Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
02/11/2022, 02:51
Behavioral task
behavioral1
Sample
291edebc739e89656a1e44fcf43c66c8088d63841c9ed3d2e80f6ddea5472aa1.exe
Resource
win10-20220812-en
General
-
Target
291edebc739e89656a1e44fcf43c66c8088d63841c9ed3d2e80f6ddea5472aa1.exe
-
Size
1.3MB
-
MD5
67c6bd06d40132afe15cf986ece6e74c
-
SHA1
4b50ac65d78280ff88d609b61a7b2d7842838a87
-
SHA256
291edebc739e89656a1e44fcf43c66c8088d63841c9ed3d2e80f6ddea5472aa1
-
SHA512
4054615ebda22fecdc70497b05531ed99f1f137cf7f3175eb092ceabc3022ed3ccc7396001d7588fa1e4451a3865ae5ab513651b96fde0b268559f5935879214
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process 45 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4252 4476 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4528 4476 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2092 4476 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4204 4476 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3716 4476 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3224 4476 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4532 4476 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5040 4476 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5012 4476 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5032 4476 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4872 4476 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4356 4476 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4300 4476 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3228 4476 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4216 4476 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4512 4476 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4500 4476 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4444 4476 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4420 4476 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4456 4476 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4492 4476 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1848 4476 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4540 4476 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3188 4476 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4640 4476 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1812 4476 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 360 4476 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1388 4476 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1252 4476 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1416 4476 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 780 4476 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 768 4476 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 428 4476 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4468 4476 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1200 4476 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 232 4476 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 192 4476 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3300 4476 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2252 4476 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2236 4476 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4856 4476 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1776 4476 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4656 4476 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1840 4476 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2728 4476 schtasks.exe 70 -
resource yara_rule behavioral1/files/0x000900000001ac19-283.dat dcrat behavioral1/files/0x000900000001ac19-284.dat dcrat behavioral1/memory/4960-285-0x0000000000800000-0x0000000000910000-memory.dmp dcrat behavioral1/files/0x000600000001ac33-743.dat dcrat behavioral1/files/0x000600000001ac33-742.dat dcrat behavioral1/files/0x000600000001ac33-863.dat dcrat behavioral1/files/0x000600000001ac33-869.dat dcrat behavioral1/files/0x000600000001ac33-874.dat dcrat behavioral1/files/0x000600000001ac33-880.dat dcrat behavioral1/files/0x000600000001ac33-885.dat dcrat behavioral1/files/0x000600000001ac33-891.dat dcrat behavioral1/files/0x000600000001ac33-897.dat dcrat behavioral1/files/0x000600000001ac33-903.dat dcrat behavioral1/files/0x000600000001ac33-909.dat dcrat -
Executes dropped EXE 11 IoCs
pid Process 4960 DllCommonsvc.exe 5780 Idle.exe 2324 Idle.exe 5344 Idle.exe 5700 Idle.exe 424 Idle.exe 3712 Idle.exe 3764 Idle.exe 4816 Idle.exe 5468 Idle.exe 4264 Idle.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in Program Files directory 12 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Media Player\en-US\088424020bedd6 DllCommonsvc.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\lsass.exe DllCommonsvc.exe File created C:\Program Files (x86)\Windows Portable Devices\smss.exe DllCommonsvc.exe File created C:\Program Files (x86)\Windows NT\TableTextService\en-US\Idle.exe DllCommonsvc.exe File created C:\Program Files (x86)\Windows NT\TableTextService\en-US\6ccacd8608530f DllCommonsvc.exe File created C:\Program Files (x86)\Windows Media Player\en-US\conhost.exe DllCommonsvc.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\6203df4a6bafc7 DllCommonsvc.exe File created C:\Program Files (x86)\Windows Portable Devices\69ddcba757bf72 DllCommonsvc.exe File created C:\Program Files (x86)\Common Files\Services\dllhost.exe DllCommonsvc.exe File created C:\Program Files (x86)\Common Files\Services\5940a34987c991 DllCommonsvc.exe File created C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\fontdrvhost.exe DllCommonsvc.exe File created C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\5b884080fd4f94 DllCommonsvc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 45 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4500 schtasks.exe 428 schtasks.exe 1200 schtasks.exe 2252 schtasks.exe 2728 schtasks.exe 3224 schtasks.exe 4216 schtasks.exe 4512 schtasks.exe 2236 schtasks.exe 4656 schtasks.exe 4204 schtasks.exe 4300 schtasks.exe 768 schtasks.exe 4456 schtasks.exe 1416 schtasks.exe 5032 schtasks.exe 3228 schtasks.exe 4444 schtasks.exe 4420 schtasks.exe 1388 schtasks.exe 4252 schtasks.exe 3716 schtasks.exe 4532 schtasks.exe 4540 schtasks.exe 4640 schtasks.exe 360 schtasks.exe 192 schtasks.exe 4356 schtasks.exe 4492 schtasks.exe 1848 schtasks.exe 1252 schtasks.exe 232 schtasks.exe 1776 schtasks.exe 1840 schtasks.exe 2092 schtasks.exe 4872 schtasks.exe 1812 schtasks.exe 3300 schtasks.exe 4856 schtasks.exe 5012 schtasks.exe 780 schtasks.exe 4468 schtasks.exe 4528 schtasks.exe 5040 schtasks.exe 3188 schtasks.exe -
Modifies registry class 12 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings Idle.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings Idle.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings Idle.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings Idle.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings DllCommonsvc.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings Idle.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings Idle.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings Idle.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings Idle.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings Idle.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings 291edebc739e89656a1e44fcf43c66c8088d63841c9ed3d2e80f6ddea5472aa1.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings Idle.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4960 DllCommonsvc.exe 4960 DllCommonsvc.exe 4960 DllCommonsvc.exe 4960 DllCommonsvc.exe 4960 DllCommonsvc.exe 4960 DllCommonsvc.exe 4960 DllCommonsvc.exe 4960 DllCommonsvc.exe 4960 DllCommonsvc.exe 4960 DllCommonsvc.exe 4960 DllCommonsvc.exe 4960 DllCommonsvc.exe 4960 DllCommonsvc.exe 4960 DllCommonsvc.exe 4960 DllCommonsvc.exe 4960 DllCommonsvc.exe 4960 DllCommonsvc.exe 4960 DllCommonsvc.exe 2268 powershell.exe 2268 powershell.exe 2412 powershell.exe 2412 powershell.exe 2020 powershell.exe 2020 powershell.exe 3840 powershell.exe 3840 powershell.exe 2684 powershell.exe 2684 powershell.exe 2644 powershell.exe 2644 powershell.exe 3488 powershell.exe 3488 powershell.exe 3376 powershell.exe 3376 powershell.exe 3596 powershell.exe 3596 powershell.exe 4504 powershell.exe 4504 powershell.exe 4816 powershell.exe 4816 powershell.exe 4664 powershell.exe 4664 powershell.exe 4724 powershell.exe 4724 powershell.exe 2644 powershell.exe 4796 powershell.exe 4796 powershell.exe 1928 powershell.exe 1928 powershell.exe 1116 powershell.exe 1116 powershell.exe 4796 powershell.exe 1116 powershell.exe 4816 powershell.exe 1928 powershell.exe 2268 powershell.exe 2412 powershell.exe 2020 powershell.exe 3840 powershell.exe 4796 powershell.exe 2644 powershell.exe 1928 powershell.exe 4816 powershell.exe 3488 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4960 DllCommonsvc.exe Token: SeDebugPrivilege 2268 powershell.exe Token: SeDebugPrivilege 2412 powershell.exe Token: SeDebugPrivilege 2020 powershell.exe Token: SeDebugPrivilege 3840 powershell.exe Token: SeDebugPrivilege 2684 powershell.exe Token: SeDebugPrivilege 2644 powershell.exe Token: SeDebugPrivilege 3488 powershell.exe Token: SeDebugPrivilege 3376 powershell.exe Token: SeDebugPrivilege 3596 powershell.exe Token: SeDebugPrivilege 4504 powershell.exe Token: SeDebugPrivilege 4816 powershell.exe Token: SeDebugPrivilege 4664 powershell.exe Token: SeDebugPrivilege 4724 powershell.exe Token: SeDebugPrivilege 4796 powershell.exe Token: SeDebugPrivilege 1928 powershell.exe Token: SeDebugPrivilege 1116 powershell.exe Token: SeDebugPrivilege 5780 Idle.exe Token: SeIncreaseQuotaPrivilege 2268 powershell.exe Token: SeSecurityPrivilege 2268 powershell.exe Token: SeTakeOwnershipPrivilege 2268 powershell.exe Token: SeLoadDriverPrivilege 2268 powershell.exe Token: SeSystemProfilePrivilege 2268 powershell.exe Token: SeSystemtimePrivilege 2268 powershell.exe Token: SeProfSingleProcessPrivilege 2268 powershell.exe Token: SeIncBasePriorityPrivilege 2268 powershell.exe Token: SeCreatePagefilePrivilege 2268 powershell.exe Token: SeBackupPrivilege 2268 powershell.exe Token: SeRestorePrivilege 2268 powershell.exe Token: SeShutdownPrivilege 2268 powershell.exe Token: SeDebugPrivilege 2268 powershell.exe Token: SeSystemEnvironmentPrivilege 2268 powershell.exe Token: SeRemoteShutdownPrivilege 2268 powershell.exe Token: SeUndockPrivilege 2268 powershell.exe Token: SeManageVolumePrivilege 2268 powershell.exe Token: 33 2268 powershell.exe Token: 34 2268 powershell.exe Token: 35 2268 powershell.exe Token: 36 2268 powershell.exe Token: SeIncreaseQuotaPrivilege 4796 powershell.exe Token: SeSecurityPrivilege 4796 powershell.exe Token: SeTakeOwnershipPrivilege 4796 powershell.exe Token: SeLoadDriverPrivilege 4796 powershell.exe Token: SeSystemProfilePrivilege 4796 powershell.exe Token: SeSystemtimePrivilege 4796 powershell.exe Token: SeProfSingleProcessPrivilege 4796 powershell.exe Token: SeIncBasePriorityPrivilege 4796 powershell.exe Token: SeCreatePagefilePrivilege 4796 powershell.exe Token: SeBackupPrivilege 4796 powershell.exe Token: SeRestorePrivilege 4796 powershell.exe Token: SeShutdownPrivilege 4796 powershell.exe Token: SeDebugPrivilege 4796 powershell.exe Token: SeSystemEnvironmentPrivilege 4796 powershell.exe Token: SeRemoteShutdownPrivilege 4796 powershell.exe Token: SeUndockPrivilege 4796 powershell.exe Token: SeManageVolumePrivilege 4796 powershell.exe Token: 33 4796 powershell.exe Token: 34 4796 powershell.exe Token: 35 4796 powershell.exe Token: 36 4796 powershell.exe Token: SeIncreaseQuotaPrivilege 1928 powershell.exe Token: SeSecurityPrivilege 1928 powershell.exe Token: SeTakeOwnershipPrivilege 1928 powershell.exe Token: SeLoadDriverPrivilege 1928 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2620 wrote to memory of 4784 2620 291edebc739e89656a1e44fcf43c66c8088d63841c9ed3d2e80f6ddea5472aa1.exe 66 PID 2620 wrote to memory of 4784 2620 291edebc739e89656a1e44fcf43c66c8088d63841c9ed3d2e80f6ddea5472aa1.exe 66 PID 2620 wrote to memory of 4784 2620 291edebc739e89656a1e44fcf43c66c8088d63841c9ed3d2e80f6ddea5472aa1.exe 66 PID 4784 wrote to memory of 64 4784 WScript.exe 67 PID 4784 wrote to memory of 64 4784 WScript.exe 67 PID 4784 wrote to memory of 64 4784 WScript.exe 67 PID 64 wrote to memory of 4960 64 cmd.exe 69 PID 64 wrote to memory of 4960 64 cmd.exe 69 PID 4960 wrote to memory of 2412 4960 DllCommonsvc.exe 116 PID 4960 wrote to memory of 2412 4960 DllCommonsvc.exe 116 PID 4960 wrote to memory of 2268 4960 DllCommonsvc.exe 117 PID 4960 wrote to memory of 2268 4960 DllCommonsvc.exe 117 PID 4960 wrote to memory of 2020 4960 DllCommonsvc.exe 118 PID 4960 wrote to memory of 2020 4960 DllCommonsvc.exe 118 PID 4960 wrote to memory of 3840 4960 DllCommonsvc.exe 121 PID 4960 wrote to memory of 3840 4960 DllCommonsvc.exe 121 PID 4960 wrote to memory of 2644 4960 DllCommonsvc.exe 122 PID 4960 wrote to memory of 2644 4960 DllCommonsvc.exe 122 PID 4960 wrote to memory of 2684 4960 DllCommonsvc.exe 124 PID 4960 wrote to memory of 2684 4960 DllCommonsvc.exe 124 PID 4960 wrote to memory of 3488 4960 DllCommonsvc.exe 125 PID 4960 wrote to memory of 3488 4960 DllCommonsvc.exe 125 PID 4960 wrote to memory of 3376 4960 DllCommonsvc.exe 128 PID 4960 wrote to memory of 3376 4960 DllCommonsvc.exe 128 PID 4960 wrote to memory of 3596 4960 DllCommonsvc.exe 129 PID 4960 wrote to memory of 3596 4960 DllCommonsvc.exe 129 PID 4960 wrote to memory of 4504 4960 DllCommonsvc.exe 130 PID 4960 wrote to memory of 4504 4960 DllCommonsvc.exe 130 PID 4960 wrote to memory of 4664 4960 DllCommonsvc.exe 131 PID 4960 wrote to memory of 4664 4960 DllCommonsvc.exe 131 PID 4960 wrote to memory of 4816 4960 DllCommonsvc.exe 132 PID 4960 wrote to memory of 4816 4960 DllCommonsvc.exe 132 PID 4960 wrote to memory of 4724 4960 DllCommonsvc.exe 133 PID 4960 wrote to memory of 4724 4960 DllCommonsvc.exe 133 PID 4960 wrote to memory of 4796 4960 DllCommonsvc.exe 134 PID 4960 wrote to memory of 4796 4960 DllCommonsvc.exe 134 PID 4960 wrote to memory of 1928 4960 DllCommonsvc.exe 135 PID 4960 wrote to memory of 1928 4960 DllCommonsvc.exe 135 PID 4960 wrote to memory of 1116 4960 DllCommonsvc.exe 144 PID 4960 wrote to memory of 1116 4960 DllCommonsvc.exe 144 PID 4960 wrote to memory of 3824 4960 DllCommonsvc.exe 148 PID 4960 wrote to memory of 3824 4960 DllCommonsvc.exe 148 PID 3824 wrote to memory of 5420 3824 cmd.exe 150 PID 3824 wrote to memory of 5420 3824 cmd.exe 150 PID 3824 wrote to memory of 5780 3824 cmd.exe 151 PID 3824 wrote to memory of 5780 3824 cmd.exe 151 PID 5780 wrote to memory of 4332 5780 Idle.exe 153 PID 5780 wrote to memory of 4332 5780 Idle.exe 153 PID 4332 wrote to memory of 5792 4332 cmd.exe 155 PID 4332 wrote to memory of 5792 4332 cmd.exe 155 PID 4332 wrote to memory of 2324 4332 cmd.exe 156 PID 4332 wrote to memory of 2324 4332 cmd.exe 156 PID 2324 wrote to memory of 1940 2324 Idle.exe 157 PID 2324 wrote to memory of 1940 2324 Idle.exe 157 PID 1940 wrote to memory of 5888 1940 cmd.exe 159 PID 1940 wrote to memory of 5888 1940 cmd.exe 159 PID 1940 wrote to memory of 5344 1940 cmd.exe 160 PID 1940 wrote to memory of 5344 1940 cmd.exe 160 PID 5344 wrote to memory of 6032 5344 Idle.exe 162 PID 5344 wrote to memory of 6032 5344 Idle.exe 162 PID 6032 wrote to memory of 6036 6032 cmd.exe 163 PID 6032 wrote to memory of 6036 6032 cmd.exe 163 PID 6032 wrote to memory of 5700 6032 cmd.exe 164 PID 6032 wrote to memory of 5700 6032 cmd.exe 164
Processes
-
C:\Users\Admin\AppData\Local\Temp\291edebc739e89656a1e44fcf43c66c8088d63841c9ed3d2e80f6ddea5472aa1.exe"C:\Users\Admin\AppData\Local\Temp\291edebc739e89656a1e44fcf43c66c8088d63841c9ed3d2e80f6ddea5472aa1.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"2⤵
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\providercommon\1zu9dW.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:64 -
C:\providercommon\DllCommonsvc.exe"C:\providercommon\DllCommonsvc.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2412
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\taskhostw.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2268
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows NT\TableTextService\en-US\Idle.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2020
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\fontdrvhost.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3840
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\odt\smss.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2644
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\Videos\OfficeClickToRun.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2684
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\Idle.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3488
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Media Player\en-US\conhost.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3376
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\taskhostw.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3596
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Sidebar\Shared Gadgets\lsass.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4504
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\All Users\Package Cache\{61087a79-ac85-455c-934d-1fa22cc64f36}\services.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4664
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\odt\sihost.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4816
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Portable Devices\smss.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4724
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\csrss.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4796
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\odt\Idle.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1928
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Common Files\Services\dllhost.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1116
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\0PbkUmdX9b.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:5420
-
-
C:\providercommon\Idle.exe"C:\providercommon\Idle.exe"6⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5780 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Q0tVgmHuxR.bat"7⤵
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:28⤵PID:5792
-
-
C:\providercommon\Idle.exe"C:\providercommon\Idle.exe"8⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\0Sh6ipYOoX.bat"9⤵
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:210⤵PID:5888
-
-
C:\providercommon\Idle.exe"C:\providercommon\Idle.exe"10⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5344 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\7FnFm4j3ls.bat"11⤵
- Suspicious use of WriteProcessMemory
PID:6032 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:212⤵PID:6036
-
-
C:\providercommon\Idle.exe"C:\providercommon\Idle.exe"12⤵
- Executes dropped EXE
- Modifies registry class
PID:5700 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\KxKP0srito.bat"13⤵PID:5768
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:214⤵PID:3312
-
-
C:\providercommon\Idle.exe"C:\providercommon\Idle.exe"14⤵
- Executes dropped EXE
- Modifies registry class
PID:424 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\OvjOVLkpjd.bat"15⤵PID:4936
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:216⤵PID:4000
-
-
C:\providercommon\Idle.exe"C:\providercommon\Idle.exe"16⤵
- Executes dropped EXE
- Modifies registry class
PID:3712 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\JCnMdX7E06.bat"17⤵PID:4460
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:218⤵PID:5244
-
-
C:\providercommon\Idle.exe"C:\providercommon\Idle.exe"18⤵
- Executes dropped EXE
- Modifies registry class
PID:3764 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\CIMKRyAEqW.bat"19⤵PID:356
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:220⤵PID:5544
-
-
C:\providercommon\Idle.exe"C:\providercommon\Idle.exe"20⤵
- Executes dropped EXE
- Modifies registry class
PID:4816 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\nb2ryfxXmZ.bat"21⤵PID:1436
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:222⤵PID:4208
-
-
C:\providercommon\Idle.exe"C:\providercommon\Idle.exe"22⤵
- Executes dropped EXE
- Modifies registry class
PID:5468 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\auWhjrprfd.bat"23⤵PID:4088
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:224⤵PID:4640
-
-
C:\providercommon\Idle.exe"C:\providercommon\Idle.exe"24⤵
- Executes dropped EXE
- Modifies registry class
PID:4264 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\pgCyA6Uc1O.bat"25⤵PID:1544
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:226⤵PID:2104
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\taskhostw.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4252
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4528
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2092
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows NT\TableTextService\en-US\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4204
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows NT\TableTextService\en-US\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3716
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows NT\TableTextService\en-US\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3224
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 14 /tr "'C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4532
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5040
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 5 /tr "'C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5012
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 5 /tr "'C:\odt\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5032
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\odt\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4872
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 6 /tr "'C:\odt\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4356
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 7 /tr "'C:\Users\Admin\Videos\OfficeClickToRun.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4300
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Users\Admin\Videos\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3228
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 10 /tr "'C:\Users\Admin\Videos\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4216
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 10 /tr "'C:\providercommon\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4512
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\providercommon\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4500
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 14 /tr "'C:\providercommon\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4444
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Windows Media Player\en-US\conhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4420
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Media Player\en-US\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4456
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows Media Player\en-US\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4492
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\taskhostw.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1848
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4540
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3188
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 11 /tr "'C:\Program Files\Windows Sidebar\Shared Gadgets\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4640
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Program Files\Windows Sidebar\Shared Gadgets\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1812
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 12 /tr "'C:\Program Files\Windows Sidebar\Shared Gadgets\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:360
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 5 /tr "'C:\Users\All Users\Package Cache\{61087a79-ac85-455c-934d-1fa22cc64f36}\services.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1388
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Users\All Users\Package Cache\{61087a79-ac85-455c-934d-1fa22cc64f36}\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1252
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 7 /tr "'C:\Users\All Users\Package Cache\{61087a79-ac85-455c-934d-1fa22cc64f36}\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1416
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 7 /tr "'C:\odt\sihost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:780
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\odt\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:768
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 6 /tr "'C:\odt\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:428
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows Portable Devices\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4468
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Portable Devices\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1200
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Windows Portable Devices\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:232
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\providercommon\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:192
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\providercommon\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3300
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\providercommon\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2252
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 5 /tr "'C:\odt\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2236
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\odt\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4856
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 5 /tr "'C:\odt\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1776
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Common Files\Services\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4656
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Common Files\Services\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1840
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Common Files\Services\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2728
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d63ff49d7c92016feb39812e4db10419
SHA12307d5e35ca9864ffefc93acf8573ea995ba189b
SHA256375076241775962f3edc08a8c72832a00920b427a4f3332528d91d21e909fa12
SHA51200f8c8d0336d6575b956876183199624d6f4d2056f2c0aa633a6f17c516f22ee648062d9bc419254d84c459323e9424f0da8aed9dd4e16c2926e5ba30e797d8a
-
Filesize
3KB
MD5ad5cd538ca58cb28ede39c108acb5785
SHA11ae910026f3dbe90ed025e9e96ead2b5399be877
SHA256c9e6cb04d6c893458d5a7e12eb575cf97c3172f5e312b1f63a667cbbc5f0c033
SHA512c066c5d9b276a68fa636647bb29aea05bfa2292217bc77f5324d9c1d93117772ee8277e1f7cff91ec8d6b7c05ca078f929cecfdbb09582522a9067f54740af13
-
Filesize
1KB
MD5ff3411bad0839ac1e29c1455ad73b68f
SHA10708f43c355a9ff1a293f81202d4261927582b4b
SHA2561d56da997913d8e216c90f7bdaeef898822abb55f7a88e5d35207a05bbdcde33
SHA512a5d08ac74857d72c1fb3ff24d94eae593e07ccedc0b5a4bcb7b258fc905f4fe14230fcd7545efe9e6636336e1260843ac28d19fb6b207943ce914bb6f4203e41
-
Filesize
1KB
MD5ff3411bad0839ac1e29c1455ad73b68f
SHA10708f43c355a9ff1a293f81202d4261927582b4b
SHA2561d56da997913d8e216c90f7bdaeef898822abb55f7a88e5d35207a05bbdcde33
SHA512a5d08ac74857d72c1fb3ff24d94eae593e07ccedc0b5a4bcb7b258fc905f4fe14230fcd7545efe9e6636336e1260843ac28d19fb6b207943ce914bb6f4203e41
-
Filesize
1KB
MD5961d4ca9aa48c718cf6e5b37f2894bdb
SHA1d1d58a8f329990f30b2e50a9da2d00db6bcda5e5
SHA2567333e1f71b05a2df4537192c658cee6a0dfee4dded2358c2ecbbca9ff466e263
SHA5124baf7bb7e4aaf9b74f4337fd8aa66de5b0c253f1e427e42888dc5b49984a01e95b9a92e12c72e9954ddbee16133dcaac752588719d4782cfce13a4e9b04c3341
-
Filesize
1KB
MD5961d4ca9aa48c718cf6e5b37f2894bdb
SHA1d1d58a8f329990f30b2e50a9da2d00db6bcda5e5
SHA2567333e1f71b05a2df4537192c658cee6a0dfee4dded2358c2ecbbca9ff466e263
SHA5124baf7bb7e4aaf9b74f4337fd8aa66de5b0c253f1e427e42888dc5b49984a01e95b9a92e12c72e9954ddbee16133dcaac752588719d4782cfce13a4e9b04c3341
-
Filesize
1KB
MD575311e7349f04699dadc196639b89ecf
SHA11e823eb7b7ca99f8241a9e9a0150e4c6c702f098
SHA2567890403b71d4d0c6035ca4a3a263e5365066757c7166d4e85cfd5f3d40262196
SHA512b8f259841503e034e89060a3512b98b0f01f9f2bc50c9876bace603caeb636317fc74ccb470a9af8d2e4db008a02d9698d29f7c3bbf6f9ab3672a4e48febf46b
-
Filesize
1KB
MD521adbe2c3e5c5d7b5c7198cffbb729bf
SHA1f2ce61c910242ef46451802fd91868e5dc8117f7
SHA25642eee7e90646d05ee9fd03739ed5ab415cd217d0dbd298a57c3cebfdc48f55c0
SHA5129a7592ccb985a1a2323b2820d8afd2705aa0e66debfaff3acf1c345fd16f346523bc049f15416701075be09560a963b22f547faab7e16216833d0e4c8a62a451
-
Filesize
1KB
MD5ece885ad6b3f5349c8b6a4fce7c97ce9
SHA1d1dbc37a3eff5344f04442347f6b0bdc7f157896
SHA256bbc79bd5eaaf1bc3646528cb1c41c0a8a68d0538d2b25a92960e0b152de2e723
SHA512416fce1e57618449132abdd0d78f9b6e913f1e8f748d064498731b67e6fd014d4626956cf6c6bf64d71ca7127b527b3051313ed9dcc7eb78add4a43b7fa4b10b
-
Filesize
1KB
MD56b3e58a693b1c69959b022fee16533a3
SHA1714d832bc09a713fb57951f010391f07ab49ab09
SHA256cc6d8501900259be086e9ff58f4baa70d0bc4d50ae5e7c7b69744089e1804adf
SHA512f2c136a931ebcc786ccc37d1309f6dcc7fd560d307fc98466cd05e3f270baa09cde6c25b6334da400e67049400ca0184a585dfd79595823f159b632988da6b1b
-
Filesize
1KB
MD5ece885ad6b3f5349c8b6a4fce7c97ce9
SHA1d1dbc37a3eff5344f04442347f6b0bdc7f157896
SHA256bbc79bd5eaaf1bc3646528cb1c41c0a8a68d0538d2b25a92960e0b152de2e723
SHA512416fce1e57618449132abdd0d78f9b6e913f1e8f748d064498731b67e6fd014d4626956cf6c6bf64d71ca7127b527b3051313ed9dcc7eb78add4a43b7fa4b10b
-
Filesize
1KB
MD56f06170cd0010279ccae80cd5907c62a
SHA1ef950c312302c7fdb09cba8473bad5325ff36165
SHA256a43283a486fbafe974ff9cb6e9f8d35d44687572d38430b084655e3034c750a6
SHA5127a85070ac65c4ace0b7c6313f4e83ca19cb5365f2d14af04400c41fcf073f1de7c328aa0e70436f15e36bb6a3937769cc24b4dfa6224e23c294cf1dea33b488b
-
Filesize
1KB
MD5ad73000f6e29bf1a7ffe631b4821aae2
SHA1643cc2125f71f01af78706149821ef54a17c89ac
SHA256f3d85c96e393671282964ce00cbf8206826a4933544fb49904915d22006d467e
SHA512321c10316fe85eb200b4266e5859b31e0a1bc022ed89e5eeff12b16c6ca490a2d7d49a73eb68f548a72f36439b7335b345375194115535085cd60aefe0c19a58
-
Filesize
1KB
MD5d18a38b8e44e86b3c0426720ab606f4f
SHA1eee38e9cd6f8f70a6352ab6837162bd788cf8ab9
SHA256174d3e33c31cb7dd95e8555ded0ffa3253ecfd957522364609dacdb383aa88f5
SHA5122f74f054f5a37e0149bd7debe7d230413f4b4c760ec4fbdefea049758478dcdd4c49dba4f19cc55a0197c3c3aae5f3063cfbd86f4e5725a12876193e7e577d67
-
Filesize
1KB
MD5ad73000f6e29bf1a7ffe631b4821aae2
SHA1643cc2125f71f01af78706149821ef54a17c89ac
SHA256f3d85c96e393671282964ce00cbf8206826a4933544fb49904915d22006d467e
SHA512321c10316fe85eb200b4266e5859b31e0a1bc022ed89e5eeff12b16c6ca490a2d7d49a73eb68f548a72f36439b7335b345375194115535085cd60aefe0c19a58
-
Filesize
1KB
MD53f3518b79aa2526357fe8c116398a69e
SHA12da161f388951ec71cce66236008bee030b28f29
SHA256d1df325594bfde6d1a84274e4aacaa8d6deefc06640a0e428938fceed2eb3672
SHA512754dcc3db0580a2f5d535cd205a6149aac9da68603592195c2f69892140e35e8cdea327f7b3578ba96e508300a3d5dcf6dc87f9ef387fa2f811236d9b9905ff0
-
Filesize
1KB
MD53f3518b79aa2526357fe8c116398a69e
SHA12da161f388951ec71cce66236008bee030b28f29
SHA256d1df325594bfde6d1a84274e4aacaa8d6deefc06640a0e428938fceed2eb3672
SHA512754dcc3db0580a2f5d535cd205a6149aac9da68603592195c2f69892140e35e8cdea327f7b3578ba96e508300a3d5dcf6dc87f9ef387fa2f811236d9b9905ff0
-
Filesize
191B
MD52b3756ef608ab713a6cfb7887bc4c6ec
SHA1f78c1b5fbfdc8a81553987c595edd0fdba2bbdbd
SHA256c181fabcbc3cdf040726fb6bb0787a77cd9fe0150e00e37423a0734b52031827
SHA512c169a3c6f2034d7c63017edfe0b5b22709b7d41ca1608a185906321c4dbf50f262e27446cede636800f9bfcbaf8bd4b047c617b2cf9653f3982763c82f8bf472
-
Filesize
191B
MD50c617ce6ac17cde38e5e42efd08bfeb4
SHA125098406fe9b52f3174dc9a28101f4b7bad789b0
SHA256be60b13cfc6fd8f03620ff4e8ef044d6415e7b5ef86daff5c6936603a5ae8e32
SHA5124a10e36139038b2e84553d312267e381d6f58864a3ad24ece1a69d36b7c35053062f6f57b0b29325daf79a72e926e62641a7987e6ed6667ba80ad817c5e67c8d
-
Filesize
191B
MD591817e0c99cefd4eb9a68d27b204fb13
SHA1f98e348e9a44d6689f6afc85b559f678e8264ab6
SHA25662a09ecf45936eb4f17023b0a92f3cb7ac2c31417fa48c46da66d398d094ba60
SHA5122445ce6f94a6ec35c19dea3adb0a8679cfc4fa81b37a65fbc19707a37a398bb0b1abecaf91123a1890074f98d6b9d5547c9b347497f8a1a9e8decf54f014b434
-
Filesize
191B
MD5eed993215ecaa692f6fdcab3b569c76f
SHA1520020f6b0339e0eb5a75c96546b53515776909f
SHA25620d9acbe8bfa859b4939aa1265862f0c7326afef1f1ddb1648fe278463eba0fe
SHA512baed5685850dceca36c043c5ab22e7c53d72ef84ea87aa1844b61ff65c72b362879870ee4113c500463465bb6ffe674d962303236da3a87c807c8fa5aae7e2d6
-
Filesize
191B
MD50e3e5baff4f27f5c19a2579753c41471
SHA1b14c593d217304fcb546ef263268f9303daeb6bf
SHA2569eb319cf1eb352fb55c9a2a38d7dc8f8e5b7d9d271653625fe07a8bed9208ef3
SHA51291ee7108439a1a5b2eb510ad95c061703c62e24efbc4a3dd09d78b75c1f1fec1a178da320438cfd3539d8a70df7227615b51f3765b8af75f8799a62ce201ef48
-
Filesize
191B
MD5d02c5a6092199c7fff163ac66f5ce4bc
SHA1878af8e51b5a796f108bf6c2c196d7a7a8c5b469
SHA256532a049cd33f12786967e5a46c4b16ef42aabe65a315732106cc9c8163af0e6f
SHA512bddfd4a03f3563267b2e7d3d584ed834f77f889ee042945c3c99596daec3da0e9d6854e1e761cfb848013cfcc5792eb9a51e531fa661bea92ae581060dc4fe9b
-
Filesize
191B
MD50ea744790d7647070a893944356a5102
SHA100f59f24716b18558b768da29790c7b2b3df942c
SHA2569a050b6156dd79e452281a27c22429b70460e25e85ea5fb4ed9a0e56b798106d
SHA512ad5e44c0765e02fbc981416a3e0a6e5476c9fc4fd523d09f11f0e5747aae30849f45f259ed60335fa5260d71001925a8823d5bd0a0abf5190dbfc3b2206945dd
-
Filesize
191B
MD5d97fabde2e112611b827557b4a21fe67
SHA1fbb331ba379afcabd21c5dfc2aa6dc8048516db6
SHA256b88141981d8fea68d84db71097b540a87d9906843f34a3afbf86f87fabe30f08
SHA512f20d772ef3460b94a272a1a8ff23fc1ef6f3e66780d73c7986495f817d7d3360bb2fca95c39b98fc96d64f3c71023a3e367f0bb8b49b5fce5bc5d7337ab55aaf
-
Filesize
191B
MD5d4f2f7a62fdb9b2d2acfb596937edf1d
SHA125f5ed426245be77fc37cb5b94ce9e0af648d51c
SHA25681e18ccac366d69d77a5ac80a3f8fd7761d905277165d1fc54ed0052da14d3bc
SHA51211491c4385b0d1e1726ade5cafc21f6d938161b1852250d2cb10d1d53d77e1cba58521fb0d51fb6ccab8561bfc529ff62808a6a1fffe9f833e19392d18b30848
-
Filesize
191B
MD5a8537dad02b1314f67a3b467979cd07c
SHA1a4113a6b71ac9374a6f031d393be485018227b5b
SHA256d398ec870970ffdbc1efd7d3bf6da02c8aef3a964e3507d2c41c08afe84f2c54
SHA512dfa72ce785a19ba32cee36b4d9faba1ccf2b1a01422fc247c5873d3e294664233ce79ecd6af306e58d71a4f277b89cb9335789a6095a66df23ffab306141c07b
-
Filesize
191B
MD55c1706760b82a4b953624da9a498738b
SHA144eddd2f9c651a8c2ed2861304dc01253886c8dd
SHA256b38fac9c78f01567778e2442f00222a760421cf068810311e49ecc738414175d
SHA512881d9d813d0c054a1b27f8b80a1349309fd7e87d4a44a1b5cb85a0068fd8c0b5d9979a6fc64484685ca8513b9eff944b052f4d8f69d1fc518e1e824f70159274
-
Filesize
36B
MD56783c3ee07c7d151ceac57f1f9c8bed7
SHA117468f98f95bf504cc1f83c49e49a78526b3ea03
SHA2568ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322
SHA512c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
197B
MD58088241160261560a02c84025d107592
SHA1083121f7027557570994c9fc211df61730455bb5
SHA2562072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1
SHA51220d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478