Analysis
-
max time kernel
152s -
max time network
44s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
18-08-2021 05:01
Behavioral task
behavioral1
Sample
04a31d76_LlMk5PvSaq.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
04a31d76_LlMk5PvSaq.exe
Resource
win10v20210408
General
-
Target
04a31d76_LlMk5PvSaq.exe
-
Size
1.4MB
-
MD5
04a31d7675a4858c9c1ddb7c818782d5
-
SHA1
991b6bd9ed58869e8e408158b99a050791e15f17
-
SHA256
54096c1f199a69326018b8a54c3c2e8b6a2e0a1f4724d0fceb8016cf4ae0cece
-
SHA512
2fac1ab544a88b0476e474d0990ab24fa5a678f0ae983aca1666910774d85a0b5dcc2040ef5fff21a25ef04d57fdc35de34af28d24c73af8b66c163b890b5d97
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Modifies WinLogon for persistence 2 TTPs 32 IoCs
Processes:
driverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:/Users/Admin/AppData/Local/\\conhost.exe\", \"C:/Users/Admin/AppData/Local/\\wininit.exe\", \"C:/Users/Admin/AppData/Local/\\dwm.exe\", \"C:/Users/Admin/AppData/Local/\\sppsvc.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\WMIADAP.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\services.exe\", \"C:/Users/Admin/AppData/Local/\\winlogon.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\csrss.exe\", \"C:/Users/Admin/AppData/Local/\\smss.exe\", \"C:/Users/Admin/AppData/Local/\\csrss.exe\", \"C:/Users/Admin/AppData/Local/\\smss.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\lsass.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:/Users/Admin/AppData/Local/\\conhost.exe\", \"C:/Users/Admin/AppData/Local/\\wininit.exe\", \"C:/Users/Admin/AppData/Local/\\dwm.exe\", \"C:/Users/Admin/AppData/Local/\\sppsvc.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\WMIADAP.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\services.exe\", \"C:/Users/Admin/AppData/Local/\\winlogon.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\csrss.exe\", \"C:/Users/Admin/AppData/Local/\\smss.exe\", \"C:/Users/Admin/AppData/Local/\\csrss.exe\", \"C:/Users/Admin/AppData/Local/\\smss.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\lsass.exe\", \"C:/Users/Admin/AppData/Local/\\lsass.exe\", \"C:/Users/Admin/AppData/Local/\\dwm.exe\", \"C:/Users/Admin/AppData/Local/\\WmiPrvSE.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:/Users/Admin/AppData/Local/\\conhost.exe\", \"C:/Users/Admin/AppData/Local/\\wininit.exe\", \"C:/Users/Admin/AppData/Local/\\dwm.exe\", \"C:/Users/Admin/AppData/Local/\\sppsvc.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\WMIADAP.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\services.exe\", \"C:/Users/Admin/AppData/Local/\\winlogon.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\csrss.exe\", \"C:/Users/Admin/AppData/Local/\\smss.exe\", \"C:/Users/Admin/AppData/Local/\\csrss.exe\", \"C:/Users/Admin/AppData/Local/\\smss.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\lsass.exe\", \"C:/Users/Admin/AppData/Local/\\lsass.exe\", \"C:/Users/Admin/AppData/Local/\\dwm.exe\", \"C:/Users/Admin/AppData/Local/\\WmiPrvSE.exe\", \"C:/Users/Admin/AppData/Local/\\sppsvc.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:/Users/Admin/AppData/Local/\\conhost.exe\", \"C:/Users/Admin/AppData/Local/\\wininit.exe\", \"C:/Users/Admin/AppData/Local/\\dwm.exe\", \"C:/Users/Admin/AppData/Local/\\sppsvc.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\WMIADAP.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\services.exe\", \"C:/Users/Admin/AppData/Local/\\winlogon.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\csrss.exe\", \"C:/Users/Admin/AppData/Local/\\smss.exe\", \"C:/Users/Admin/AppData/Local/\\csrss.exe\", \"C:/Users/Admin/AppData/Local/\\smss.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\lsass.exe\", \"C:/Users/Admin/AppData/Local/\\lsass.exe\", \"C:/Users/Admin/AppData/Local/\\dwm.exe\", \"C:/Users/Admin/AppData/Local/\\WmiPrvSE.exe\", \"C:/Users/Admin/AppData/Local/\\sppsvc.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:/Users/Admin/AppData/Local/\\conhost.exe\", \"C:/Users/Admin/AppData/Local/\\wininit.exe\", \"C:/Users/Admin/AppData/Local/\\dwm.exe\", \"C:/Users/Admin/AppData/Local/\\sppsvc.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:/Users/Admin/AppData/Local/\\conhost.exe\", \"C:/Users/Admin/AppData/Local/\\wininit.exe\", \"C:/Users/Admin/AppData/Local/\\dwm.exe\", \"C:/Users/Admin/AppData/Local/\\sppsvc.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\WMIADAP.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:/Users/Admin/AppData/Local/\\conhost.exe\", \"C:/Users/Admin/AppData/Local/\\wininit.exe\", \"C:/Users/Admin/AppData/Local/\\dwm.exe\", \"C:/Users/Admin/AppData/Local/\\sppsvc.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\WMIADAP.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\services.exe\", \"C:/Users/Admin/AppData/Local/\\winlogon.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:/Users/Admin/AppData/Local/\\conhost.exe\", \"C:/Users/Admin/AppData/Local/\\wininit.exe\", \"C:/Users/Admin/AppData/Local/\\dwm.exe\", \"C:/Users/Admin/AppData/Local/\\sppsvc.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\WMIADAP.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\services.exe\", \"C:/Users/Admin/AppData/Local/\\winlogon.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\csrss.exe\", \"C:/Users/Admin/AppData/Local/\\smss.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:/Users/Admin/AppData/Local/\\conhost.exe\", \"C:/Users/Admin/AppData/Local/\\wininit.exe\", \"C:/Users/Admin/AppData/Local/\\dwm.exe\", \"C:/Users/Admin/AppData/Local/\\sppsvc.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\WMIADAP.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\services.exe\", \"C:/Users/Admin/AppData/Local/\\winlogon.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\csrss.exe\", \"C:/Users/Admin/AppData/Local/\\smss.exe\", \"C:/Users/Admin/AppData/Local/\\csrss.exe\", \"C:/Users/Admin/AppData/Local/\\smss.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\lsass.exe\", \"C:/Users/Admin/AppData/Local/\\lsass.exe\", \"C:/Users/Admin/AppData/Local/\\dwm.exe\", \"C:/Users/Admin/AppData/Local/\\WmiPrvSE.exe\", \"C:/Users/Admin/AppData/Local/\\sppsvc.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:/Users/Admin/AppData/Local/\\conhost.exe\", \"C:/Users/Admin/AppData/Local/\\wininit.exe\", \"C:/Users/Admin/AppData/Local/\\dwm.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:/Users/Admin/AppData/Local/\\conhost.exe\", \"C:/Users/Admin/AppData/Local/\\wininit.exe\", \"C:/Users/Admin/AppData/Local/\\dwm.exe\", \"C:/Users/Admin/AppData/Local/\\sppsvc.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\WMIADAP.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:/Users/Admin/AppData/Local/\\conhost.exe\", \"C:/Users/Admin/AppData/Local/\\wininit.exe\", \"C:/Users/Admin/AppData/Local/\\dwm.exe\", \"C:/Users/Admin/AppData/Local/\\sppsvc.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\WMIADAP.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\services.exe\", \"C:/Users/Admin/AppData/Local/\\winlogon.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:/Users/Admin/AppData/Local/\\conhost.exe\", \"C:/Users/Admin/AppData/Local/\\wininit.exe\", \"C:/Users/Admin/AppData/Local/\\dwm.exe\", \"C:/Users/Admin/AppData/Local/\\sppsvc.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\WMIADAP.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\services.exe\", \"C:/Users/Admin/AppData/Local/\\winlogon.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\csrss.exe\", \"C:/Users/Admin/AppData/Local/\\smss.exe\", \"C:/Users/Admin/AppData/Local/\\csrss.exe\", \"C:/Users/Admin/AppData/Local/\\smss.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\lsass.exe\", \"C:/Users/Admin/AppData/Local/\\lsass.exe\", \"C:/Users/Admin/AppData/Local/\\dwm.exe\", \"C:/Users/Admin/AppData/Local/\\WmiPrvSE.exe\", \"C:/Users/Admin/AppData/Local/\\sppsvc.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\csrss.exe\", \"C:/Users/Admin/AppData/Local/\\winlogon.exe\", \"C:/Users/Admin/AppData/Local/\\winlogon.exe\", \"C:/Users/Admin/AppData/Local/\\csrss.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:/Users/Admin/AppData/Local/\\conhost.exe\", \"C:/Users/Admin/AppData/Local/\\wininit.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:/Users/Admin/AppData/Local/\\conhost.exe\", \"C:/Users/Admin/AppData/Local/\\wininit.exe\", \"C:/Users/Admin/AppData/Local/\\dwm.exe\", \"C:/Users/Admin/AppData/Local/\\sppsvc.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\WMIADAP.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\services.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:/Users/Admin/AppData/Local/\\conhost.exe\", \"C:/Users/Admin/AppData/Local/\\wininit.exe\", \"C:/Users/Admin/AppData/Local/\\dwm.exe\", \"C:/Users/Admin/AppData/Local/\\sppsvc.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\WMIADAP.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\services.exe\", \"C:/Users/Admin/AppData/Local/\\winlogon.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\csrss.exe\", \"C:/Users/Admin/AppData/Local/\\smss.exe\", \"C:/Users/Admin/AppData/Local/\\csrss.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:/Users/Admin/AppData/Local/\\conhost.exe\", \"C:/Users/Admin/AppData/Local/\\wininit.exe\", \"C:/Users/Admin/AppData/Local/\\dwm.exe\", \"C:/Users/Admin/AppData/Local/\\sppsvc.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\WMIADAP.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\services.exe\", \"C:/Users/Admin/AppData/Local/\\winlogon.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\csrss.exe\", \"C:/Users/Admin/AppData/Local/\\smss.exe\", \"C:/Users/Admin/AppData/Local/\\csrss.exe\", \"C:/Users/Admin/AppData/Local/\\smss.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\lsass.exe\", \"C:/Users/Admin/AppData/Local/\\lsass.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:/Users/Admin/AppData/Local/\\conhost.exe\", \"C:/Users/Admin/AppData/Local/\\wininit.exe\", \"C:/Users/Admin/AppData/Local/\\dwm.exe\", \"C:/Users/Admin/AppData/Local/\\sppsvc.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\WMIADAP.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\services.exe\", \"C:/Users/Admin/AppData/Local/\\winlogon.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\csrss.exe\", \"C:/Users/Admin/AppData/Local/\\smss.exe\", \"C:/Users/Admin/AppData/Local/\\csrss.exe\", \"C:/Users/Admin/AppData/Local/\\smss.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\lsass.exe\", \"C:/Users/Admin/AppData/Local/\\lsass.exe\", \"C:/Users/Admin/AppData/Local/\\dwm.exe\", \"C:/Users/Admin/AppData/Local/\\WmiPrvSE.exe\", \"C:/Users/Admin/AppData/Local/\\sppsvc.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\csrss.exe\", \"C:/Users/Admin/AppData/Local/\\winlogon.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:/Users/Admin/AppData/Local/\\conhost.exe\", \"C:/Users/Admin/AppData/Local/\\wininit.exe\", \"C:/Users/Admin/AppData/Local/\\dwm.exe\", \"C:/Users/Admin/AppData/Local/\\sppsvc.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\WMIADAP.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\services.exe\", \"C:/Users/Admin/AppData/Local/\\winlogon.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\csrss.exe\", \"C:/Users/Admin/AppData/Local/\\smss.exe\", \"C:/Users/Admin/AppData/Local/\\csrss.exe\", \"C:/Users/Admin/AppData/Local/\\smss.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\lsass.exe\", \"C:/Users/Admin/AppData/Local/\\lsass.exe\", \"C:/Users/Admin/AppData/Local/\\dwm.exe\", \"C:/Users/Admin/AppData/Local/\\WmiPrvSE.exe\", \"C:/Users/Admin/AppData/Local/\\sppsvc.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\csrss.exe\", \"C:/Users/Admin/AppData/Local/\\winlogon.exe\", \"C:/Users/Admin/AppData/Local/\\winlogon.exe\", \"C:/Users/Admin/AppData/Local/\\csrss.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:/Users/Admin/AppData/Local/\\conhost.exe\", \"C:/Users/Admin/AppData/Local/\\wininit.exe\", \"C:/Users/Admin/AppData/Local/\\dwm.exe\", \"C:/Users/Admin/AppData/Local/\\sppsvc.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\WMIADAP.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\services.exe\", \"C:/Users/Admin/AppData/Local/\\winlogon.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\csrss.exe\", \"C:/Users/Admin/AppData/Local/\\smss.exe\", \"C:/Users/Admin/AppData/Local/\\csrss.exe\", \"C:/Users/Admin/AppData/Local/\\smss.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\lsass.exe\", \"C:/Users/Admin/AppData/Local/\\lsass.exe\", \"C:/Users/Admin/AppData/Local/\\dwm.exe\", \"C:/Users/Admin/AppData/Local/\\WmiPrvSE.exe\", \"C:/Users/Admin/AppData/Local/\\sppsvc.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\csrss.exe\", \"C:/Users/Admin/AppData/Local/\\winlogon.exe\", \"C:/Users/Admin/AppData/Local/\\winlogon.exe\", \"C:/Users/Admin/AppData/Local/\\csrss.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\sppsvc.exe\", \"C:/Users/Admin/AppData/Local/\\WmiPrvSE.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:/Users/Admin/AppData/Local/\\conhost.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:/Users/Admin/AppData/Local/\\conhost.exe\", \"C:/Users/Admin/AppData/Local/\\wininit.exe\", \"C:/Users/Admin/AppData/Local/\\dwm.exe\", \"C:/Users/Admin/AppData/Local/\\sppsvc.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:/Users/Admin/AppData/Local/\\conhost.exe\", \"C:/Users/Admin/AppData/Local/\\wininit.exe\", \"C:/Users/Admin/AppData/Local/\\dwm.exe\", \"C:/Users/Admin/AppData/Local/\\sppsvc.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:/Users/Admin/AppData/Local/\\conhost.exe\", \"C:/Users/Admin/AppData/Local/\\wininit.exe\", \"C:/Users/Admin/AppData/Local/\\dwm.exe\", \"C:/Users/Admin/AppData/Local/\\sppsvc.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\WMIADAP.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\services.exe\", \"C:/Users/Admin/AppData/Local/\\winlogon.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\csrss.exe\", \"C:/Users/Admin/AppData/Local/\\smss.exe\", \"C:/Users/Admin/AppData/Local/\\csrss.exe\", \"C:/Users/Admin/AppData/Local/\\smss.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\lsass.exe\", \"C:/Users/Admin/AppData/Local/\\lsass.exe\", \"C:/Users/Admin/AppData/Local/\\dwm.exe\", \"C:/Users/Admin/AppData/Local/\\WmiPrvSE.exe\", \"C:/Users/Admin/AppData/Local/\\sppsvc.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\csrss.exe\", \"C:/Users/Admin/AppData/Local/\\winlogon.exe\", \"C:/Users/Admin/AppData/Local/\\winlogon.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:/Users/Admin/AppData/Local/\\conhost.exe\", \"C:/Users/Admin/AppData/Local/\\wininit.exe\", \"C:/Users/Admin/AppData/Local/\\dwm.exe\", \"C:/Users/Admin/AppData/Local/\\sppsvc.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\WMIADAP.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\services.exe\", \"C:/Users/Admin/AppData/Local/\\winlogon.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\csrss.exe\", \"C:/Users/Admin/AppData/Local/\\smss.exe\", \"C:/Users/Admin/AppData/Local/\\csrss.exe\", \"C:/Users/Admin/AppData/Local/\\smss.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\lsass.exe\", \"C:/Users/Admin/AppData/Local/\\lsass.exe\", \"C:/Users/Admin/AppData/Local/\\dwm.exe\", \"C:/Users/Admin/AppData/Local/\\WmiPrvSE.exe\", \"C:/Users/Admin/AppData/Local/\\sppsvc.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\csrss.exe\", \"C:/Users/Admin/AppData/Local/\\winlogon.exe\", \"C:/Users/Admin/AppData/Local/\\winlogon.exe\", \"C:/Users/Admin/AppData/Local/\\csrss.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\sppsvc.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:/Users/Admin/AppData/Local/\\conhost.exe\", \"C:/Users/Admin/AppData/Local/\\wininit.exe\", \"C:/Users/Admin/AppData/Local/\\dwm.exe\", \"C:/Users/Admin/AppData/Local/\\sppsvc.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:/Users/Admin/AppData/Local/\\conhost.exe\", \"C:/Users/Admin/AppData/Local/\\wininit.exe\", \"C:/Users/Admin/AppData/Local/\\dwm.exe\", \"C:/Users/Admin/AppData/Local/\\sppsvc.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\WMIADAP.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\services.exe\", \"C:/Users/Admin/AppData/Local/\\winlogon.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\csrss.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:/Users/Admin/AppData/Local/\\conhost.exe\", \"C:/Users/Admin/AppData/Local/\\wininit.exe\", \"C:/Users/Admin/AppData/Local/\\dwm.exe\", \"C:/Users/Admin/AppData/Local/\\sppsvc.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\WMIADAP.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\services.exe\", \"C:/Users/Admin/AppData/Local/\\winlogon.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\csrss.exe\", \"C:/Users/Admin/AppData/Local/\\smss.exe\", \"C:/Users/Admin/AppData/Local/\\csrss.exe\", \"C:/Users/Admin/AppData/Local/\\smss.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:/Users/Admin/AppData/Local/\\conhost.exe\", \"C:/Users/Admin/AppData/Local/\\wininit.exe\", \"C:/Users/Admin/AppData/Local/\\dwm.exe\", \"C:/Users/Admin/AppData/Local/\\sppsvc.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\WMIADAP.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\services.exe\", \"C:/Users/Admin/AppData/Local/\\winlogon.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\csrss.exe\", \"C:/Users/Admin/AppData/Local/\\smss.exe\", \"C:/Users/Admin/AppData/Local/\\csrss.exe\", \"C:/Users/Admin/AppData/Local/\\smss.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:/Users/Admin/AppData/Local/\\conhost.exe\", \"C:/Users/Admin/AppData/Local/\\wininit.exe\", \"C:/Users/Admin/AppData/Local/\\dwm.exe\", \"C:/Users/Admin/AppData/Local/\\sppsvc.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\WMIADAP.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:/Users/Admin/AppData/Local/\\conhost.exe\", \"C:/Users/Admin/AppData/Local/\\wininit.exe\", \"C:/Users/Admin/AppData/Local/\\dwm.exe\", \"C:/Users/Admin/AppData/Local/\\sppsvc.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\WMIADAP.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\services.exe\", \"C:/Users/Admin/AppData/Local/\\winlogon.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\csrss.exe\", \"C:/Users/Admin/AppData/Local/\\smss.exe\", \"C:/Users/Admin/AppData/Local/\\csrss.exe\", \"C:/Users/Admin/AppData/Local/\\smss.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\lsass.exe\", \"C:/Users/Admin/AppData/Local/\\lsass.exe\", \"C:/Users/Admin/AppData/Local/\\dwm.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:/Users/Admin/AppData/Local/\\conhost.exe\", \"C:/Users/Admin/AppData/Local/\\wininit.exe\", \"C:/Users/Admin/AppData/Local/\\dwm.exe\", \"C:/Users/Admin/AppData/Local/\\sppsvc.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\WMIADAP.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\services.exe\", \"C:/Users/Admin/AppData/Local/\\winlogon.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\csrss.exe\", \"C:/Users/Admin/AppData/Local/\\smss.exe\", \"C:/Users/Admin/AppData/Local/\\csrss.exe\", \"C:/Users/Admin/AppData/Local/\\smss.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\lsass.exe\", \"C:/Users/Admin/AppData/Local/\\lsass.exe\", \"C:/Users/Admin/AppData/Local/\\dwm.exe\", \"C:/Users/Admin/AppData/Local/\\WmiPrvSE.exe\", \"C:/Users/Admin/AppData/Local/\\sppsvc.exe\", \"C:/Users/Admin/AppData/Local/\\Idle.exe\", \"C:/Users/Admin/AppData/Local/\\lsm.exe\", \"C:/Users/Admin/AppData/Local/\\csrss.exe\"" driverSavesPerfsvcCrtNetSvc.exe -
Process spawned unexpected child process 32 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1616 704 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 472 704 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1960 704 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2036 704 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 368 704 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1708 704 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1728 704 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1664 704 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1868 704 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 888 704 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1976 704 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1120 704 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1704 704 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1492 704 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1340 704 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1616 704 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 568 704 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1676 704 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1164 704 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1712 704 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 884 704 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2008 704 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 304 704 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1576 704 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1508 704 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1220 704 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1256 704 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1080 704 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1120 704 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1632 704 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1672 704 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1728 704 schtasks.exe -
Processes:
resource yara_rule \driverSaves\driverSavesPerfsvcCrtNetSvc.exe dcrat C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe dcrat \driverSaves\driverSavesPerfsvcCrtNetSvc.exe dcrat C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe dcrat C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe dcrat C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe dcrat C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe dcrat C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe dcrat C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe dcrat C:\Users\Admin\AppData\Local\lsm.exe dcrat C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe dcrat C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe dcrat C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe dcrat C:\Users\Admin\AppData\Local\lsm.exe dcrat C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe dcrat C:\Users\Admin\AppData\Local\Idle.exe dcrat C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe dcrat C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe dcrat C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe dcrat C:\Users\Admin\AppData\Local\lsm.exe dcrat C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe dcrat C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe dcrat C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe dcrat C:\Users\Admin\AppData\Local\csrss.exe dcrat C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe dcrat C:\Users\Admin\AppData\Local\smss.exe dcrat C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe dcrat C:\Users\Admin\AppData\Local\Idle.exe dcrat C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe dcrat C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe dcrat C:\Users\Admin\AppData\Local\lsass.exe dcrat C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe dcrat C:\Users\Admin\AppData\Local\dwm.exe dcrat C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe dcrat C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe dcrat C:\Users\Admin\AppData\Local\sppsvc.exe dcrat C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe dcrat -
Executes dropped EXE 33 IoCs
Processes:
driverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exepid process 2040 driverSavesPerfsvcCrtNetSvc.exe 884 driverSavesPerfsvcCrtNetSvc.exe 1696 driverSavesPerfsvcCrtNetSvc.exe 432 driverSavesPerfsvcCrtNetSvc.exe 1600 driverSavesPerfsvcCrtNetSvc.exe 1560 driverSavesPerfsvcCrtNetSvc.exe 1624 driverSavesPerfsvcCrtNetSvc.exe 1504 driverSavesPerfsvcCrtNetSvc.exe 1676 driverSavesPerfsvcCrtNetSvc.exe 1756 driverSavesPerfsvcCrtNetSvc.exe 1624 driverSavesPerfsvcCrtNetSvc.exe 1832 driverSavesPerfsvcCrtNetSvc.exe 1344 driverSavesPerfsvcCrtNetSvc.exe 1816 driverSavesPerfsvcCrtNetSvc.exe 1228 driverSavesPerfsvcCrtNetSvc.exe 1508 driverSavesPerfsvcCrtNetSvc.exe 1200 driverSavesPerfsvcCrtNetSvc.exe 1528 driverSavesPerfsvcCrtNetSvc.exe 1796 driverSavesPerfsvcCrtNetSvc.exe 1236 driverSavesPerfsvcCrtNetSvc.exe 2036 driverSavesPerfsvcCrtNetSvc.exe 1496 driverSavesPerfsvcCrtNetSvc.exe 1348 driverSavesPerfsvcCrtNetSvc.exe 1924 driverSavesPerfsvcCrtNetSvc.exe 2040 driverSavesPerfsvcCrtNetSvc.exe 732 driverSavesPerfsvcCrtNetSvc.exe 368 driverSavesPerfsvcCrtNetSvc.exe 524 driverSavesPerfsvcCrtNetSvc.exe 1660 driverSavesPerfsvcCrtNetSvc.exe 1676 driverSavesPerfsvcCrtNetSvc.exe 1232 driverSavesPerfsvcCrtNetSvc.exe 1828 driverSavesPerfsvcCrtNetSvc.exe 948 driverSavesPerfsvcCrtNetSvc.exe -
Loads dropped DLL 2 IoCs
Processes:
cmd.exepid process 1704 cmd.exe 1704 cmd.exe -
Adds Run key to start application 2 TTPs 64 IoCs
Processes:
driverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:/Users/Admin/AppData/Local/\\smss.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Idle = "\"C:/Users/Admin/AppData/Local/\\Idle.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Idle = "\"C:/Users/Admin/AppData/Local/\\Idle.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:/Users/Admin/AppData/Local/\\winlogon.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\lsm = "\"C:/Users/Admin/AppData/Local/\\lsm.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Idle = "\"C:/Users/Admin/AppData/Local/\\Idle.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:/Users/Admin/AppData/Local/\\winlogon.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\Idle = "\"C:/Users/Admin/AppData/Local/\\Idle.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\Idle = "\"C:/Users/Admin/AppData/Local/\\Idle.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:/Users/Admin/AppData/Local/\\lsass.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:/Users/Admin/AppData/Local/\\lsass.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:/Users/Admin/AppData/Local/\\lsass.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\conhost = "\"C:/Users/Admin/AppData/Local/\\conhost.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\lsm = "\"C:/Users/Admin/AppData/Local/\\lsm.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:/Users/Admin/AppData/Local/\\dwm.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "\"C:/Users/Admin/AppData/Local/\\WmiPrvSE.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:/Users/Admin/AppData/Local/\\csrss.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsm = "\"C:/Users/Admin/AppData/Local/\\lsm.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\lsm = "\"C:/Users/Admin/AppData/Local/\\lsm.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:/Users/Admin/AppData/Local/\\csrss.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:/Users/Admin/AppData/Local/\\sppsvc.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wininit = "\"C:/Users/Admin/AppData/Local/\\wininit.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsm = "\"C:/Users/Admin/AppData/Local/\\lsm.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "\"C:/Users/Admin/AppData/Local/\\WmiPrvSE.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:/Users/Admin/AppData/Local/\\sppsvc.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:/Users/Admin/AppData/Local/\\dwm.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:/Users/Admin/AppData/Local/\\csrss.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:/Users/Admin/AppData/Local/\\csrss.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:/Users/Admin/AppData/Local/\\csrss.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:/Users/Admin/AppData/Local/\\sppsvc.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:/Users/Admin/AppData/Local/\\smss.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsm = "\"C:/Users/Admin/AppData/Local/\\lsm.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\lsm = "\"C:/Users/Admin/AppData/Local/\\lsm.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:/Users/Admin/AppData/Local/\\smss.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:/Users/Admin/AppData/Local/\\lsass.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Idle = "\"C:/Users/Admin/AppData/Local/\\Idle.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WMIADAP = "\"C:/Users/Admin/AppData/Local/\\WMIADAP.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\services = "\"C:/Users/Admin/AppData/Local/\\services.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\Idle = "\"C:/Users/Admin/AppData/Local/\\Idle.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:/Users/Admin/AppData/Local/\\winlogon.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:/Users/Admin/AppData/Local/\\csrss.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:/Users/Admin/AppData/Local/\\sppsvc.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:/Users/Admin/AppData/Local/\\winlogon.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\wininit = "\"C:/Users/Admin/AppData/Local/\\wininit.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\WMIADAP = "\"C:/Users/Admin/AppData/Local/\\WMIADAP.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsm = "\"C:/Users/Admin/AppData/Local/\\lsm.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\services = "\"C:/Users/Admin/AppData/Local/\\services.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\Idle = "\"C:/Users/Admin/AppData/Local/\\Idle.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:/Users/Admin/AppData/Local/\\winlogon.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\conhost = "\"C:/Users/Admin/AppData/Local/\\conhost.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:/Users/Admin/AppData/Local/\\dwm.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:/Users/Admin/AppData/Local/\\dwm.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:/Users/Admin/AppData/Local/\\sppsvc.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Idle = "\"C:/Users/Admin/AppData/Local/\\Idle.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\lsm = "\"C:/Users/Admin/AppData/Local/\\lsm.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "\"C:/Users/Admin/AppData/Local/\\WmiPrvSE.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:/Users/Admin/AppData/Local/\\csrss.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\Idle = "\"C:/Users/Admin/AppData/Local/\\Idle.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:/Users/Admin/AppData/Local/\\csrss.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsm = "\"C:/Users/Admin/AppData/Local/\\lsm.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:/Users/Admin/AppData/Local/\\sppsvc.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:/Users/Admin/AppData/Local/\\winlogon.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:/Users/Admin/AppData/Local/\\smss.exe\"" driverSavesPerfsvcCrtNetSvc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "\"C:/Users/Admin/AppData/Local/\\WmiPrvSE.exe\"" driverSavesPerfsvcCrtNetSvc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 32 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 368 schtasks.exe 1664 schtasks.exe 1712 schtasks.exe 2036 schtasks.exe 1492 schtasks.exe 1616 schtasks.exe 304 schtasks.exe 1632 schtasks.exe 1728 schtasks.exe 1728 schtasks.exe 1120 schtasks.exe 1340 schtasks.exe 1576 schtasks.exe 1508 schtasks.exe 1220 schtasks.exe 1960 schtasks.exe 1120 schtasks.exe 1672 schtasks.exe 1976 schtasks.exe 1676 schtasks.exe 2008 schtasks.exe 1616 schtasks.exe 1868 schtasks.exe 888 schtasks.exe 1704 schtasks.exe 1256 schtasks.exe 1080 schtasks.exe 1708 schtasks.exe 568 schtasks.exe 1164 schtasks.exe 472 schtasks.exe 884 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 34 IoCs
Processes:
powershell.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exepid process 2000 powershell.exe 2000 powershell.exe 2040 driverSavesPerfsvcCrtNetSvc.exe 884 driverSavesPerfsvcCrtNetSvc.exe 1696 driverSavesPerfsvcCrtNetSvc.exe 432 driverSavesPerfsvcCrtNetSvc.exe 1600 driverSavesPerfsvcCrtNetSvc.exe 1560 driverSavesPerfsvcCrtNetSvc.exe 1624 driverSavesPerfsvcCrtNetSvc.exe 1504 driverSavesPerfsvcCrtNetSvc.exe 1676 driverSavesPerfsvcCrtNetSvc.exe 1756 driverSavesPerfsvcCrtNetSvc.exe 1624 driverSavesPerfsvcCrtNetSvc.exe 1832 driverSavesPerfsvcCrtNetSvc.exe 1344 driverSavesPerfsvcCrtNetSvc.exe 1816 driverSavesPerfsvcCrtNetSvc.exe 1228 driverSavesPerfsvcCrtNetSvc.exe 1508 driverSavesPerfsvcCrtNetSvc.exe 1200 driverSavesPerfsvcCrtNetSvc.exe 1528 driverSavesPerfsvcCrtNetSvc.exe 1796 driverSavesPerfsvcCrtNetSvc.exe 1236 driverSavesPerfsvcCrtNetSvc.exe 2036 driverSavesPerfsvcCrtNetSvc.exe 1496 driverSavesPerfsvcCrtNetSvc.exe 1348 driverSavesPerfsvcCrtNetSvc.exe 1924 driverSavesPerfsvcCrtNetSvc.exe 2040 driverSavesPerfsvcCrtNetSvc.exe 732 driverSavesPerfsvcCrtNetSvc.exe 368 driverSavesPerfsvcCrtNetSvc.exe 524 driverSavesPerfsvcCrtNetSvc.exe 1660 driverSavesPerfsvcCrtNetSvc.exe 1676 driverSavesPerfsvcCrtNetSvc.exe 1232 driverSavesPerfsvcCrtNetSvc.exe 1828 driverSavesPerfsvcCrtNetSvc.exe -
Suspicious use of AdjustPrivilegeToken 34 IoCs
Processes:
powershell.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.exedescription pid process Token: SeDebugPrivilege 2000 powershell.exe Token: SeDebugPrivilege 2040 driverSavesPerfsvcCrtNetSvc.exe Token: SeDebugPrivilege 884 driverSavesPerfsvcCrtNetSvc.exe Token: SeDebugPrivilege 1696 driverSavesPerfsvcCrtNetSvc.exe Token: SeDebugPrivilege 432 driverSavesPerfsvcCrtNetSvc.exe Token: SeDebugPrivilege 1600 driverSavesPerfsvcCrtNetSvc.exe Token: SeDebugPrivilege 1560 driverSavesPerfsvcCrtNetSvc.exe Token: SeDebugPrivilege 1624 driverSavesPerfsvcCrtNetSvc.exe Token: SeDebugPrivilege 1504 driverSavesPerfsvcCrtNetSvc.exe Token: SeDebugPrivilege 1676 driverSavesPerfsvcCrtNetSvc.exe Token: SeDebugPrivilege 1756 driverSavesPerfsvcCrtNetSvc.exe Token: SeDebugPrivilege 1624 driverSavesPerfsvcCrtNetSvc.exe Token: SeDebugPrivilege 1832 driverSavesPerfsvcCrtNetSvc.exe Token: SeDebugPrivilege 1344 driverSavesPerfsvcCrtNetSvc.exe Token: SeDebugPrivilege 1816 driverSavesPerfsvcCrtNetSvc.exe Token: SeDebugPrivilege 1228 driverSavesPerfsvcCrtNetSvc.exe Token: SeDebugPrivilege 1508 driverSavesPerfsvcCrtNetSvc.exe Token: SeDebugPrivilege 1200 driverSavesPerfsvcCrtNetSvc.exe Token: SeDebugPrivilege 1528 driverSavesPerfsvcCrtNetSvc.exe Token: SeDebugPrivilege 1796 driverSavesPerfsvcCrtNetSvc.exe Token: SeDebugPrivilege 1236 driverSavesPerfsvcCrtNetSvc.exe Token: SeDebugPrivilege 2036 driverSavesPerfsvcCrtNetSvc.exe Token: SeDebugPrivilege 1496 driverSavesPerfsvcCrtNetSvc.exe Token: SeDebugPrivilege 1348 driverSavesPerfsvcCrtNetSvc.exe Token: SeDebugPrivilege 1924 driverSavesPerfsvcCrtNetSvc.exe Token: SeDebugPrivilege 2040 driverSavesPerfsvcCrtNetSvc.exe Token: SeDebugPrivilege 732 driverSavesPerfsvcCrtNetSvc.exe Token: SeDebugPrivilege 368 driverSavesPerfsvcCrtNetSvc.exe Token: SeDebugPrivilege 524 driverSavesPerfsvcCrtNetSvc.exe Token: SeDebugPrivilege 1660 driverSavesPerfsvcCrtNetSvc.exe Token: SeDebugPrivilege 1676 driverSavesPerfsvcCrtNetSvc.exe Token: SeDebugPrivilege 1232 driverSavesPerfsvcCrtNetSvc.exe Token: SeDebugPrivilege 1828 driverSavesPerfsvcCrtNetSvc.exe Token: SeDebugPrivilege 948 driverSavesPerfsvcCrtNetSvc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
04a31d76_LlMk5PvSaq.execmd.exeWScript.execmd.exedriverSavesPerfsvcCrtNetSvc.execmd.exedriverSavesPerfsvcCrtNetSvc.execmd.exedriverSavesPerfsvcCrtNetSvc.exedriverSavesPerfsvcCrtNetSvc.execmd.exedriverSavesPerfsvcCrtNetSvc.execmd.exedescription pid process target process PID 916 wrote to memory of 1812 916 04a31d76_LlMk5PvSaq.exe WScript.exe PID 916 wrote to memory of 1812 916 04a31d76_LlMk5PvSaq.exe WScript.exe PID 916 wrote to memory of 1812 916 04a31d76_LlMk5PvSaq.exe WScript.exe PID 916 wrote to memory of 1812 916 04a31d76_LlMk5PvSaq.exe WScript.exe PID 916 wrote to memory of 1168 916 04a31d76_LlMk5PvSaq.exe cmd.exe PID 916 wrote to memory of 1168 916 04a31d76_LlMk5PvSaq.exe cmd.exe PID 916 wrote to memory of 1168 916 04a31d76_LlMk5PvSaq.exe cmd.exe PID 916 wrote to memory of 1168 916 04a31d76_LlMk5PvSaq.exe cmd.exe PID 1168 wrote to memory of 2000 1168 cmd.exe powershell.exe PID 1168 wrote to memory of 2000 1168 cmd.exe powershell.exe PID 1168 wrote to memory of 2000 1168 cmd.exe powershell.exe PID 1168 wrote to memory of 2000 1168 cmd.exe powershell.exe PID 1812 wrote to memory of 1704 1812 WScript.exe cmd.exe PID 1812 wrote to memory of 1704 1812 WScript.exe cmd.exe PID 1812 wrote to memory of 1704 1812 WScript.exe cmd.exe PID 1812 wrote to memory of 1704 1812 WScript.exe cmd.exe PID 1704 wrote to memory of 2040 1704 cmd.exe driverSavesPerfsvcCrtNetSvc.exe PID 1704 wrote to memory of 2040 1704 cmd.exe driverSavesPerfsvcCrtNetSvc.exe PID 1704 wrote to memory of 2040 1704 cmd.exe driverSavesPerfsvcCrtNetSvc.exe PID 1704 wrote to memory of 2040 1704 cmd.exe driverSavesPerfsvcCrtNetSvc.exe PID 2040 wrote to memory of 1612 2040 driverSavesPerfsvcCrtNetSvc.exe cmd.exe PID 2040 wrote to memory of 1612 2040 driverSavesPerfsvcCrtNetSvc.exe cmd.exe PID 2040 wrote to memory of 1612 2040 driverSavesPerfsvcCrtNetSvc.exe cmd.exe PID 1612 wrote to memory of 1720 1612 cmd.exe chcp.com PID 1612 wrote to memory of 1720 1612 cmd.exe chcp.com PID 1612 wrote to memory of 1720 1612 cmd.exe chcp.com PID 1612 wrote to memory of 1728 1612 cmd.exe w32tm.exe PID 1612 wrote to memory of 1728 1612 cmd.exe w32tm.exe PID 1612 wrote to memory of 1728 1612 cmd.exe w32tm.exe PID 1612 wrote to memory of 884 1612 cmd.exe driverSavesPerfsvcCrtNetSvc.exe PID 1612 wrote to memory of 884 1612 cmd.exe driverSavesPerfsvcCrtNetSvc.exe PID 1612 wrote to memory of 884 1612 cmd.exe driverSavesPerfsvcCrtNetSvc.exe PID 884 wrote to memory of 1040 884 driverSavesPerfsvcCrtNetSvc.exe cmd.exe PID 884 wrote to memory of 1040 884 driverSavesPerfsvcCrtNetSvc.exe cmd.exe PID 884 wrote to memory of 1040 884 driverSavesPerfsvcCrtNetSvc.exe cmd.exe PID 1040 wrote to memory of 1640 1040 cmd.exe chcp.com PID 1040 wrote to memory of 1640 1040 cmd.exe chcp.com PID 1040 wrote to memory of 1640 1040 cmd.exe chcp.com PID 1040 wrote to memory of 820 1040 cmd.exe w32tm.exe PID 1040 wrote to memory of 820 1040 cmd.exe w32tm.exe PID 1040 wrote to memory of 820 1040 cmd.exe w32tm.exe PID 1040 wrote to memory of 1696 1040 cmd.exe driverSavesPerfsvcCrtNetSvc.exe PID 1040 wrote to memory of 1696 1040 cmd.exe driverSavesPerfsvcCrtNetSvc.exe PID 1040 wrote to memory of 1696 1040 cmd.exe driverSavesPerfsvcCrtNetSvc.exe PID 1696 wrote to memory of 432 1696 driverSavesPerfsvcCrtNetSvc.exe driverSavesPerfsvcCrtNetSvc.exe PID 1696 wrote to memory of 432 1696 driverSavesPerfsvcCrtNetSvc.exe driverSavesPerfsvcCrtNetSvc.exe PID 1696 wrote to memory of 432 1696 driverSavesPerfsvcCrtNetSvc.exe driverSavesPerfsvcCrtNetSvc.exe PID 432 wrote to memory of 1492 432 driverSavesPerfsvcCrtNetSvc.exe cmd.exe PID 432 wrote to memory of 1492 432 driverSavesPerfsvcCrtNetSvc.exe cmd.exe PID 432 wrote to memory of 1492 432 driverSavesPerfsvcCrtNetSvc.exe cmd.exe PID 1492 wrote to memory of 1200 1492 cmd.exe chcp.com PID 1492 wrote to memory of 1200 1492 cmd.exe chcp.com PID 1492 wrote to memory of 1200 1492 cmd.exe chcp.com PID 1492 wrote to memory of 2020 1492 cmd.exe w32tm.exe PID 1492 wrote to memory of 2020 1492 cmd.exe w32tm.exe PID 1492 wrote to memory of 2020 1492 cmd.exe w32tm.exe PID 1492 wrote to memory of 1600 1492 cmd.exe driverSavesPerfsvcCrtNetSvc.exe PID 1492 wrote to memory of 1600 1492 cmd.exe driverSavesPerfsvcCrtNetSvc.exe PID 1492 wrote to memory of 1600 1492 cmd.exe driverSavesPerfsvcCrtNetSvc.exe PID 1600 wrote to memory of 528 1600 driverSavesPerfsvcCrtNetSvc.exe cmd.exe PID 1600 wrote to memory of 528 1600 driverSavesPerfsvcCrtNetSvc.exe cmd.exe PID 1600 wrote to memory of 528 1600 driverSavesPerfsvcCrtNetSvc.exe cmd.exe PID 528 wrote to memory of 1072 528 cmd.exe chcp.com PID 528 wrote to memory of 1072 528 cmd.exe chcp.com
Processes
-
C:\Users\Admin\AppData\Local\Temp\04a31d76_LlMk5PvSaq.exe"C:\Users\Admin\AppData\Local\Temp\04a31d76_LlMk5PvSaq.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\driverSaves\LHhDtlPF.vbe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\driverSaves\elBs4FCCK.bat" "3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe"C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe"4⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\JJRpXHN33g.bat"5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\chcp.comchcp 650016⤵
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵
-
C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe"C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe"6⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Rnocy2rMcb.bat"7⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\chcp.comchcp 650018⤵
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:28⤵
-
C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe"C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe"8⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe"C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe"9⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\DeBp8oPoIv.bat"10⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\chcp.comchcp 6500111⤵
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:211⤵
-
C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe"C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe"11⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Hc2n6x8Tcq.bat"12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\chcp.comchcp 6500113⤵
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:213⤵
-
C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe"C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe"13⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\I9KwEXfc45.bat"14⤵
-
C:\Windows\system32\chcp.comchcp 6500115⤵
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:215⤵
-
C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe"C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe"15⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Qh69uwEURv.bat"16⤵
-
C:\Windows\system32\chcp.comchcp 6500117⤵
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:217⤵
-
C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe"C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe"17⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe"C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe"18⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe"C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe"19⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\C8ToKTckhB.bat"20⤵
-
C:\Windows\system32\chcp.comchcp 6500121⤵
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:221⤵
-
C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe"C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe"21⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\3P5V3mfETS.bat"22⤵
-
C:\Windows\system32\chcp.comchcp 6500123⤵
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:223⤵
-
C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe"C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe"23⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\eAa5MmFDAx.bat"24⤵
-
C:\Windows\system32\chcp.comchcp 6500125⤵
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:225⤵
-
C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe"C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe"25⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe"C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe"26⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\8xsSxeEC2g.bat"27⤵
-
C:\Windows\system32\chcp.comchcp 6500128⤵
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:228⤵
-
C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe"C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe"28⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\bMTco4QkHI.bat"29⤵
-
C:\Windows\system32\chcp.comchcp 6500130⤵
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:230⤵
-
C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe"C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe"30⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Cv6iCN25kc.bat"31⤵
-
C:\Windows\system32\chcp.comchcp 6500132⤵
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:232⤵
-
C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe"C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe"32⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\0H35938xRP.bat"33⤵
-
C:\Windows\system32\chcp.comchcp 6500134⤵
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:234⤵
-
C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe"C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe"34⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe"C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe"35⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\mCUumNmcKS.bat"36⤵
-
C:\Windows\system32\chcp.comchcp 6500137⤵
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:237⤵
-
C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe"C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe"37⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe"C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe"38⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe"C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe"39⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe"C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe"40⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe"C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe"41⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe"C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe"42⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe"C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe"43⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\r8vJ7OaP2r.bat"44⤵
-
C:\Windows\system32\chcp.comchcp 6500145⤵
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:245⤵
-
C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe"C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe"45⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\NpMxWjQsjU.bat"46⤵
-
C:\Windows\system32\chcp.comchcp 6500147⤵
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:247⤵
-
C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe"C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe"47⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe"C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe"48⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe"C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe"49⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\YXQfsbFIdG.bat"50⤵
-
C:\Windows\system32\chcp.comchcp 6500151⤵
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:251⤵
-
C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe"C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe"51⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\GWykcdt056.bat"52⤵
-
C:\Windows\system32\chcp.comchcp 6500153⤵
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:253⤵
-
C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe"C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe"53⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe"C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe"54⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\driverSaves\mKLt1agSNSLByUmKEYd.bat" "2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:/Users/Admin/AppData/Local/\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:/Users/Admin/AppData/Local/\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:/Users/Admin/AppData/Local/\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:/Users/Admin/AppData/Local/\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:/Users/Admin/AppData/Local/\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:/Users/Admin/AppData/Local/\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:/Users/Admin/AppData/Local/\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WMIADAP" /sc ONLOGON /tr "'C:/Users/Admin/AppData/Local/\WMIADAP.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:/Users/Admin/AppData/Local/\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:/Users/Admin/AppData/Local/\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:/Users/Admin/AppData/Local/\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:/Users/Admin/AppData/Local/\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:/Users/Admin/AppData/Local/\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:/Users/Admin/AppData/Local/\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:/Users/Admin/AppData/Local/\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:/Users/Admin/AppData/Local/\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:/Users/Admin/AppData/Local/\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:/Users/Admin/AppData/Local/\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:/Users/Admin/AppData/Local/\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:/Users/Admin/AppData/Local/\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:/Users/Admin/AppData/Local/\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:/Users/Admin/AppData/Local/\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:/Users/Admin/AppData/Local/\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:/Users/Admin/AppData/Local/\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:/Users/Admin/AppData/Local/\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:/Users/Admin/AppData/Local/\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:/Users/Admin/AppData/Local/\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:/Users/Admin/AppData/Local/\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:/Users/Admin/AppData/Local/\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:/Users/Admin/AppData/Local/\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:/Users/Admin/AppData/Local/\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:/Users/Admin/AppData/Local/\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\0a1fd5f707cd16ea89afd3d6db52b2da58214a6cMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Local\101b941d020240259ca4912829b53995ad543df6MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Local\101b941d020240259ca4912829b53995ad543df6MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Local\101b941d020240259ca4912829b53995ad543df6MD5
44518ebeae9d5faf4265f2d1e14591e7
SHA180e49b651f0de50d2d87f1e58558568b9ec76a0f
SHA25619493e088ee78459d18416afccbf3d387a31e8c17b5dfa7322cac0079649e6d0
SHA512938768ae42467e06b3532e2914df4c4a2022d272154c15b62979c13c6d50652df964157744ae7d232a92b3ea94da94105f35c34e5e96be33f3a989b8153cfde1
-
C:\Users\Admin\AppData\Local\6203df4a6bafc7c328ee7f6f8ca0a8a838a8a1b9MD5
1e9cc3a18627ff9b79de8399740d3185
SHA19c94f2c8972f77f4e823fe20db81ccc8e7549b1d
SHA2560edb8b1e2ac3bbdc12887d80a23c6967e2057d09567f11ed113b4498fad50230
SHA512fc372d74afc0def7b0485d9c888b0e3aedc4b1a5e692781a136301506b23576e91a7467187a14e7751be0c6d6e7291ffdcff1d24872fa9488d0c2960244522c6
-
C:\Users\Admin\AppData\Local\69ddcba757bf72f7d36c464c71f42baab150b2b9MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Local\6cb0b6c459d5d3455a3da700e713f2e2529862ffMD5
79902ea12e06e3d0a891c6a67ffd32dd
SHA1b824d724c7c1c8ec7786f8bd1c2adad85ad6dc94
SHA256f72a444dbe163d00cdf34dc86ac9268499b30aa3c8e4750a81cbb4cd053e6ed0
SHA512989d51f3ec20ec81f2fe18b968483414c8fb6e437ae9015dd3541e743e3eb60a50bd76126082fea960a18700527b3342a7d110bbcf3b6b79b6020dc46cee2d74
-
C:\Users\Admin\AppData\Local\6ccacd8608530fba3a93e87ae2225c7032aa18c1MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Local\6ccacd8608530fba3a93e87ae2225c7032aa18c1MD5
b437fb4868d53cff1f2007ebf8f8330e
SHA13adcd88adc1618636a72e5b209bacbe4e1f8af9a
SHA25615159df12887f818a10d6e773ccc41a63a477a69f9e6b74d7e6bfdad756c0f89
SHA5128f15c48c19f0bcf463eea6852ccf3edcb631c5d117c3d4f6f454d5f148845be8d725aa62891adfbbd9163f45821e95cb79d6b28e01f49b8b3b0942a9875cab48
-
C:\Users\Admin\AppData\Local\886983d96e3d3e31032c679b2d4ea91b6c05afefMD5
9fa5a2b74d87f4e402de47c22d25a621
SHA1eda097f62bb573ec1e0f0a831bee1047290c44c8
SHA256417189ab6bb90ebf13f14587957907328a61efedd24815bd3c568d0c6caa69ea
SHA512ce582b1388de2c1c773e17cb2e8da07cd194cff84477c1b6da5e2a2d45ac6ef1a269e9f55f8e9f0b04aeb2a4df45d9efd338f1cf00c6f9455a61b13c3e64bbd5
-
C:\Users\Admin\AppData\Local\Idle.exeMD5
54f65064c78656d0f9d8ea838682481e
SHA12d0700c2ed2e8bdc7f3017f9630c7a8104108e71
SHA256f9167e3b80dd8d2047ecc695558cffaf5871d48659dd68f9e49c7b2709f6acad
SHA5128b35076cca8e83de3cfe6c51eeff194e37fcf773af948a45767ccede36d4efea2bbc65b127305f8467b74479549006a00518bb3ca42560300342e9c19c1a7f12
-
C:\Users\Admin\AppData\Local\Idle.exeMD5
54f65064c78656d0f9d8ea838682481e
SHA12d0700c2ed2e8bdc7f3017f9630c7a8104108e71
SHA256f9167e3b80dd8d2047ecc695558cffaf5871d48659dd68f9e49c7b2709f6acad
SHA5128b35076cca8e83de3cfe6c51eeff194e37fcf773af948a45767ccede36d4efea2bbc65b127305f8467b74479549006a00518bb3ca42560300342e9c19c1a7f12
-
C:\Users\Admin\AppData\Local\Temp\0H35938xRP.batMD5
75fc9d2371871a2897b3d8fcbfc1af98
SHA1bf936453a2ff9fb9c1bd860d7bcc544460f6930c
SHA256c2c01a9aa48e774a40d6e993717b1b043c4d45a17e32a7a5939d398fe82098e0
SHA512b54b1446107c7de34ca43d206675b648ac5d19324424a78917bd000cb413aeff34dc0215d97194fed3093a77e6c271a09247e8511f1f03489cef99460a213df6
-
C:\Users\Admin\AppData\Local\Temp\3P5V3mfETS.batMD5
511c996467930592f98c4b3346ceb63f
SHA1f9277ced86fd0af817e7e881bf4f1044d6850f90
SHA256fef7d64711544a71f04c5ac6b4f9e6774a9d683a96ce99880406ccf19a20e924
SHA512514721a3d2f3682467e3ec248e19e1b7b950c4393e120ee45b480d6bd7c49b79f00154fa6161bc7e96a43be75846eb159897df29ad7906ecacfca5605ad32613
-
C:\Users\Admin\AppData\Local\Temp\8xsSxeEC2g.batMD5
81f831d20a5f7920cd4c3fef4d0e754e
SHA1206d9c7468f5896f623e4a3c335fee0ec9f0e159
SHA256bdfd325976582001e892b79dfbe0d5a3d754649f79917b97eefc0c9e1d12be76
SHA512415203f429cf136db90a988a083f74ba131423450cb05afc43b8fffaeeb7f8c039798e245ca9e38f4864610b761e3cff891127b7360a08c01bc69e27b4f562dc
-
C:\Users\Admin\AppData\Local\Temp\C8ToKTckhB.batMD5
fa43121cf4965854241bf0f069a8fd18
SHA1c700b55f55a7d21b7dbb5bf61416f1edb77fde02
SHA256a1e0523b85a96a4372e7f156d60616cf2ca75423cb3bcb832d3cfe806746e287
SHA5127118a152f3d9daf62433423e6ad9a3cdae49106bd8074fe2f0e39a8fcadb6ef8fb42321d60808e54d893a8a36db9ecc67360db479e6ec088e1613ed938fe9614
-
C:\Users\Admin\AppData\Local\Temp\Cv6iCN25kc.batMD5
e3ea432017eab22ceec52e6bf1a89bf2
SHA1b369c83f775ac95b0b1a5e51037c0d29b8491aa7
SHA256d71d3cf4d3d67f86e7b623f0d2179833ca6f85b50c8104e556947ab9b13f3df1
SHA51251b6a3b3240810e61931ee1eb0e76dbba34a4882873ea00e48855768749022fbdf1a01fba0f70558f0dee9552978b1f976de0da9fb56bbc5e2544a50fc172231
-
C:\Users\Admin\AppData\Local\Temp\DeBp8oPoIv.batMD5
891b3361452c0313ebdc8aa3014da5c5
SHA1f65533d86df336a3f346b4376b09573a8ecf3fb9
SHA2564aa85ed0ffcd8fe1e828e619fbd756264f4062334fd53bd49d7e1fdb0cc53dc4
SHA512b1fd3a8a35b7b24c54ea639fde5346278f218e8db648653819efd18c4bfe7f3fda1aba8cdbdc9d0908cf58270e4544f004275a2c8dc9ab0bc635ffe1037990f3
-
C:\Users\Admin\AppData\Local\Temp\Hc2n6x8Tcq.batMD5
9c70a62309bc073d654eb9f7736171d2
SHA106350b013b2f59a322e2a408cb6619379b38e092
SHA256d707252675e022a8f5cb571c8f7701b29f258f75e7d0d29d10a3cc2b4ba20916
SHA512102ecae4eb6c28b61f70a947ab85272b3bcdb4b94937834b12cd22dda514ce2f6a6d55d05f4b6023ce3637ddfb95f3743918ad114e7974ba24b4edcfce23bd40
-
C:\Users\Admin\AppData\Local\Temp\I9KwEXfc45.batMD5
efc52f256312568a310ee73263f15709
SHA1d44818c598f29b80862b1ec3ea13d2ba0cd086ab
SHA25667852976885f29e559d0f110de62a0429199c11a1e81b4f8456c07bedc4c21d8
SHA512af72e657fc327fd46666386b237fcd46a1fef5eb8d5cbdea614576209f334265306afdf188cddc4201059c36637c8f897a2fc74ae57d893c2be0efb619831e83
-
C:\Users\Admin\AppData\Local\Temp\JJRpXHN33g.batMD5
9b591548fabecad1136dc32d86dfb7d7
SHA1544b68652758cfe57cd631e77eafd72d76ebc472
SHA2567dcbc9b0674800cd5d3e92894307115136c7ec898e5439dd815516269845255c
SHA51255b3ad2d9b082d761deb81f2638f324791156aa96231bd9c23016aa75ededff4db018de3c65c9d32182410f4ef50b1bda44b68c22608c0fcb1e16f5ddcb7855f
-
C:\Users\Admin\AppData\Local\Temp\Qh69uwEURv.batMD5
f7f386ffb28d40baec173f3c2db780a7
SHA1ab37125d61afbca54a753e664d77b0abceea9a27
SHA2564e3aef6a39e0bb27db23830b5314b36f8409879e3a846b724dbd132acbb5c019
SHA51204bee048b72a7b928686a487d595db7caa64fb2081a35df856246647b9dae695b840034ee9f46c7db4110c60cc60eb7a6c456a358090440b77f0c958a420877f
-
C:\Users\Admin\AppData\Local\Temp\Rnocy2rMcb.batMD5
3c52b6dd997cdd647403c7d7d1f9b14f
SHA1a339060efefbf61d1aa042331d2a7af7fc95de73
SHA2560bdffeeed4697792b4fea497a8b3923b96794828f159f489dfbc99b6f2f277d2
SHA512c147eb8d30351b6bd5de1c7540c3be9d37e045514883e8427c6f8734cc6a7b7d757bd89e59e2e035563a143ea712ea3432730c5461f8247af2a649d297345d91
-
C:\Users\Admin\AppData\Local\Temp\bMTco4QkHI.batMD5
3c45ee45970236112f994524846a578c
SHA165877336047416d4d16cf685d8567ce8e8d02e8c
SHA25668b8d4fe770b2061c7b60a2bd89739e7b14ef89a18b8188995dd232dd3944aa6
SHA51257a9746b6ca9d24873e8ee1eea1209951695fdd30a95b9370f1322e91c2fe132398a32b5512176a5e5fc585d63110915a28a7ee44e38196b0e796ed344e6a581
-
C:\Users\Admin\AppData\Local\Temp\eAa5MmFDAx.batMD5
cb02e0a622b78724c1645f01b1f51ce0
SHA1542316620ff733e2d6df33eb26d3f24bbed37901
SHA2567c11fe7a0ac8ee13593d7112358652e5cb8a77cb2fc701a7ce1e8952982a200f
SHA5123e0a7a76da3f8e76972c7f40ca0a433d3f84d1611c58076102b60b133c35b9de1728dfd9cb9889005d31f556ffdac0026aac18dd30ac54f91f4cc3c38c1ad435
-
C:\Users\Admin\AppData\Local\Temp\mCUumNmcKS.batMD5
5cd24375dbcbfb54199e232c6b58cc5e
SHA1ecfc8fdeac7113455021bd124835cb56406cd244
SHA2569a7d6e773fec54040e5f09e18abfa71d86ee28885eedb8995920539a56c3cad5
SHA5123ee4e82fcadf3ea07dda55aaaf715490b9f1e357c93553bb6b79346159b27999c878df447dccbb0d63f28cbae652feed6681b7df2d8ad7673137c9f7d4475d57
-
C:\Users\Admin\AppData\Local\csrss.exeMD5
54f65064c78656d0f9d8ea838682481e
SHA12d0700c2ed2e8bdc7f3017f9630c7a8104108e71
SHA256f9167e3b80dd8d2047ecc695558cffaf5871d48659dd68f9e49c7b2709f6acad
SHA5128b35076cca8e83de3cfe6c51eeff194e37fcf773af948a45767ccede36d4efea2bbc65b127305f8467b74479549006a00518bb3ca42560300342e9c19c1a7f12
-
C:\Users\Admin\AppData\Local\dwm.exeMD5
54f65064c78656d0f9d8ea838682481e
SHA12d0700c2ed2e8bdc7f3017f9630c7a8104108e71
SHA256f9167e3b80dd8d2047ecc695558cffaf5871d48659dd68f9e49c7b2709f6acad
SHA5128b35076cca8e83de3cfe6c51eeff194e37fcf773af948a45767ccede36d4efea2bbc65b127305f8467b74479549006a00518bb3ca42560300342e9c19c1a7f12
-
C:\Users\Admin\AppData\Local\lsass.exeMD5
3e69ce980e5b0deff3495e608660aab6
SHA130a13650cdd32fc7c69eca23c5d2a02941e43b8a
SHA2567657d97b6106fe89e4dcd466f6cc295479a80ad83d88f3d4eb27f309358c4d58
SHA5128ada35829ae671a454c222b7b777ac37d6fae15a69d822e042caadba14eb00a5b4cc08abc6121f4594c78c92f94aeb7a2bc9cd352334aa90e6be59740d4c77f3
-
C:\Users\Admin\AppData\Local\lsm.exeMD5
54f65064c78656d0f9d8ea838682481e
SHA12d0700c2ed2e8bdc7f3017f9630c7a8104108e71
SHA256f9167e3b80dd8d2047ecc695558cffaf5871d48659dd68f9e49c7b2709f6acad
SHA5128b35076cca8e83de3cfe6c51eeff194e37fcf773af948a45767ccede36d4efea2bbc65b127305f8467b74479549006a00518bb3ca42560300342e9c19c1a7f12
-
C:\Users\Admin\AppData\Local\lsm.exeMD5
54f65064c78656d0f9d8ea838682481e
SHA12d0700c2ed2e8bdc7f3017f9630c7a8104108e71
SHA256f9167e3b80dd8d2047ecc695558cffaf5871d48659dd68f9e49c7b2709f6acad
SHA5128b35076cca8e83de3cfe6c51eeff194e37fcf773af948a45767ccede36d4efea2bbc65b127305f8467b74479549006a00518bb3ca42560300342e9c19c1a7f12
-
C:\Users\Admin\AppData\Local\lsm.exeMD5
54f65064c78656d0f9d8ea838682481e
SHA12d0700c2ed2e8bdc7f3017f9630c7a8104108e71
SHA256f9167e3b80dd8d2047ecc695558cffaf5871d48659dd68f9e49c7b2709f6acad
SHA5128b35076cca8e83de3cfe6c51eeff194e37fcf773af948a45767ccede36d4efea2bbc65b127305f8467b74479549006a00518bb3ca42560300342e9c19c1a7f12
-
C:\Users\Admin\AppData\Local\smss.exeMD5
54f65064c78656d0f9d8ea838682481e
SHA12d0700c2ed2e8bdc7f3017f9630c7a8104108e71
SHA256f9167e3b80dd8d2047ecc695558cffaf5871d48659dd68f9e49c7b2709f6acad
SHA5128b35076cca8e83de3cfe6c51eeff194e37fcf773af948a45767ccede36d4efea2bbc65b127305f8467b74479549006a00518bb3ca42560300342e9c19c1a7f12
-
C:\Users\Admin\AppData\Local\sppsvc.exeMD5
54f65064c78656d0f9d8ea838682481e
SHA12d0700c2ed2e8bdc7f3017f9630c7a8104108e71
SHA256f9167e3b80dd8d2047ecc695558cffaf5871d48659dd68f9e49c7b2709f6acad
SHA5128b35076cca8e83de3cfe6c51eeff194e37fcf773af948a45767ccede36d4efea2bbc65b127305f8467b74479549006a00518bb3ca42560300342e9c19c1a7f12
-
C:\driverSaves\LHhDtlPF.vbeMD5
d54777130b957cce5fd98b014f22692b
SHA1d4b1c5213c32b5d50535f5532a68fce906cd34a6
SHA256b23e310e937017998d80569f06c4c2de1098bb8a313167332036ec4f77d75957
SHA5120193afdbf04ae421a44133c41576e0bf719e9ea2c3044d7f75c0dc59bbe9565c04ebe942ccf5f4fea123b4073c51a51b8319b3b85ae5b683e38ae51e14f25232
-
C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exeMD5
54f65064c78656d0f9d8ea838682481e
SHA12d0700c2ed2e8bdc7f3017f9630c7a8104108e71
SHA256f9167e3b80dd8d2047ecc695558cffaf5871d48659dd68f9e49c7b2709f6acad
SHA5128b35076cca8e83de3cfe6c51eeff194e37fcf773af948a45767ccede36d4efea2bbc65b127305f8467b74479549006a00518bb3ca42560300342e9c19c1a7f12
-
C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exeMD5
54f65064c78656d0f9d8ea838682481e
SHA12d0700c2ed2e8bdc7f3017f9630c7a8104108e71
SHA256f9167e3b80dd8d2047ecc695558cffaf5871d48659dd68f9e49c7b2709f6acad
SHA5128b35076cca8e83de3cfe6c51eeff194e37fcf773af948a45767ccede36d4efea2bbc65b127305f8467b74479549006a00518bb3ca42560300342e9c19c1a7f12
-
C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exeMD5
54f65064c78656d0f9d8ea838682481e
SHA12d0700c2ed2e8bdc7f3017f9630c7a8104108e71
SHA256f9167e3b80dd8d2047ecc695558cffaf5871d48659dd68f9e49c7b2709f6acad
SHA5128b35076cca8e83de3cfe6c51eeff194e37fcf773af948a45767ccede36d4efea2bbc65b127305f8467b74479549006a00518bb3ca42560300342e9c19c1a7f12
-
C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exeMD5
54f65064c78656d0f9d8ea838682481e
SHA12d0700c2ed2e8bdc7f3017f9630c7a8104108e71
SHA256f9167e3b80dd8d2047ecc695558cffaf5871d48659dd68f9e49c7b2709f6acad
SHA5128b35076cca8e83de3cfe6c51eeff194e37fcf773af948a45767ccede36d4efea2bbc65b127305f8467b74479549006a00518bb3ca42560300342e9c19c1a7f12
-
C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exeMD5
54f65064c78656d0f9d8ea838682481e
SHA12d0700c2ed2e8bdc7f3017f9630c7a8104108e71
SHA256f9167e3b80dd8d2047ecc695558cffaf5871d48659dd68f9e49c7b2709f6acad
SHA5128b35076cca8e83de3cfe6c51eeff194e37fcf773af948a45767ccede36d4efea2bbc65b127305f8467b74479549006a00518bb3ca42560300342e9c19c1a7f12
-
C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exeMD5
54f65064c78656d0f9d8ea838682481e
SHA12d0700c2ed2e8bdc7f3017f9630c7a8104108e71
SHA256f9167e3b80dd8d2047ecc695558cffaf5871d48659dd68f9e49c7b2709f6acad
SHA5128b35076cca8e83de3cfe6c51eeff194e37fcf773af948a45767ccede36d4efea2bbc65b127305f8467b74479549006a00518bb3ca42560300342e9c19c1a7f12
-
C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exeMD5
54f65064c78656d0f9d8ea838682481e
SHA12d0700c2ed2e8bdc7f3017f9630c7a8104108e71
SHA256f9167e3b80dd8d2047ecc695558cffaf5871d48659dd68f9e49c7b2709f6acad
SHA5128b35076cca8e83de3cfe6c51eeff194e37fcf773af948a45767ccede36d4efea2bbc65b127305f8467b74479549006a00518bb3ca42560300342e9c19c1a7f12
-
C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exeMD5
54f65064c78656d0f9d8ea838682481e
SHA12d0700c2ed2e8bdc7f3017f9630c7a8104108e71
SHA256f9167e3b80dd8d2047ecc695558cffaf5871d48659dd68f9e49c7b2709f6acad
SHA5128b35076cca8e83de3cfe6c51eeff194e37fcf773af948a45767ccede36d4efea2bbc65b127305f8467b74479549006a00518bb3ca42560300342e9c19c1a7f12
-
C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exeMD5
54f65064c78656d0f9d8ea838682481e
SHA12d0700c2ed2e8bdc7f3017f9630c7a8104108e71
SHA256f9167e3b80dd8d2047ecc695558cffaf5871d48659dd68f9e49c7b2709f6acad
SHA5128b35076cca8e83de3cfe6c51eeff194e37fcf773af948a45767ccede36d4efea2bbc65b127305f8467b74479549006a00518bb3ca42560300342e9c19c1a7f12
-
C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exeMD5
54f65064c78656d0f9d8ea838682481e
SHA12d0700c2ed2e8bdc7f3017f9630c7a8104108e71
SHA256f9167e3b80dd8d2047ecc695558cffaf5871d48659dd68f9e49c7b2709f6acad
SHA5128b35076cca8e83de3cfe6c51eeff194e37fcf773af948a45767ccede36d4efea2bbc65b127305f8467b74479549006a00518bb3ca42560300342e9c19c1a7f12
-
C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exeMD5
54f65064c78656d0f9d8ea838682481e
SHA12d0700c2ed2e8bdc7f3017f9630c7a8104108e71
SHA256f9167e3b80dd8d2047ecc695558cffaf5871d48659dd68f9e49c7b2709f6acad
SHA5128b35076cca8e83de3cfe6c51eeff194e37fcf773af948a45767ccede36d4efea2bbc65b127305f8467b74479549006a00518bb3ca42560300342e9c19c1a7f12
-
C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exeMD5
54f65064c78656d0f9d8ea838682481e
SHA12d0700c2ed2e8bdc7f3017f9630c7a8104108e71
SHA256f9167e3b80dd8d2047ecc695558cffaf5871d48659dd68f9e49c7b2709f6acad
SHA5128b35076cca8e83de3cfe6c51eeff194e37fcf773af948a45767ccede36d4efea2bbc65b127305f8467b74479549006a00518bb3ca42560300342e9c19c1a7f12
-
C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exeMD5
54f65064c78656d0f9d8ea838682481e
SHA12d0700c2ed2e8bdc7f3017f9630c7a8104108e71
SHA256f9167e3b80dd8d2047ecc695558cffaf5871d48659dd68f9e49c7b2709f6acad
SHA5128b35076cca8e83de3cfe6c51eeff194e37fcf773af948a45767ccede36d4efea2bbc65b127305f8467b74479549006a00518bb3ca42560300342e9c19c1a7f12
-
C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exeMD5
54f65064c78656d0f9d8ea838682481e
SHA12d0700c2ed2e8bdc7f3017f9630c7a8104108e71
SHA256f9167e3b80dd8d2047ecc695558cffaf5871d48659dd68f9e49c7b2709f6acad
SHA5128b35076cca8e83de3cfe6c51eeff194e37fcf773af948a45767ccede36d4efea2bbc65b127305f8467b74479549006a00518bb3ca42560300342e9c19c1a7f12
-
C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exeMD5
54f65064c78656d0f9d8ea838682481e
SHA12d0700c2ed2e8bdc7f3017f9630c7a8104108e71
SHA256f9167e3b80dd8d2047ecc695558cffaf5871d48659dd68f9e49c7b2709f6acad
SHA5128b35076cca8e83de3cfe6c51eeff194e37fcf773af948a45767ccede36d4efea2bbc65b127305f8467b74479549006a00518bb3ca42560300342e9c19c1a7f12
-
C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exeMD5
54f65064c78656d0f9d8ea838682481e
SHA12d0700c2ed2e8bdc7f3017f9630c7a8104108e71
SHA256f9167e3b80dd8d2047ecc695558cffaf5871d48659dd68f9e49c7b2709f6acad
SHA5128b35076cca8e83de3cfe6c51eeff194e37fcf773af948a45767ccede36d4efea2bbc65b127305f8467b74479549006a00518bb3ca42560300342e9c19c1a7f12
-
C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exeMD5
54f65064c78656d0f9d8ea838682481e
SHA12d0700c2ed2e8bdc7f3017f9630c7a8104108e71
SHA256f9167e3b80dd8d2047ecc695558cffaf5871d48659dd68f9e49c7b2709f6acad
SHA5128b35076cca8e83de3cfe6c51eeff194e37fcf773af948a45767ccede36d4efea2bbc65b127305f8467b74479549006a00518bb3ca42560300342e9c19c1a7f12
-
C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exeMD5
54f65064c78656d0f9d8ea838682481e
SHA12d0700c2ed2e8bdc7f3017f9630c7a8104108e71
SHA256f9167e3b80dd8d2047ecc695558cffaf5871d48659dd68f9e49c7b2709f6acad
SHA5128b35076cca8e83de3cfe6c51eeff194e37fcf773af948a45767ccede36d4efea2bbc65b127305f8467b74479549006a00518bb3ca42560300342e9c19c1a7f12
-
C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exeMD5
54f65064c78656d0f9d8ea838682481e
SHA12d0700c2ed2e8bdc7f3017f9630c7a8104108e71
SHA256f9167e3b80dd8d2047ecc695558cffaf5871d48659dd68f9e49c7b2709f6acad
SHA5128b35076cca8e83de3cfe6c51eeff194e37fcf773af948a45767ccede36d4efea2bbc65b127305f8467b74479549006a00518bb3ca42560300342e9c19c1a7f12
-
C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exeMD5
54f65064c78656d0f9d8ea838682481e
SHA12d0700c2ed2e8bdc7f3017f9630c7a8104108e71
SHA256f9167e3b80dd8d2047ecc695558cffaf5871d48659dd68f9e49c7b2709f6acad
SHA5128b35076cca8e83de3cfe6c51eeff194e37fcf773af948a45767ccede36d4efea2bbc65b127305f8467b74479549006a00518bb3ca42560300342e9c19c1a7f12
-
C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exeMD5
54f65064c78656d0f9d8ea838682481e
SHA12d0700c2ed2e8bdc7f3017f9630c7a8104108e71
SHA256f9167e3b80dd8d2047ecc695558cffaf5871d48659dd68f9e49c7b2709f6acad
SHA5128b35076cca8e83de3cfe6c51eeff194e37fcf773af948a45767ccede36d4efea2bbc65b127305f8467b74479549006a00518bb3ca42560300342e9c19c1a7f12
-
C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exeMD5
54f65064c78656d0f9d8ea838682481e
SHA12d0700c2ed2e8bdc7f3017f9630c7a8104108e71
SHA256f9167e3b80dd8d2047ecc695558cffaf5871d48659dd68f9e49c7b2709f6acad
SHA5128b35076cca8e83de3cfe6c51eeff194e37fcf773af948a45767ccede36d4efea2bbc65b127305f8467b74479549006a00518bb3ca42560300342e9c19c1a7f12
-
C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exeMD5
54f65064c78656d0f9d8ea838682481e
SHA12d0700c2ed2e8bdc7f3017f9630c7a8104108e71
SHA256f9167e3b80dd8d2047ecc695558cffaf5871d48659dd68f9e49c7b2709f6acad
SHA5128b35076cca8e83de3cfe6c51eeff194e37fcf773af948a45767ccede36d4efea2bbc65b127305f8467b74479549006a00518bb3ca42560300342e9c19c1a7f12
-
C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exeMD5
54f65064c78656d0f9d8ea838682481e
SHA12d0700c2ed2e8bdc7f3017f9630c7a8104108e71
SHA256f9167e3b80dd8d2047ecc695558cffaf5871d48659dd68f9e49c7b2709f6acad
SHA5128b35076cca8e83de3cfe6c51eeff194e37fcf773af948a45767ccede36d4efea2bbc65b127305f8467b74479549006a00518bb3ca42560300342e9c19c1a7f12
-
C:\driverSaves\driverSavesPerfsvcCrtNetSvc.exeMD5
54f65064c78656d0f9d8ea838682481e
SHA12d0700c2ed2e8bdc7f3017f9630c7a8104108e71
SHA256f9167e3b80dd8d2047ecc695558cffaf5871d48659dd68f9e49c7b2709f6acad
SHA5128b35076cca8e83de3cfe6c51eeff194e37fcf773af948a45767ccede36d4efea2bbc65b127305f8467b74479549006a00518bb3ca42560300342e9c19c1a7f12
-
C:\driverSaves\elBs4FCCK.batMD5
0407b07db5462f371d0d7f737ebf973a
SHA111dd83edf63febdf2ea0935e8e7b2519a610738b
SHA2567b0b55005ae6b1a19be753db6670fc86088a6618888eb7780566ff0ce122a8ec
SHA512ef5cbed89e0b72627a2345b6a0a0aa7690b4e9991816794e50b6125d78a1e2e9d6268216ae14397d14cb67f9c78ef1ef0c5ad2913f1d7b3d57a125f872267474
-
C:\driverSaves\mKLt1agSNSLByUmKEYd.batMD5
6c33c4c06022c7bbafc1d01caedd0abe
SHA13f6e17989ce3a09d183adc2380c659525a67ca0a
SHA256f78fccb7e0e0d6b89508758a739041ff31526ead74167d22f2aa754db19f6dfc
SHA512e1f0a27d5c459bdf865612a513d62bd0d6ef7ba649c7f4fac003e6d684cad6e3469b532c0e8689589bdb8ccc0b3d7442f875e97cfec9105481b6b5733f8137b0
-
\driverSaves\driverSavesPerfsvcCrtNetSvc.exeMD5
54f65064c78656d0f9d8ea838682481e
SHA12d0700c2ed2e8bdc7f3017f9630c7a8104108e71
SHA256f9167e3b80dd8d2047ecc695558cffaf5871d48659dd68f9e49c7b2709f6acad
SHA5128b35076cca8e83de3cfe6c51eeff194e37fcf773af948a45767ccede36d4efea2bbc65b127305f8467b74479549006a00518bb3ca42560300342e9c19c1a7f12
-
\driverSaves\driverSavesPerfsvcCrtNetSvc.exeMD5
54f65064c78656d0f9d8ea838682481e
SHA12d0700c2ed2e8bdc7f3017f9630c7a8104108e71
SHA256f9167e3b80dd8d2047ecc695558cffaf5871d48659dd68f9e49c7b2709f6acad
SHA5128b35076cca8e83de3cfe6c51eeff194e37fcf773af948a45767ccede36d4efea2bbc65b127305f8467b74479549006a00518bb3ca42560300342e9c19c1a7f12
-
memory/368-310-0x000000001AFF0000-0x000000001AFF2000-memory.dmpFilesize
8KB
-
memory/432-135-0x0000000000000000-mapping.dmp
-
memory/432-139-0x000000001B0A0000-0x000000001B0A2000-memory.dmpFilesize
8KB
-
memory/524-313-0x00000000006C0000-0x00000000006C2000-memory.dmpFilesize
8KB
-
memory/528-148-0x0000000000000000-mapping.dmp
-
memory/544-163-0x0000000000000000-mapping.dmp
-
memory/556-235-0x0000000000000000-mapping.dmp
-
memory/572-171-0x0000000000000000-mapping.dmp
-
memory/668-203-0x0000000000000000-mapping.dmp
-
memory/732-307-0x000000001B1C0000-0x000000001B1C2000-memory.dmpFilesize
8KB
-
memory/768-152-0x0000000000000000-mapping.dmp
-
memory/800-228-0x0000000000000000-mapping.dmp
-
memory/820-129-0x0000000000000000-mapping.dmp
-
memory/884-121-0x0000000000000000-mapping.dmp
-
memory/884-123-0x0000000000D30000-0x0000000000D31000-memory.dmpFilesize
4KB
-
memory/884-125-0x000000001AF10000-0x000000001AF12000-memory.dmpFilesize
8KB
-
memory/916-60-0x0000000075011000-0x0000000075013000-memory.dmpFilesize
8KB
-
memory/948-328-0x000000001AFD0000-0x000000001AFD2000-memory.dmpFilesize
8KB
-
memory/1040-210-0x0000000000000000-mapping.dmp
-
memory/1040-126-0x0000000000000000-mapping.dmp
-
memory/1072-229-0x0000000000000000-mapping.dmp
-
memory/1072-151-0x0000000000000000-mapping.dmp
-
memory/1164-212-0x0000000000000000-mapping.dmp
-
memory/1164-238-0x0000000000000000-mapping.dmp
-
memory/1168-64-0x0000000000000000-mapping.dmp
-
memory/1200-254-0x000000001B160000-0x000000001B162000-memory.dmpFilesize
8KB
-
memory/1200-250-0x0000000000000000-mapping.dmp
-
memory/1200-142-0x0000000000000000-mapping.dmp
-
memory/1228-234-0x000000001B170000-0x000000001B172000-memory.dmpFilesize
8KB
-
memory/1228-230-0x0000000000000000-mapping.dmp
-
memory/1232-322-0x000000001A950000-0x000000001A952000-memory.dmpFilesize
8KB
-
memory/1236-279-0x0000000000CD0000-0x0000000000CD2000-memory.dmpFilesize
8KB
-
memory/1256-259-0x0000000000000000-mapping.dmp
-
memory/1272-213-0x0000000000000000-mapping.dmp
-
memory/1332-226-0x0000000000000000-mapping.dmp
-
memory/1344-218-0x000000001AEF0000-0x000000001AEF2000-memory.dmpFilesize
8KB
-
memory/1344-216-0x00000000002E0000-0x00000000002E1000-memory.dmpFilesize
4KB
-
memory/1344-214-0x0000000000000000-mapping.dmp
-
memory/1348-295-0x000000001AD00000-0x000000001AD02000-memory.dmpFilesize
8KB
-
memory/1492-140-0x0000000000000000-mapping.dmp
-
memory/1496-291-0x000000001AFE0000-0x000000001AFE2000-memory.dmpFilesize
8KB
-
memory/1496-172-0x0000000000000000-mapping.dmp
-
memory/1504-175-0x00000000002C0000-0x00000000002C1000-memory.dmpFilesize
4KB
-
memory/1504-173-0x0000000000000000-mapping.dmp
-
memory/1504-273-0x0000000000000000-mapping.dmp
-
memory/1504-177-0x000000001B0D0000-0x000000001B0D2000-memory.dmpFilesize
8KB
-
memory/1508-243-0x000000001B190000-0x000000001B192000-memory.dmpFilesize
8KB
-
memory/1508-239-0x0000000000000000-mapping.dmp
-
memory/1528-265-0x000000001B0B0000-0x000000001B0B2000-memory.dmpFilesize
8KB
-
memory/1528-261-0x0000000000000000-mapping.dmp
-
memory/1560-153-0x0000000000000000-mapping.dmp
-
memory/1560-155-0x0000000000870000-0x0000000000871000-memory.dmpFilesize
4KB
-
memory/1560-157-0x0000000000540000-0x0000000000542000-memory.dmpFilesize
8KB
-
memory/1576-237-0x0000000000000000-mapping.dmp
-
memory/1600-204-0x0000000000000000-mapping.dmp
-
memory/1600-144-0x0000000000000000-mapping.dmp
-
memory/1600-149-0x000000001B2A0000-0x000000001B2A2000-memory.dmpFilesize
8KB
-
memory/1600-146-0x0000000000280000-0x0000000000281000-memory.dmpFilesize
4KB
-
memory/1612-192-0x0000000000000000-mapping.dmp
-
memory/1612-246-0x0000000000000000-mapping.dmp
-
memory/1612-117-0x0000000000000000-mapping.dmp
-
memory/1624-196-0x0000000000000000-mapping.dmp
-
memory/1624-168-0x000000001B3A0000-0x000000001B3A2000-memory.dmpFilesize
8KB
-
memory/1624-164-0x0000000000000000-mapping.dmp
-
memory/1624-198-0x00000000000D0000-0x00000000000D1000-memory.dmpFilesize
4KB
-
memory/1624-166-0x00000000010D0000-0x00000000010D1000-memory.dmpFilesize
4KB
-
memory/1624-200-0x000000001AED0000-0x000000001AED2000-memory.dmpFilesize
8KB
-
memory/1640-128-0x0000000000000000-mapping.dmp
-
memory/1660-316-0x000000001B020000-0x000000001B022000-memory.dmpFilesize
8KB
-
memory/1676-182-0x000000001AF30000-0x000000001AF32000-memory.dmpFilesize
8KB
-
memory/1676-178-0x0000000000000000-mapping.dmp
-
memory/1676-319-0x000000001AE90000-0x000000001AE92000-memory.dmpFilesize
8KB
-
memory/1696-134-0x000000001B210000-0x000000001B212000-memory.dmpFilesize
8KB
-
memory/1696-132-0x0000000001010000-0x0000000001011000-memory.dmpFilesize
4KB
-
memory/1696-130-0x0000000000000000-mapping.dmp
-
memory/1704-75-0x0000000000000000-mapping.dmp
-
memory/1720-119-0x0000000000000000-mapping.dmp
-
memory/1724-260-0x0000000000000000-mapping.dmp
-
memory/1728-120-0x0000000000000000-mapping.dmp
-
memory/1732-169-0x0000000000000000-mapping.dmp
-
memory/1756-185-0x0000000000000000-mapping.dmp
-
memory/1756-189-0x000000001B0B0000-0x000000001B0B2000-memory.dmpFilesize
8KB
-
memory/1796-272-0x000000001ADA0000-0x000000001ADA2000-memory.dmpFilesize
8KB
-
memory/1796-268-0x0000000000000000-mapping.dmp
-
memory/1812-195-0x0000000000000000-mapping.dmp
-
memory/1812-61-0x0000000000000000-mapping.dmp
-
memory/1816-225-0x000000001B320000-0x000000001B322000-memory.dmpFilesize
8KB
-
memory/1816-221-0x0000000000000000-mapping.dmp
-
memory/1828-325-0x0000000000450000-0x0000000000452000-memory.dmpFilesize
8KB
-
memory/1832-207-0x0000000001200000-0x0000000001201000-memory.dmpFilesize
4KB
-
memory/1832-205-0x0000000000000000-mapping.dmp
-
memory/1832-209-0x000000001B2D0000-0x000000001B2D2000-memory.dmpFilesize
8KB
-
memory/1876-249-0x0000000000000000-mapping.dmp
-
memory/1924-303-0x000000001AE00000-0x000000001AE02000-memory.dmpFilesize
8KB
-
memory/1968-160-0x0000000000000000-mapping.dmp
-
memory/1980-194-0x0000000000000000-mapping.dmp
-
memory/2000-73-0x0000000004950000-0x0000000004951000-memory.dmpFilesize
4KB
-
memory/2000-68-0x0000000002270000-0x0000000002271000-memory.dmpFilesize
4KB
-
memory/2000-115-0x0000000006300000-0x0000000006301000-memory.dmpFilesize
4KB
-
memory/2000-92-0x000000007EF30000-0x000000007EF31000-memory.dmpFilesize
4KB
-
memory/2000-91-0x0000000006160000-0x0000000006161000-memory.dmpFilesize
4KB
-
memory/2000-100-0x0000000006280000-0x0000000006281000-memory.dmpFilesize
4KB
-
memory/2000-90-0x00000000060E0000-0x00000000060E1000-memory.dmpFilesize
4KB
-
memory/2000-72-0x0000000002540000-0x0000000002541000-memory.dmpFilesize
4KB
-
memory/2000-71-0x00000000049F0000-0x00000000049F1000-memory.dmpFilesize
4KB
-
memory/2000-69-0x00000000049B0000-0x00000000049B1000-memory.dmpFilesize
4KB
-
memory/2000-116-0x0000000006310000-0x0000000006311000-memory.dmpFilesize
4KB
-
memory/2000-70-0x00000000049B2000-0x00000000049B3000-memory.dmpFilesize
4KB
-
memory/2000-101-0x0000000005610000-0x0000000005611000-memory.dmpFilesize
4KB
-
memory/2000-83-0x0000000005FE0000-0x0000000005FE1000-memory.dmpFilesize
4KB
-
memory/2000-66-0x0000000000000000-mapping.dmp
-
memory/2008-257-0x0000000000000000-mapping.dmp
-
memory/2012-248-0x0000000000000000-mapping.dmp
-
memory/2020-143-0x0000000000000000-mapping.dmp
-
memory/2028-201-0x0000000000000000-mapping.dmp
-
memory/2036-285-0x00000000004D0000-0x00000000004D2000-memory.dmpFilesize
8KB
-
memory/2040-84-0x0000000000B10000-0x0000000000B11000-memory.dmpFilesize
4KB
-
memory/2040-304-0x000000001AC50000-0x000000001AC52000-memory.dmpFilesize
8KB
-
memory/2040-79-0x0000000000000000-mapping.dmp
-
memory/2040-93-0x000000001AF30000-0x000000001AF32000-memory.dmpFilesize
8KB
-
memory/2040-162-0x0000000000000000-mapping.dmp
-
memory/2044-275-0x0000000000000000-mapping.dmp