-340240098-8827834241507220188-160004486588478621290406766-20977218081023594312"
                                                                                        1⤵
                                                                                          PID:2972
                                                                                        • C:\Windows\system32\conhost.exe
                                                                                          \??\C:\Windows\system32\conhost.exe "-1787302124-6811885531460251358-1524297291-2022847771-1369712380-1605885735195327450"
                                                                                          1⤵
                                                                                            PID:2304
                                                                                          • C:\Windows\system32\conhost.exe
                                                                                            \??\C:\Windows\system32\conhost.exe "-95511251317565346-15440680472113746126393852575630061218821105396-610768274"
                                                                                            1⤵
                                                                                              PID:1764
                                                                                            • C:\Windows\system32\conhost.exe
                                                                                              \??\C:\Windows\system32\conhost.exe "-15681838511776265868-1608180363814277708-2120085684418855639-753702719115323822"
                                                                                              1⤵
                                                                                                PID:396
                                                                                              • C:\Windows\system32\conhost.exe
                                                                                                \??\C:\Windows\system32\conhost.exe "-1866977752-169162693-838056525-9571226125694776741647409401-2065718020-255113530"
                                                                                                1⤵
                                                                                                  PID:2784
                                                                                                • C:\Windows\system32\conhost.exe
                                                                                                  \??\C:\Windows\system32\conhost.exe "-10918381646400223171853285226-1874962520-801349061-1733527010-847443460947845746"
                                                                                                  1⤵
                                                                                                    PID:3036
                                                                                                  • C:\Windows\system32\conhost.exe
                                                                                                    \??\C:\Windows\system32\conhost.exe "-1663317145-120889971659270095-459430077-941180177136951005111437826881789307201"
                                                                                                    1⤵
                                                                                                      PID:2464
                                                                                                    • C:\Windows\system32\conhost.exe
                                                                                                      \??\C:\Windows\system32\conhost.exe "-952058299-3431936841426794388-181620559-2133357448-1932761801518159025-635891779"
                                                                                                      1⤵
                                                                                                        PID:3040
                                                                                                      • C:\Windows\system32\conhost.exe
                                                                                                        \??\C:\Windows\system32\conhost.exe "-330170686-17228071441192761299-1597886014556012658-1970828134-502951829-397911915"
                                                                                                        1⤵
                                                                                                          PID:3028
                                                                                                        • C:\Windows\system32\conhost.exe
                                                                                                          \??\C:\Windows\system32\conhost.exe "-599683044-57743130077260807-452603791-4379642672045468745-3814285011328612145"
                                                                                                          1⤵
                                                                                                            PID:680
                                                                                                          • C:\Windows\system32\conhost.exe
                                                                                                            \??\C:\Windows\system32\conhost.exe "-1159100030-649251102063668145-674537379-1911043589-165047479-2369281701666356025"
                                                                                                            1⤵
                                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                                            PID:2616

                                                                                                          Network

                                                                                                          MITRE ATT&CK Enterprise v15

                                                                                                          Replay Monitor

                                                                                                          Loading Replay Monitor...

                                                                                                          Downloads

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\N1JvCD0U4V.bat

                                                                                                            Filesize

                                                                                                            237B

                                                                                                            MD5

                                                                                                            67da6838e992267f75c043aa03abd92a

                                                                                                            SHA1

                                                                                                            0c0d7ed0f7ecf7a1e09e633d3b0562e9c969d00c

                                                                                                            SHA256

                                                                                                            ac328774eea9464e4b993d05e71076a19de0b906e908d65cac327ae6bf9cb408

                                                                                                            SHA512

                                                                                                            bd4567a605ab075588f0c1feeb9c334353721ff55d8434526d4be37e38fa0e8cdc9c6b95d7e20952c2d9d7b568534432749a1fd38c2b435addad351bbe99f696

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\RES57C1.tmp

                                                                                                            Filesize

                                                                                                            1KB

                                                                                                            MD5

                                                                                                            562c75fbd13cd4deaa175743b691cbcd

                                                                                                            SHA1

                                                                                                            ca0b7684d29fdadd7bb2ee3554bf86462feea287

                                                                                                            SHA256

                                                                                                            b4c587ff1f3adb6e2fa13042cb945cc71fabf9b14229acd77c5f8606706973e9

                                                                                                            SHA512

                                                                                                            d733ee01291f387e592295649aeb566f6a4e235b70981add959ef092a83dc245b5906bd528a09e11e1d528e4c221ad529084a25c6cfde8d2d1df50e15235a56d

                                                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                            Filesize

                                                                                                            7KB

                                                                                                            MD5

                                                                                                            96c76b55a32c1afc6e726aabeb0204c5

                                                                                                            SHA1

                                                                                                            f649c53dcaae8956159da28916a465dc9379d3b7

                                                                                                            SHA256

                                                                                                            78d590f053015fa8dba02001b651b110348bae4b60a0147cecc8dc1b57dbba9d

                                                                                                            SHA512

                                                                                                            40893103e46ad451161bace5b4ad1826c50ea629fd5c2be85fe66467600b3929d895f25be888ef4c5fadbb4e2b64ae3d23c188de0e035a187d03d8c24a2258e1

                                                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                            Filesize

                                                                                                            7KB

                                                                                                            MD5

                                                                                                            e29059426ab010efad8663a1e01ab5c7

                                                                                                            SHA1

                                                                                                            c8731752d7ec8d40de97c26622f90273727d5b8e

                                                                                                            SHA256

                                                                                                            0ca62737173b771cc6baf142bebda92c51bc7c52e76ce45f88067980bb812f0e

                                                                                                            SHA512

                                                                                                            ff285e2ba0ac94e6272e37b07cfc74e444c5ab81f146e85625ac48f92014329e1843978025026b38f65660fe350a5c72b150e962daec85f313b0326033cd50a3

                                                                                                          • C:\Windows\System32\Tasks\GoogleUpdateTaskMachineQC

                                                                                                            Filesize

                                                                                                            3KB

                                                                                                            MD5

                                                                                                            71fb9a1d5cdb138862eb76256c3cfa2c

                                                                                                            SHA1

                                                                                                            8c34225abd4ab0a86c4d965a181e0e94371fbc60

                                                                                                            SHA256

                                                                                                            874ab11f5802346a7f3b73dc445bcad21e10cb47a93ef5529c86fdc9a8249456

                                                                                                            SHA512

                                                                                                            5914ae4bfcfa64c5abe933738064b83c51943db71124d3ffebe1512ae2f4df611505d9e05ce37fe6b033f658c61e96760a0c1e18bafe074e625015aa6bb3030c

                                                                                                          • C:\Windows\System32\Tasks\GoogleUpdateTaskMachineQC

                                                                                                            Filesize

                                                                                                            3KB

                                                                                                            MD5

                                                                                                            5a942aba2f695984a73e9df0f35fe7c3

                                                                                                            SHA1

                                                                                                            706a0b15977303f222bcbbe2465cad821f67583f

                                                                                                            SHA256

                                                                                                            1064ba002118f3418635c20a05fc4dc606f86d9d94675fb902db9cea503bbb72

                                                                                                            SHA512

                                                                                                            9e3b0b438aa5a483990b2742dd7a1dcb3b5fc062ebbe4370e9d55cf3134214358dd875437304a8def5716560c61bcb8c502cd23c7ff81d5d94ecb32dc4e54678

                                                                                                          • C:\Windows\System32\Tasks\cmd

                                                                                                            Filesize

                                                                                                            3KB

                                                                                                            MD5

                                                                                                            d4fd2c1a578b9c57f1bb7d0e3003367c

                                                                                                            SHA1

                                                                                                            f3f614ef903a93de2432f359a3ce7b5de6cb19ba

                                                                                                            SHA256

                                                                                                            f4966835d45f79fbaa732e8c5c089a0b6724b1718fe8670cf5f70e5b55c84951

                                                                                                            SHA512

                                                                                                            841b0f1177a404004f6a1f63446276fe1f25c9b29c302d9931b19622bf0f54234ddb34528cfd04047332d6af689eaaf2f0a49d14341b77e380e020be5f062ae4

                                                                                                          • C:\fontwin\MsServerHost.exe

                                                                                                            Filesize

                                                                                                            1.9MB

                                                                                                            MD5

                                                                                                            c23ec3a6c041cb8b7d626faee44ef7d8

                                                                                                            SHA1

                                                                                                            95739b177a47a9b0347591994f461d44db403649

                                                                                                            SHA256

                                                                                                            f791649ac2127072a37c5c1697ab9b304c15ad0aad93a6daecccaf5e442a051e

                                                                                                            SHA512

                                                                                                            89e420c422278a393102a27b51dfc56ef289aeb0d627db93bd4247ea796b7f83cfbfd327ddc6efaa913450970ab075c9dd3128159949713e10fce2cd178b8087

                                                                                                          • C:\fontwin\eUNvwPScHJBqRVxJMAbWN67h5pJ3FqxG.bat

                                                                                                            Filesize

                                                                                                            74B

                                                                                                            MD5

                                                                                                            3949760e5406001b774a6b5349902977

                                                                                                            SHA1

                                                                                                            187aacbf7de65a5716065184c9a0290cd533ff82

                                                                                                            SHA256

                                                                                                            a3f206b3f2588d0bd3aa95e46209fac7895b5dd955b3bbd8eec63f3f0a37c1d2

                                                                                                            SHA512

                                                                                                            694fc9fe0dd428b6d7e8f6805df29e09b85cee309a8c5e7560c4b9b3fd36d6547083c33d0073bbaad896b2b43ee13f7df0ec29309b196027ecb57710b9bf8cff

                                                                                                          • C:\fontwin\n5YK.vbe

                                                                                                            Filesize

                                                                                                            218B

                                                                                                            MD5

                                                                                                            7e7c767f1e75be51878d3e99bd17eb60

                                                                                                            SHA1

                                                                                                            e2f48d427ab85782feac5119447d0199a7d302fd

                                                                                                            SHA256

                                                                                                            842bcb05a80577f1a81bc2c58f25311ce81487e78855438bd9bd565f79318c5d

                                                                                                            SHA512

                                                                                                            2ab9cb47423608f5fea2189fde78500345e689f06bb65f4dace8108372091bc0cfe76b8ae52cbae86185fcc13a826fab07e09e8ac4126d0d800627f8cd9d0694

                                                                                                          • \??\c:\Users\Admin\AppData\Local\Temp\h2bydji4\h2bydji4.0.cs

                                                                                                            Filesize

                                                                                                            379B

                                                                                                            MD5

                                                                                                            14ae420f1b66e0abb130739b598e787c

                                                                                                            SHA1

                                                                                                            7d371532462f2dce758294f3181e131520b0eea6

                                                                                                            SHA256

                                                                                                            fb66c0426f7f839d99789360e9c6d6befcdc0992a1b2ba17749ccbf80d9fb475

                                                                                                            SHA512

                                                                                                            5e27806bd7475661264ce07ed724c0e4dc0a92948208bdd294b1da197897dc4151ebcae1e832bada3075c6463815e88019c10bbf4d566d44262873e7c3ef5f3d

                                                                                                          • \??\c:\Users\Admin\AppData\Local\Temp\h2bydji4\h2bydji4.cmdline

                                                                                                            Filesize

                                                                                                            235B

                                                                                                            MD5

                                                                                                            816c8d18930caa13723c2beb98b3193c

                                                                                                            SHA1

                                                                                                            a730de8931df74b252c8d45fe6b72a4a6f0c0b13

                                                                                                            SHA256

                                                                                                            ab50df405815064bbf7da5639fadc2d99c7e6fd578d8fd36a9830a5837a36051

                                                                                                            SHA512

                                                                                                            4c3401f3b229c3e49c00f186fd709aee925794c9a767b6548d3a7429bd34dfe67c88a8ad8a0646d6bf8b0ddb8dea8747c6b365017fe5c2ef6d514999b6891552

                                                                                                          • \??\c:\Windows\System32\CSCF8C5EBB1E4745CD8FC248C1FAAB76AA.TMP

                                                                                                            Filesize

                                                                                                            1KB

                                                                                                            MD5

                                                                                                            dcd286f3a69cfd0292a8edbc946f8553

                                                                                                            SHA1

                                                                                                            4d347ac1e8c1d75fc139878f5646d3a0b083ef17

                                                                                                            SHA256

                                                                                                            29e03364271673f4b388131b7773d016df859bb0b1c5e6c3ad6914a632600596

                                                                                                            SHA512

                                                                                                            4b9546033bd4957263854fbb0a87aa1d57ce3afbce7bf03b12b05b78f97c5a27c52c1d73e34b6a5ba2c395e26ec9c474a32609441b99cf78ea707113fca96f77

                                                                                                          • \Users\Admin\AppData\Local\Temp\MpDefenderCoreService.exe

                                                                                                            Filesize

                                                                                                            1.8MB

                                                                                                            MD5

                                                                                                            8d9a9cff85c871e53cdfa82d0a46fc94

                                                                                                            SHA1

                                                                                                            f16d21268be5b0125f11157ff2d82612046010c5

                                                                                                            SHA256

                                                                                                            b4429685230b59b966c71b2b94097b993eabb84e0c4c3ca104af060bcc830bcb

                                                                                                            SHA512

                                                                                                            ca085ed7991a725ee94b144f329bb927cab2c4f6e5d8ece1725104da3d66fb183a387d2c3a15200e7218c64e0dd6cf195754bd8d011548581396e7747817e5fe

                                                                                                          • \Users\Admin\AppData\Local\Temp\twain32.exe

                                                                                                            Filesize

                                                                                                            5.7MB

                                                                                                            MD5

                                                                                                            de40bff13376524593bbf365ac4489f2

                                                                                                            SHA1

                                                                                                            19178234bd0e35a984ff183418fc2f39c48b4e8d

                                                                                                            SHA256

                                                                                                            bafc17e2573f25344dbd7e27703f8e91b2abde15ac01a932bd3f12e686ab7952

                                                                                                            SHA512

                                                                                                            957fcc33adead5af1e5919251976c863b519f3097f21d1abf909cea136fe0b8ad7e8c15696a409d212d471c3b4d899cd021e7194fbcc4c6445b220383653016b

                                                                                                          • memory/432-35-0x000007FEBF760000-0x000007FEBF770000-memory.dmp

                                                                                                            Filesize

                                                                                                            64KB

                                                                                                          • memory/432-36-0x0000000037800000-0x0000000037810000-memory.dmp

                                                                                                            Filesize

                                                                                                            64KB

                                                                                                          • memory/432-34-0x0000000000CC0000-0x0000000000CE7000-memory.dmp

                                                                                                            Filesize

                                                                                                            156KB

                                                                                                          • memory/432-33-0x0000000000C90000-0x0000000000CB1000-memory.dmp

                                                                                                            Filesize

                                                                                                            132KB

                                                                                                          • memory/432-31-0x0000000000C90000-0x0000000000CB1000-memory.dmp

                                                                                                            Filesize

                                                                                                            132KB

                                                                                                          • memory/476-58-0x000007FEBF760000-0x000007FEBF770000-memory.dmp

                                                                                                            Filesize

                                                                                                            64KB

                                                                                                          • memory/476-41-0x0000000000130000-0x0000000000157000-memory.dmp

                                                                                                            Filesize

                                                                                                            156KB

                                                                                                          • memory/476-59-0x0000000037800000-0x0000000037810000-memory.dmp

                                                                                                            Filesize

                                                                                                            64KB

                                                                                                          • memory/492-64-0x000007FEBF760000-0x000007FEBF770000-memory.dmp

                                                                                                            Filesize

                                                                                                            64KB

                                                                                                          • memory/492-62-0x0000000000180000-0x00000000001A7000-memory.dmp

                                                                                                            Filesize

                                                                                                            156KB

                                                                                                          • memory/492-66-0x0000000037800000-0x0000000037810000-memory.dmp

                                                                                                            Filesize

                                                                                                            64KB

                                                                                                          • memory/608-77-0x000007FEBF760000-0x000007FEBF770000-memory.dmp

                                                                                                            Filesize

                                                                                                            64KB

                                                                                                          • memory/608-78-0x0000000037800000-0x0000000037810000-memory.dmp

                                                                                                            Filesize

                                                                                                            64KB

                                                                                                          • memory/608-76-0x00000000001F0000-0x0000000000217000-memory.dmp

                                                                                                            Filesize

                                                                                                            156KB

                                                                                                          • memory/688-80-0x00000000004A0000-0x00000000004C7000-memory.dmp

                                                                                                            Filesize

                                                                                                            156KB

                                                                                                          • memory/780-578-0x0000000000920000-0x000000000092E000-memory.dmp

                                                                                                            Filesize

                                                                                                            56KB

                                                                                                          • memory/780-576-0x0000000000F10000-0x0000000001108000-memory.dmp

                                                                                                            Filesize

                                                                                                            2.0MB

                                                                                                          • memory/780-580-0x0000000000950000-0x000000000096C000-memory.dmp

                                                                                                            Filesize

                                                                                                            112KB

                                                                                                          • memory/780-582-0x0000000000970000-0x0000000000988000-memory.dmp

                                                                                                            Filesize

                                                                                                            96KB

                                                                                                          • memory/780-584-0x0000000000930000-0x000000000093E000-memory.dmp

                                                                                                            Filesize

                                                                                                            56KB

                                                                                                          • memory/780-586-0x0000000000940000-0x000000000094C000-memory.dmp

                                                                                                            Filesize

                                                                                                            48KB

                                                                                                          • memory/780-588-0x0000000000A10000-0x0000000000A1E000-memory.dmp

                                                                                                            Filesize

                                                                                                            56KB

                                                                                                          • memory/780-590-0x0000000000E70000-0x0000000000E7C000-memory.dmp

                                                                                                            Filesize

                                                                                                            48KB

                                                                                                          • memory/828-81-0x0000000000E40000-0x0000000000E67000-memory.dmp

                                                                                                            Filesize

                                                                                                            156KB

                                                                                                          • memory/828-82-0x000007FEBF760000-0x000007FEBF770000-memory.dmp

                                                                                                            Filesize

                                                                                                            64KB

                                                                                                          • memory/828-83-0x0000000037800000-0x0000000037810000-memory.dmp

                                                                                                            Filesize

                                                                                                            64KB

                                                                                                          • memory/1720-996-0x000000001B6F0000-0x000000001B9D2000-memory.dmp

                                                                                                            Filesize

                                                                                                            2.9MB

                                                                                                          • memory/1720-997-0x0000000002920000-0x0000000002928000-memory.dmp

                                                                                                            Filesize

                                                                                                            32KB

                                                                                                          • memory/2412-30-0x00000000776A0000-0x00000000777BF000-memory.dmp

                                                                                                            Filesize

                                                                                                            1.1MB

                                                                                                          • memory/2412-29-0x00000000777C0000-0x0000000077969000-memory.dmp

                                                                                                            Filesize

                                                                                                            1.7MB

                                                                                                          • memory/2588-27-0x0000000001CE0000-0x0000000001CE8000-memory.dmp

                                                                                                            Filesize

                                                                                                            32KB

                                                                                                          • memory/2588-26-0x000000001B6F0000-0x000000001B9D2000-memory.dmp

                                                                                                            Filesize

                                                                                                            2.9MB

                                                                                                          • memory/2620-1184-0x0000000000360000-0x0000000000368000-memory.dmp

                                                                                                            Filesize

                                                                                                            32KB

                                                                                                          • memory/2620-1183-0x000000001B700000-0x000000001B9E2000-memory.dmp

                                                                                                            Filesize

                                                                                                            2.9MB

                                                                                                          • memory/2668-221-0x0000000001EB0000-0x0000000001EB8000-memory.dmp

                                                                                                            Filesize

                                                                                                            32KB

                                                                                                          • memory/2668-220-0x000000001B760000-0x000000001BA42000-memory.dmp

                                                                                                            Filesize

                                                                                                            2.9MB

                                                                                                          • memory/2952-1507-0x0000000000860000-0x0000000000A58000-memory.dmp

                                                                                                            Filesize

                                                                                                            2.0MB