Analysis
-
max time kernel
151s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 13:36
Static task
static1
Behavioral task
behavioral1
Sample
a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68.exe
Resource
win10v2004-20220901-en
General
-
Target
a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68.exe
-
Size
1.3MB
-
MD5
5818b9c7e1e4f408f28f5a6c6d0a7565
-
SHA1
b18ddaf0338af454365b5acd9d5d3ac7a6a890e0
-
SHA256
a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68
-
SHA512
9fbc0219849c3735c35972cb323a393341f2691913676bf1d01159579fe28198db310b6738113550874e14b8c43b050d633c63b34c0a4e1f00fbe53ba4beb057
-
SSDEEP
24576:UJE8PA1dmGeDye5Dt3c2kFOoJU8PaTRFmYvQ49sMZ5D34zvXjycTZPVP6:qtPA8f+e5DpAc6wfmYvXZ5cjZPVP6
Malware Config
Extracted
darkcomet
THENTHACKER
thenthacker.no-ip.org:1604
DC_MUTEX-WPNYUQ7
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
92Uc0EZwdkTP
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Signatures
-
Modifies WinLogon for persistence 2 TTPs 37 IoCs
Processes:
Java.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe -
Executes dropped EXE 64 IoCs
Processes:
Java.exemsdcsc.exeJava.exemsdcsc.exeJava.exemsdcsc.exeJava.exemsdcsc.exeJava.exemsdcsc.exeJava.exemsdcsc.exeJava.exemsdcsc.exeJava.exemsdcsc.exeJava.exemsdcsc.exeJava.exemsdcsc.exeJava.exemsdcsc.exeJava.exemsdcsc.exeJava.exemsdcsc.exeJava.exemsdcsc.exeJava.exemsdcsc.exeJava.exemsdcsc.exeJava.exemsdcsc.exeJava.exemsdcsc.exeJava.exemsdcsc.exeJava.exemsdcsc.exeJava.exemsdcsc.exeJava.exemsdcsc.exeJava.exemsdcsc.exeJava.exemsdcsc.exeJava.exemsdcsc.exeJava.exemsdcsc.exeJava.exemsdcsc.exeJava.exemsdcsc.exeJava.exemsdcsc.exeJava.exemsdcsc.exeJava.exemsdcsc.exeJava.exemsdcsc.exepid process 2036 Java.exe 1676 msdcsc.exe 604 Java.exe 1688 msdcsc.exe 1240 Java.exe 1896 msdcsc.exe 1660 Java.exe 1548 msdcsc.exe 2032 Java.exe 1828 msdcsc.exe 1412 Java.exe 2344 msdcsc.exe 2420 Java.exe 2660 msdcsc.exe 2716 Java.exe 2944 msdcsc.exe 2996 Java.exe 2276 msdcsc.exe 2332 Java.exe 2464 msdcsc.exe 2692 Java.exe 1540 msdcsc.exe 2240 Java.exe 2492 msdcsc.exe 2860 Java.exe 2524 msdcsc.exe 2896 Java.exe 2584 msdcsc.exe 2144 Java.exe 3196 msdcsc.exe 3248 Java.exe 3480 msdcsc.exe 3528 Java.exe 3756 msdcsc.exe 3808 Java.exe 4040 msdcsc.exe 4088 Java.exe 1672 msdcsc.exe 3252 Java.exe 3788 msdcsc.exe 3912 Java.exe 3160 msdcsc.exe 3316 Java.exe 3084 msdcsc.exe 3136 Java.exe 3432 msdcsc.exe 3476 Java.exe 3568 msdcsc.exe 4040 Java.exe 4256 msdcsc.exe 4308 Java.exe 4532 msdcsc.exe 4580 Java.exe 4800 msdcsc.exe 4852 Java.exe 5076 msdcsc.exe 4184 Java.exe 4512 msdcsc.exe 4308 Java.exe 4884 msdcsc.exe 5044 Java.exe 4152 msdcsc.exe 4512 Java.exe 4484 msdcsc.exe -
Sets file to hidden 1 TTPs 64 IoCs
Modifies file attributes to stop it showing in Explorer etc.
Processes:
attrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exepid process 2392 attrib.exe 3576 attrib.exe 3684 attrib.exe 4992 attrib.exe 4256 attrib.exe 5188 attrib.exe 1032 attrib.exe 3256 attrib.exe 3196 attrib.exe 2032 attrib.exe 2232 attrib.exe 2356 attrib.exe 3380 attrib.exe 3672 attrib.exe 1300 attrib.exe 1072 attrib.exe 3416 attrib.exe 5488 attrib.exe 684 attrib.exe 4744 attrib.exe 2976 attrib.exe 5472 attrib.exe 3272 attrib.exe 4180 attrib.exe 4440 attrib.exe 1128 attrib.exe 1768 attrib.exe 2860 attrib.exe 1344 attrib.exe 2576 attrib.exe 4328 attrib.exe 4416 attrib.exe 2592 attrib.exe 2264 attrib.exe 3568 attrib.exe 5020 attrib.exe 4316 attrib.exe 5756 attrib.exe 360 attrib.exe 2576 attrib.exe 4040 attrib.exe 4256 attrib.exe 4704 attrib.exe 2736 attrib.exe 2484 attrib.exe 3104 attrib.exe 3132 attrib.exe 3196 attrib.exe 4732 attrib.exe 3840 attrib.exe 4168 attrib.exe 5088 attrib.exe 2876 attrib.exe 1680 attrib.exe 2528 attrib.exe 2064 attrib.exe 3756 attrib.exe 5744 attrib.exe 4820 attrib.exe 996 attrib.exe 1828 attrib.exe 2152 attrib.exe 2204 attrib.exe 3948 attrib.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd upx C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd upx C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd upx C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd upx C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd upx C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd upx C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd upx C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd upx C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd upx C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd upx C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd upx C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd upx -
Loads dropped DLL 64 IoCs
Processes:
a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68.exeJava.execmd.exeJava.exemsdcsc.exeJava.exemsdcsc.exeJava.exemsdcsc.exeJava.exemsdcsc.exeJava.exemsdcsc.exeJava.exemsdcsc.exeJava.exemsdcsc.exeJava.exemsdcsc.exeJava.exemsdcsc.exeJava.exemsdcsc.exeJava.exemsdcsc.exeJava.exemsdcsc.exeJava.exemsdcsc.exeJava.exemsdcsc.exeJava.exepid process 1416 a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68.exe 1416 a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68.exe 2036 Java.exe 2036 Java.exe 1676 cmd.exe 1676 cmd.exe 604 Java.exe 604 Java.exe 1688 msdcsc.exe 1688 msdcsc.exe 1240 Java.exe 1240 Java.exe 1896 msdcsc.exe 1896 msdcsc.exe 1660 Java.exe 1660 Java.exe 1548 msdcsc.exe 1548 msdcsc.exe 2032 Java.exe 2032 Java.exe 1828 msdcsc.exe 1828 msdcsc.exe 1412 Java.exe 1412 Java.exe 2344 msdcsc.exe 2344 msdcsc.exe 2420 Java.exe 2420 Java.exe 2660 msdcsc.exe 2660 msdcsc.exe 2716 Java.exe 2716 Java.exe 2944 msdcsc.exe 2944 msdcsc.exe 2996 Java.exe 2996 Java.exe 2276 msdcsc.exe 2276 msdcsc.exe 2332 Java.exe 2332 Java.exe 2464 msdcsc.exe 2464 msdcsc.exe 2692 Java.exe 2692 Java.exe 1540 msdcsc.exe 1540 msdcsc.exe 2240 Java.exe 2240 Java.exe 2492 msdcsc.exe 2492 msdcsc.exe 2860 Java.exe 2860 Java.exe 2524 msdcsc.exe 2524 msdcsc.exe 2896 Java.exe 2896 Java.exe 2584 msdcsc.exe 2584 msdcsc.exe 2144 Java.exe 2144 Java.exe 3196 msdcsc.exe 3196 msdcsc.exe 3248 Java.exe 3248 Java.exe -
Adds Run key to start application 2 TTPs 64 IoCs
Processes:
msdcsc.execmd.exeJava.exemsdcsc.exeJava.exeJava.exemsdcsc.exeJava.exemsdcsc.exemsdcsc.exemsdcsc.exeJava.exeJava.exeJava.exemsdcsc.exeJava.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exeJava.exemsdcsc.exeJava.exeJava.exemsdcsc.exeJava.exeJava.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exeJava.exeJava.exeJava.exemsdcsc.exeJava.exeJava.exemsdcsc.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exemsdcsc.exeJava.exeJava.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exeJava.exemsdcsc.exemsdcsc.exeJava.exemsdcsc.exeJava.exeJava.exemsdcsc.exemsdcsc.exeJava.exeJava.exemsdcsc.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Java Runtime = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Java.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Java Runtime = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Java.exe" cmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Java Runtime = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Java.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Java Runtime = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Java.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Java Runtime = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Java.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Java Runtime = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Java.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Java Runtime = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Java.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Java Runtime = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Java.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Java Runtime = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Java.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Java Runtime = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Java.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Java Runtime = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Java.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Java Runtime = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Java.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Java Runtime = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Java.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Java Runtime = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Java.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Java Runtime = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Java.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Java Runtime = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Java.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Java Runtime = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Java.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Java Runtime = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Java.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Java Runtime = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Java.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Java Runtime = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Java.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Java Runtime = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Java.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Java Runtime = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Java.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Java Runtime = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Java.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Java Runtime = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Java.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Java Runtime = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Java.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Java Runtime = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Java.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Java Runtime = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Java.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Java Runtime = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Java.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Java Runtime = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Java.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Java Runtime = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Java.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Java Runtime = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Java.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Java Runtime = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Java.exe" msdcsc.exe -
Drops file in System32 directory 64 IoCs
Processes:
Java.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exedescription ioc process File created C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\ Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe Java.exe File created C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe Java.exe File created C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe Java.exe File created C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe Java.exe File created C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\msdcsc.exe Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe Java.exe File created C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\msdcsc.exe Java.exe File created C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe Java.exe File created C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\msdcsc.exe Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\ Java.exe File created C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\ Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\ Java.exe File created C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\msdcsc.exe Java.exe File created C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\msdcsc.exe Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\ Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\ Java.exe File created C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\msdcsc.exe Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\ Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\ Java.exe File created C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\msdcsc.exe Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\ Java.exe File created C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe Java.exe File created C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe Java.exe File created C:\Windows\SysWOW64\MSDCSC\msdcsc.exe Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe Java.exe File created C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\msdcsc.exe Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe Java.exe File created C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\msdcsc.exe Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\ Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\msdcsc.exe Java.exe File created C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\msdcsc.exe Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe Java.exe File created C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\msdcsc.exe Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\ Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\ Java.exe File created C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\msdcsc.exe Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\ Java.exe File created C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\msdcsc.exe Java.exe File created C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\msdcsc.exe Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\ Java.exe File created C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\msdcsc.exe Java.exe File created C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\msdcsc.exe Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\ Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe Java.exe File created C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe Java.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 64 IoCs
Processes:
rundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings rundll32.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
Java.exeJava.exeJava.exedescription pid process Token: SeIncreaseQuotaPrivilege 2036 Java.exe Token: SeSecurityPrivilege 2036 Java.exe Token: SeTakeOwnershipPrivilege 2036 Java.exe Token: SeLoadDriverPrivilege 2036 Java.exe Token: SeSystemProfilePrivilege 2036 Java.exe Token: SeSystemtimePrivilege 2036 Java.exe Token: SeProfSingleProcessPrivilege 2036 Java.exe Token: SeIncBasePriorityPrivilege 2036 Java.exe Token: SeCreatePagefilePrivilege 2036 Java.exe Token: SeBackupPrivilege 2036 Java.exe Token: SeRestorePrivilege 2036 Java.exe Token: SeShutdownPrivilege 2036 Java.exe Token: SeDebugPrivilege 2036 Java.exe Token: SeSystemEnvironmentPrivilege 2036 Java.exe Token: SeChangeNotifyPrivilege 2036 Java.exe Token: SeRemoteShutdownPrivilege 2036 Java.exe Token: SeUndockPrivilege 2036 Java.exe Token: SeManageVolumePrivilege 2036 Java.exe Token: SeImpersonatePrivilege 2036 Java.exe Token: SeCreateGlobalPrivilege 2036 Java.exe Token: 33 2036 Java.exe Token: 34 2036 Java.exe Token: 35 2036 Java.exe Token: SeIncreaseQuotaPrivilege 604 Java.exe Token: SeSecurityPrivilege 604 Java.exe Token: SeTakeOwnershipPrivilege 604 Java.exe Token: SeLoadDriverPrivilege 604 Java.exe Token: SeSystemProfilePrivilege 604 Java.exe Token: SeSystemtimePrivilege 604 Java.exe Token: SeProfSingleProcessPrivilege 604 Java.exe Token: SeIncBasePriorityPrivilege 604 Java.exe Token: SeCreatePagefilePrivilege 604 Java.exe Token: SeBackupPrivilege 604 Java.exe Token: SeRestorePrivilege 604 Java.exe Token: SeShutdownPrivilege 604 Java.exe Token: SeDebugPrivilege 604 Java.exe Token: SeSystemEnvironmentPrivilege 604 Java.exe Token: SeChangeNotifyPrivilege 604 Java.exe Token: SeRemoteShutdownPrivilege 604 Java.exe Token: SeUndockPrivilege 604 Java.exe Token: SeManageVolumePrivilege 604 Java.exe Token: SeImpersonatePrivilege 604 Java.exe Token: SeCreateGlobalPrivilege 604 Java.exe Token: 33 604 Java.exe Token: 34 604 Java.exe Token: 35 604 Java.exe Token: SeIncreaseQuotaPrivilege 1240 Java.exe Token: SeSecurityPrivilege 1240 Java.exe Token: SeTakeOwnershipPrivilege 1240 Java.exe Token: SeLoadDriverPrivilege 1240 Java.exe Token: SeSystemProfilePrivilege 1240 Java.exe Token: SeSystemtimePrivilege 1240 Java.exe Token: SeProfSingleProcessPrivilege 1240 Java.exe Token: SeIncBasePriorityPrivilege 1240 Java.exe Token: SeCreatePagefilePrivilege 1240 Java.exe Token: SeBackupPrivilege 1240 Java.exe Token: SeRestorePrivilege 1240 Java.exe Token: SeShutdownPrivilege 1240 Java.exe Token: SeDebugPrivilege 1240 Java.exe Token: SeSystemEnvironmentPrivilege 1240 Java.exe Token: SeChangeNotifyPrivilege 1240 Java.exe Token: SeRemoteShutdownPrivilege 1240 Java.exe Token: SeUndockPrivilege 1240 Java.exe Token: SeManageVolumePrivilege 1240 Java.exe -
Suspicious use of FindShellTrayWindow 37 IoCs
Processes:
DllHost.exepid process 1432 DllHost.exe 1432 DllHost.exe 1432 DllHost.exe 1432 DllHost.exe 1432 DllHost.exe 1432 DllHost.exe 1432 DllHost.exe 1432 DllHost.exe 1432 DllHost.exe 1432 DllHost.exe 1432 DllHost.exe 1432 DllHost.exe 1432 DllHost.exe 1432 DllHost.exe 1432 DllHost.exe 1432 DllHost.exe 1432 DllHost.exe 1432 DllHost.exe 1432 DllHost.exe 1432 DllHost.exe 1432 DllHost.exe 1432 DllHost.exe 1432 DllHost.exe 1432 DllHost.exe 1432 DllHost.exe 1432 DllHost.exe 1432 DllHost.exe 1432 DllHost.exe 1432 DllHost.exe 1432 DllHost.exe 1432 DllHost.exe 1432 DllHost.exe 1432 DllHost.exe 1432 DllHost.exe 1432 DllHost.exe 1432 DllHost.exe 1432 DllHost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
AcroRd32.exepid process 1208 AcroRd32.exe 1208 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68.exeJava.execmd.execmd.exerundll32.exemsdcsc.exedescription pid process target process PID 1416 wrote to memory of 2020 1416 a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68.exe rundll32.exe PID 1416 wrote to memory of 2020 1416 a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68.exe rundll32.exe PID 1416 wrote to memory of 2020 1416 a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68.exe rundll32.exe PID 1416 wrote to memory of 2020 1416 a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68.exe rundll32.exe PID 1416 wrote to memory of 2020 1416 a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68.exe rundll32.exe PID 1416 wrote to memory of 2020 1416 a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68.exe rundll32.exe PID 1416 wrote to memory of 2020 1416 a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68.exe rundll32.exe PID 1416 wrote to memory of 2036 1416 a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68.exe Java.exe PID 1416 wrote to memory of 2036 1416 a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68.exe Java.exe PID 1416 wrote to memory of 2036 1416 a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68.exe Java.exe PID 1416 wrote to memory of 2036 1416 a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68.exe Java.exe PID 1416 wrote to memory of 2036 1416 a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68.exe Java.exe PID 1416 wrote to memory of 2036 1416 a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68.exe Java.exe PID 1416 wrote to memory of 2036 1416 a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68.exe Java.exe PID 2036 wrote to memory of 316 2036 Java.exe rundll32.exe PID 2036 wrote to memory of 316 2036 Java.exe rundll32.exe PID 2036 wrote to memory of 316 2036 Java.exe rundll32.exe PID 2036 wrote to memory of 316 2036 Java.exe rundll32.exe PID 2036 wrote to memory of 316 2036 Java.exe rundll32.exe PID 2036 wrote to memory of 316 2036 Java.exe rundll32.exe PID 2036 wrote to memory of 316 2036 Java.exe rundll32.exe PID 2036 wrote to memory of 520 2036 Java.exe cmd.exe PID 2036 wrote to memory of 520 2036 Java.exe cmd.exe PID 2036 wrote to memory of 520 2036 Java.exe cmd.exe PID 2036 wrote to memory of 520 2036 Java.exe cmd.exe PID 2036 wrote to memory of 1172 2036 Java.exe cmd.exe PID 2036 wrote to memory of 1172 2036 Java.exe cmd.exe PID 2036 wrote to memory of 1172 2036 Java.exe cmd.exe PID 2036 wrote to memory of 1172 2036 Java.exe cmd.exe PID 1172 wrote to memory of 824 1172 cmd.exe attrib.exe PID 1172 wrote to memory of 824 1172 cmd.exe attrib.exe PID 1172 wrote to memory of 824 1172 cmd.exe attrib.exe PID 1172 wrote to memory of 824 1172 cmd.exe attrib.exe PID 520 wrote to memory of 1300 520 cmd.exe attrib.exe PID 520 wrote to memory of 1300 520 cmd.exe attrib.exe PID 520 wrote to memory of 1300 520 cmd.exe attrib.exe PID 520 wrote to memory of 1300 520 cmd.exe attrib.exe PID 316 wrote to memory of 1208 316 rundll32.exe AcroRd32.exe PID 316 wrote to memory of 1208 316 rundll32.exe AcroRd32.exe PID 316 wrote to memory of 1208 316 rundll32.exe AcroRd32.exe PID 316 wrote to memory of 1208 316 rundll32.exe AcroRd32.exe PID 2036 wrote to memory of 1920 2036 Java.exe notepad.exe PID 2036 wrote to memory of 1920 2036 Java.exe notepad.exe PID 2036 wrote to memory of 1920 2036 Java.exe notepad.exe PID 2036 wrote to memory of 1920 2036 Java.exe notepad.exe PID 2036 wrote to memory of 1920 2036 Java.exe notepad.exe PID 2036 wrote to memory of 1920 2036 Java.exe notepad.exe PID 2036 wrote to memory of 1920 2036 Java.exe notepad.exe PID 2036 wrote to memory of 1920 2036 Java.exe notepad.exe PID 2036 wrote to memory of 1920 2036 Java.exe notepad.exe PID 2036 wrote to memory of 1920 2036 Java.exe notepad.exe PID 2036 wrote to memory of 1920 2036 Java.exe notepad.exe PID 2036 wrote to memory of 1920 2036 Java.exe notepad.exe PID 2036 wrote to memory of 1920 2036 Java.exe notepad.exe PID 2036 wrote to memory of 1920 2036 Java.exe notepad.exe PID 2036 wrote to memory of 1920 2036 Java.exe notepad.exe PID 2036 wrote to memory of 1920 2036 Java.exe notepad.exe PID 2036 wrote to memory of 1920 2036 Java.exe notepad.exe PID 2036 wrote to memory of 1920 2036 Java.exe notepad.exe PID 2036 wrote to memory of 1676 2036 Java.exe msdcsc.exe PID 2036 wrote to memory of 1676 2036 Java.exe msdcsc.exe PID 2036 wrote to memory of 1676 2036 Java.exe msdcsc.exe PID 2036 wrote to memory of 1676 2036 Java.exe msdcsc.exe PID 1676 wrote to memory of 1584 1676 msdcsc.exe rundll32.exe -
Views/modifies file attributes 1 TTPs 64 IoCs
Processes:
attrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exepid process 1128 attrib.exe 1768 attrib.exe 4256 attrib.exe 5196 attrib.exe 684 attrib.exe 2356 attrib.exe 3104 attrib.exe 3380 attrib.exe 4992 attrib.exe 2976 attrib.exe 2716 attrib.exe 2576 attrib.exe 3272 attrib.exe 4040 attrib.exe 1032 attrib.exe 3840 attrib.exe 2484 attrib.exe 3576 attrib.exe 4744 attrib.exe 4328 attrib.exe 4416 attrib.exe 5188 attrib.exe 1072 attrib.exe 1344 attrib.exe 3256 attrib.exe 4180 attrib.exe 2264 attrib.exe 2524 attrib.exe 2152 attrib.exe 2204 attrib.exe 4316 attrib.exe 4256 attrib.exe 2860 attrib.exe 1540 attrib.exe 3132 attrib.exe 3416 attrib.exe 3684 attrib.exe 4468 attrib.exe 5472 attrib.exe 2232 attrib.exe 2868 attrib.exe 3948 attrib.exe 1680 attrib.exe 2192 attrib.exe 2064 attrib.exe 2876 attrib.exe 4440 attrib.exe 1464 attrib.exe 3672 attrib.exe 3756 attrib.exe 5488 attrib.exe 2032 attrib.exe 2592 attrib.exe 3568 attrib.exe 5756 attrib.exe 1300 attrib.exe 824 attrib.exe 360 attrib.exe 2392 attrib.exe 3956 attrib.exe 3196 attrib.exe 4168 attrib.exe 4820 attrib.exe 5088 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68.exe"C:\Users\Admin\AppData\Local\Temp\a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd2⤵
- Modifies registry class
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd3⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd"4⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h4⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h4⤵
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad3⤵
-
C:\Windows\SysWOW64\MSDCSC\msdcsc.exe"C:\Windows\system32\MSDCSC\msdcsc.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd4⤵
- Modifies registry class
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"4⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd5⤵
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd"6⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h5⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h6⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h5⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h6⤵
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad5⤵
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\msdcsc.exe"C:\Windows\system32\MSDCSC\92Uc0EZwdkTP\msdcsc.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd6⤵
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"6⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd7⤵
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd"8⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h7⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h8⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h7⤵
- Loads dropped DLL
- Adds Run key to start application
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h8⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad7⤵
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"C:\Windows\system32\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd8⤵
- Modifies registry class
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"8⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd9⤵
- Modifies registry class
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd"10⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h9⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h10⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h9⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h10⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad9⤵
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"C:\Windows\system32\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd10⤵
- Modifies registry class
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"10⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd11⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h11⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h12⤵
- Sets file to hidden
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h11⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h12⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad11⤵
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"C:\Windows\system32\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd12⤵
- Modifies registry class
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd"13⤵
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"12⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd13⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h13⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h14⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h13⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h14⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad13⤵
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"C:\Windows\system32\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd14⤵
- Modifies registry class
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"14⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd15⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h15⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h16⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h15⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h16⤵
- Sets file to hidden
-
C:\Windows\SysWOW64\notepad.exenotepad15⤵
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"C:\Windows\system32\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd16⤵
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"16⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd17⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h17⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h18⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h17⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h18⤵
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad17⤵
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"C:\Windows\system32\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd18⤵
- Modifies registry class
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"18⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd19⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h19⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h20⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h19⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h20⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad19⤵
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"C:\Windows\system32\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd20⤵
- Modifies registry class
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"20⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd21⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h21⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h22⤵
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h21⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h22⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad21⤵
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"C:\Windows\system32\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd22⤵
- Modifies registry class
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"22⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd23⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h23⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h24⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h23⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h24⤵
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad23⤵
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"C:\Windows\system32\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"23⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd24⤵
- Modifies registry class
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"24⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd25⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h25⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h26⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h25⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h26⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad25⤵
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"C:\Windows\system32\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"25⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd26⤵
- Modifies registry class
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"26⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd27⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h27⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h28⤵
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h27⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h28⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad27⤵
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"C:\Windows\system32\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"27⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd28⤵
- Modifies registry class
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"28⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd29⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h29⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h30⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h29⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h30⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad29⤵
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"C:\Windows\system32\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"29⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd30⤵
- Modifies registry class
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"30⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd31⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h31⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h32⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h31⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h32⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad31⤵
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"C:\Windows\system32\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"31⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd32⤵
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"32⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd33⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h33⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h34⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h33⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h34⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad33⤵
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"C:\Windows\system32\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"33⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd34⤵
- Modifies registry class
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"34⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd35⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h35⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h36⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h35⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h36⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad35⤵
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"C:\Windows\system32\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"35⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd36⤵
- Modifies registry class
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"36⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd37⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h37⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h38⤵
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h37⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h38⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad37⤵
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"C:\Windows\system32\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"37⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd38⤵
- Modifies registry class
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"38⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd39⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h39⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h40⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h39⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h40⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad39⤵
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"C:\Windows\system32\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"39⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd40⤵
- Modifies registry class
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"40⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd41⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h41⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h42⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h41⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h42⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad41⤵
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"C:\Windows\system32\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"41⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd42⤵
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"42⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd43⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h43⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h44⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h43⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h44⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad43⤵
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"C:\Windows\system32\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"43⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd44⤵
- Modifies registry class
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"44⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd45⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h45⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h46⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h45⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h46⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad45⤵
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"C:\Windows\system32\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"45⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd46⤵
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"46⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd47⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h47⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h48⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h47⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h48⤵
- Sets file to hidden
-
C:\Windows\SysWOW64\notepad.exenotepad47⤵
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"C:\Windows\system32\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"47⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd48⤵
- Modifies registry class
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"48⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd49⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h49⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h50⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h49⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h50⤵
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad49⤵
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"C:\Windows\system32\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"49⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd50⤵
- Modifies registry class
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"50⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd51⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h51⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h52⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h51⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h52⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad51⤵
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"C:\Windows\system32\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"51⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd52⤵
- Modifies registry class
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"52⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd53⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h53⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h54⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h53⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h54⤵
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad53⤵
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"C:\Windows\system32\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"53⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd54⤵
- Modifies registry class
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"54⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd55⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h55⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h56⤵
- Sets file to hidden
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h55⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h56⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad55⤵
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"C:\Windows\system32\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"55⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd56⤵
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"56⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd57⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h57⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h58⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h57⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h58⤵
- Sets file to hidden
-
C:\Windows\SysWOW64\notepad.exenotepad57⤵
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"C:\Windows\system32\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"57⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd58⤵
- Modifies registry class
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"58⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd59⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h59⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h60⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h59⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h60⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad59⤵
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"C:\Windows\system32\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"59⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd60⤵
- Modifies registry class
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"60⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd61⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h61⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h62⤵
- Sets file to hidden
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h61⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h62⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad61⤵
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"C:\Windows\system32\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"61⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd62⤵
- Modifies registry class
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"62⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd63⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h63⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h64⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h63⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h64⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad63⤵
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"C:\Windows\system32\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"63⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd64⤵
- Modifies registry class
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"64⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd65⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h65⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h66⤵
- Sets file to hidden
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h65⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h66⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad65⤵
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"C:\Windows\system32\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"65⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd66⤵
- Modifies registry class
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"66⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd67⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h67⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h68⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h67⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h68⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad67⤵
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"C:\Windows\system32\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"67⤵
- Adds Run key to start application
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd68⤵
- Modifies registry class
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"68⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd69⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h69⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h70⤵
- Sets file to hidden
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h69⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h70⤵
- Sets file to hidden
-
C:\Windows\SysWOW64\notepad.exenotepad69⤵
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"C:\Windows\system32\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"69⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd70⤵
- Modifies registry class
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"70⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd71⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h71⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h72⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h71⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h72⤵
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad71⤵
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"C:\Windows\system32\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"71⤵
- Adds Run key to start application
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd72⤵
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"72⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd73⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h73⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h74⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h73⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h74⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad73⤵
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"C:\Windows\system32\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"73⤵
- Adds Run key to start application
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd74⤵
- Modifies registry class
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"74⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd75⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h75⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h76⤵
- Sets file to hidden
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h75⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h76⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad75⤵
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\DI-TDR7.JPGFilesize
690KB
MD514f0e088c890ad590f84ae2170e6a94d
SHA14fa31298a2824081738ab90d17aaaa03353e1b0e
SHA25656adf781705c9cb171f965d6dd31a07aca27ced68f4d2e6c9d37dab2d1fb909c
SHA51288ece7985fec461e599f126e68b92daf1228e8057a40a3d9675a53867d613c059fa1b33da7c33f068db5b114da05401a8bef0b6856df9a9287d02d68d071c75d
-
C:\Users\Admin\AppData\Local\Temp\DI-TDR7.JPGFilesize
690KB
MD514f0e088c890ad590f84ae2170e6a94d
SHA14fa31298a2824081738ab90d17aaaa03353e1b0e
SHA25656adf781705c9cb171f965d6dd31a07aca27ced68f4d2e6c9d37dab2d1fb909c
SHA51288ece7985fec461e599f126e68b92daf1228e8057a40a3d9675a53867d613c059fa1b33da7c33f068db5b114da05401a8bef0b6856df9a9287d02d68d071c75d
-
C:\Users\Admin\AppData\Local\Temp\DI-TDR7.JPGFilesize
690KB
MD514f0e088c890ad590f84ae2170e6a94d
SHA14fa31298a2824081738ab90d17aaaa03353e1b0e
SHA25656adf781705c9cb171f965d6dd31a07aca27ced68f4d2e6c9d37dab2d1fb909c
SHA51288ece7985fec461e599f126e68b92daf1228e8057a40a3d9675a53867d613c059fa1b33da7c33f068db5b114da05401a8bef0b6856df9a9287d02d68d071c75d
-
C:\Users\Admin\AppData\Local\Temp\DI-TDR7.JPGFilesize
690KB
MD514f0e088c890ad590f84ae2170e6a94d
SHA14fa31298a2824081738ab90d17aaaa03353e1b0e
SHA25656adf781705c9cb171f965d6dd31a07aca27ced68f4d2e6c9d37dab2d1fb909c
SHA51288ece7985fec461e599f126e68b92daf1228e8057a40a3d9675a53867d613c059fa1b33da7c33f068db5b114da05401a8bef0b6856df9a9287d02d68d071c75d
-
C:\Users\Admin\AppData\Local\Temp\DI-TDR7.JPGFilesize
690KB
MD514f0e088c890ad590f84ae2170e6a94d
SHA14fa31298a2824081738ab90d17aaaa03353e1b0e
SHA25656adf781705c9cb171f965d6dd31a07aca27ced68f4d2e6c9d37dab2d1fb909c
SHA51288ece7985fec461e599f126e68b92daf1228e8057a40a3d9675a53867d613c059fa1b33da7c33f068db5b114da05401a8bef0b6856df9a9287d02d68d071c75d
-
C:\Users\Admin\AppData\Local\Temp\DI-TDR7.JPGFilesize
690KB
MD514f0e088c890ad590f84ae2170e6a94d
SHA14fa31298a2824081738ab90d17aaaa03353e1b0e
SHA25656adf781705c9cb171f965d6dd31a07aca27ced68f4d2e6c9d37dab2d1fb909c
SHA51288ece7985fec461e599f126e68b92daf1228e8057a40a3d9675a53867d613c059fa1b33da7c33f068db5b114da05401a8bef0b6856df9a9287d02d68d071c75d
-
C:\Users\Admin\AppData\Local\Temp\bl4ckb4ndFilesize
34KB
MD546f30194bd5792c73072d6cd782820d6
SHA1367635e048ba13741b461b864b8adc76841ae476
SHA2568bc9f898a96c6c90517a24919a45888f68d92232a8592b3cae8610c2d279cfa3
SHA512888aec428b266b4aed6e895d0c075c56780548396f678720423de01a173911e3d00229bd1672bf073de54323043d44277974f15852393b4d97b915561a5ca510
-
C:\Users\Admin\AppData\Local\Temp\bl4ckb4ndFilesize
34KB
MD546f30194bd5792c73072d6cd782820d6
SHA1367635e048ba13741b461b864b8adc76841ae476
SHA2568bc9f898a96c6c90517a24919a45888f68d92232a8592b3cae8610c2d279cfa3
SHA512888aec428b266b4aed6e895d0c075c56780548396f678720423de01a173911e3d00229bd1672bf073de54323043d44277974f15852393b4d97b915561a5ca510
-
C:\Users\Admin\AppData\Local\Temp\bl4ckb4ndFilesize
34KB
MD546f30194bd5792c73072d6cd782820d6
SHA1367635e048ba13741b461b864b8adc76841ae476
SHA2568bc9f898a96c6c90517a24919a45888f68d92232a8592b3cae8610c2d279cfa3
SHA512888aec428b266b4aed6e895d0c075c56780548396f678720423de01a173911e3d00229bd1672bf073de54323043d44277974f15852393b4d97b915561a5ca510
-
C:\Users\Admin\AppData\Local\Temp\bl4ckb4ndFilesize
34KB
MD546f30194bd5792c73072d6cd782820d6
SHA1367635e048ba13741b461b864b8adc76841ae476
SHA2568bc9f898a96c6c90517a24919a45888f68d92232a8592b3cae8610c2d279cfa3
SHA512888aec428b266b4aed6e895d0c075c56780548396f678720423de01a173911e3d00229bd1672bf073de54323043d44277974f15852393b4d97b915561a5ca510
-
C:\Users\Admin\AppData\Local\Temp\bl4ckb4ndFilesize
34KB
MD546f30194bd5792c73072d6cd782820d6
SHA1367635e048ba13741b461b864b8adc76841ae476
SHA2568bc9f898a96c6c90517a24919a45888f68d92232a8592b3cae8610c2d279cfa3
SHA512888aec428b266b4aed6e895d0c075c56780548396f678720423de01a173911e3d00229bd1672bf073de54323043d44277974f15852393b4d97b915561a5ca510
-
C:\Users\Admin\AppData\Local\Temp\bl4ckb4ndFilesize
34KB
MD546f30194bd5792c73072d6cd782820d6
SHA1367635e048ba13741b461b864b8adc76841ae476
SHA2568bc9f898a96c6c90517a24919a45888f68d92232a8592b3cae8610c2d279cfa3
SHA512888aec428b266b4aed6e895d0c075c56780548396f678720423de01a173911e3d00229bd1672bf073de54323043d44277974f15852393b4d97b915561a5ca510
-
C:\Users\Admin\AppData\Local\Temp\bl4ckb4ndFilesize
34KB
MD546f30194bd5792c73072d6cd782820d6
SHA1367635e048ba13741b461b864b8adc76841ae476
SHA2568bc9f898a96c6c90517a24919a45888f68d92232a8592b3cae8610c2d279cfa3
SHA512888aec428b266b4aed6e895d0c075c56780548396f678720423de01a173911e3d00229bd1672bf073de54323043d44277974f15852393b4d97b915561a5ca510
-
C:\Users\Admin\AppData\Local\Temp\bl4ckb4ndFilesize
34KB
MD546f30194bd5792c73072d6cd782820d6
SHA1367635e048ba13741b461b864b8adc76841ae476
SHA2568bc9f898a96c6c90517a24919a45888f68d92232a8592b3cae8610c2d279cfa3
SHA512888aec428b266b4aed6e895d0c075c56780548396f678720423de01a173911e3d00229bd1672bf073de54323043d44277974f15852393b4d97b915561a5ca510
-
C:\Users\Admin\AppData\Local\Temp\bl4ckb4ndFilesize
34KB
MD546f30194bd5792c73072d6cd782820d6
SHA1367635e048ba13741b461b864b8adc76841ae476
SHA2568bc9f898a96c6c90517a24919a45888f68d92232a8592b3cae8610c2d279cfa3
SHA512888aec428b266b4aed6e895d0c075c56780548396f678720423de01a173911e3d00229bd1672bf073de54323043d44277974f15852393b4d97b915561a5ca510
-
C:\Users\Admin\AppData\Local\Temp\bl4ckb4ndFilesize
34KB
MD546f30194bd5792c73072d6cd782820d6
SHA1367635e048ba13741b461b864b8adc76841ae476
SHA2568bc9f898a96c6c90517a24919a45888f68d92232a8592b3cae8610c2d279cfa3
SHA512888aec428b266b4aed6e895d0c075c56780548396f678720423de01a173911e3d00229bd1672bf073de54323043d44277974f15852393b4d97b915561a5ca510
-
C:\Users\Admin\AppData\Local\Temp\bl4ckb4ndFilesize
34KB
MD546f30194bd5792c73072d6cd782820d6
SHA1367635e048ba13741b461b864b8adc76841ae476
SHA2568bc9f898a96c6c90517a24919a45888f68d92232a8592b3cae8610c2d279cfa3
SHA512888aec428b266b4aed6e895d0c075c56780548396f678720423de01a173911e3d00229bd1672bf073de54323043d44277974f15852393b4d97b915561a5ca510
-
C:\Users\Admin\AppData\Local\Temp\bl4ckb4ndFilesize
34KB
MD546f30194bd5792c73072d6cd782820d6
SHA1367635e048ba13741b461b864b8adc76841ae476
SHA2568bc9f898a96c6c90517a24919a45888f68d92232a8592b3cae8610c2d279cfa3
SHA512888aec428b266b4aed6e895d0c075c56780548396f678720423de01a173911e3d00229bd1672bf073de54323043d44277974f15852393b4d97b915561a5ca510
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exeFilesize
1.3MB
MD55818b9c7e1e4f408f28f5a6c6d0a7565
SHA1b18ddaf0338af454365b5acd9d5d3ac7a6a890e0
SHA256a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68
SHA5129fbc0219849c3735c35972cb323a393341f2691913676bf1d01159579fe28198db310b6738113550874e14b8c43b050d633c63b34c0a4e1f00fbe53ba4beb057
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exeFilesize
1.3MB
MD55818b9c7e1e4f408f28f5a6c6d0a7565
SHA1b18ddaf0338af454365b5acd9d5d3ac7a6a890e0
SHA256a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68
SHA5129fbc0219849c3735c35972cb323a393341f2691913676bf1d01159579fe28198db310b6738113550874e14b8c43b050d633c63b34c0a4e1f00fbe53ba4beb057
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exeFilesize
1.3MB
MD55818b9c7e1e4f408f28f5a6c6d0a7565
SHA1b18ddaf0338af454365b5acd9d5d3ac7a6a890e0
SHA256a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68
SHA5129fbc0219849c3735c35972cb323a393341f2691913676bf1d01159579fe28198db310b6738113550874e14b8c43b050d633c63b34c0a4e1f00fbe53ba4beb057
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exeFilesize
1.3MB
MD55818b9c7e1e4f408f28f5a6c6d0a7565
SHA1b18ddaf0338af454365b5acd9d5d3ac7a6a890e0
SHA256a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68
SHA5129fbc0219849c3735c35972cb323a393341f2691913676bf1d01159579fe28198db310b6738113550874e14b8c43b050d633c63b34c0a4e1f00fbe53ba4beb057
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exeFilesize
1.3MB
MD55818b9c7e1e4f408f28f5a6c6d0a7565
SHA1b18ddaf0338af454365b5acd9d5d3ac7a6a890e0
SHA256a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68
SHA5129fbc0219849c3735c35972cb323a393341f2691913676bf1d01159579fe28198db310b6738113550874e14b8c43b050d633c63b34c0a4e1f00fbe53ba4beb057
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exeFilesize
1.3MB
MD55818b9c7e1e4f408f28f5a6c6d0a7565
SHA1b18ddaf0338af454365b5acd9d5d3ac7a6a890e0
SHA256a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68
SHA5129fbc0219849c3735c35972cb323a393341f2691913676bf1d01159579fe28198db310b6738113550874e14b8c43b050d633c63b34c0a4e1f00fbe53ba4beb057
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exeFilesize
1.3MB
MD55818b9c7e1e4f408f28f5a6c6d0a7565
SHA1b18ddaf0338af454365b5acd9d5d3ac7a6a890e0
SHA256a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68
SHA5129fbc0219849c3735c35972cb323a393341f2691913676bf1d01159579fe28198db310b6738113550874e14b8c43b050d633c63b34c0a4e1f00fbe53ba4beb057
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exeFilesize
1.3MB
MD55818b9c7e1e4f408f28f5a6c6d0a7565
SHA1b18ddaf0338af454365b5acd9d5d3ac7a6a890e0
SHA256a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68
SHA5129fbc0219849c3735c35972cb323a393341f2691913676bf1d01159579fe28198db310b6738113550874e14b8c43b050d633c63b34c0a4e1f00fbe53ba4beb057
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exeFilesize
1.3MB
MD55818b9c7e1e4f408f28f5a6c6d0a7565
SHA1b18ddaf0338af454365b5acd9d5d3ac7a6a890e0
SHA256a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68
SHA5129fbc0219849c3735c35972cb323a393341f2691913676bf1d01159579fe28198db310b6738113550874e14b8c43b050d633c63b34c0a4e1f00fbe53ba4beb057
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exeFilesize
1.3MB
MD55818b9c7e1e4f408f28f5a6c6d0a7565
SHA1b18ddaf0338af454365b5acd9d5d3ac7a6a890e0
SHA256a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68
SHA5129fbc0219849c3735c35972cb323a393341f2691913676bf1d01159579fe28198db310b6738113550874e14b8c43b050d633c63b34c0a4e1f00fbe53ba4beb057
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exeFilesize
1.3MB
MD55818b9c7e1e4f408f28f5a6c6d0a7565
SHA1b18ddaf0338af454365b5acd9d5d3ac7a6a890e0
SHA256a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68
SHA5129fbc0219849c3735c35972cb323a393341f2691913676bf1d01159579fe28198db310b6738113550874e14b8c43b050d633c63b34c0a4e1f00fbe53ba4beb057
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exeFilesize
1.3MB
MD55818b9c7e1e4f408f28f5a6c6d0a7565
SHA1b18ddaf0338af454365b5acd9d5d3ac7a6a890e0
SHA256a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68
SHA5129fbc0219849c3735c35972cb323a393341f2691913676bf1d01159579fe28198db310b6738113550874e14b8c43b050d633c63b34c0a4e1f00fbe53ba4beb057
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exeFilesize
1.3MB
MD55818b9c7e1e4f408f28f5a6c6d0a7565
SHA1b18ddaf0338af454365b5acd9d5d3ac7a6a890e0
SHA256a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68
SHA5129fbc0219849c3735c35972cb323a393341f2691913676bf1d01159579fe28198db310b6738113550874e14b8c43b050d633c63b34c0a4e1f00fbe53ba4beb057
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\msdcsc.exeFilesize
1.3MB
MD55818b9c7e1e4f408f28f5a6c6d0a7565
SHA1b18ddaf0338af454365b5acd9d5d3ac7a6a890e0
SHA256a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68
SHA5129fbc0219849c3735c35972cb323a393341f2691913676bf1d01159579fe28198db310b6738113550874e14b8c43b050d633c63b34c0a4e1f00fbe53ba4beb057
-
C:\Windows\SysWOW64\MSDCSC\msdcsc.exeFilesize
1.3MB
MD55818b9c7e1e4f408f28f5a6c6d0a7565
SHA1b18ddaf0338af454365b5acd9d5d3ac7a6a890e0
SHA256a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68
SHA5129fbc0219849c3735c35972cb323a393341f2691913676bf1d01159579fe28198db310b6738113550874e14b8c43b050d633c63b34c0a4e1f00fbe53ba4beb057
-
C:\Windows\SysWOW64\MSDCSC\msdcsc.exeFilesize
1.3MB
MD55818b9c7e1e4f408f28f5a6c6d0a7565
SHA1b18ddaf0338af454365b5acd9d5d3ac7a6a890e0
SHA256a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68
SHA5129fbc0219849c3735c35972cb323a393341f2691913676bf1d01159579fe28198db310b6738113550874e14b8c43b050d633c63b34c0a4e1f00fbe53ba4beb057
-
\??\PIPE\srvsvcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\PIPE\srvsvcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\PIPE\srvsvcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\PIPE\srvsvcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\PIPE\srvsvcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\Users\Admin\AppData\Roaming\Adobe\Java.exeFilesize
1.3MB
MD55818b9c7e1e4f408f28f5a6c6d0a7565
SHA1b18ddaf0338af454365b5acd9d5d3ac7a6a890e0
SHA256a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68
SHA5129fbc0219849c3735c35972cb323a393341f2691913676bf1d01159579fe28198db310b6738113550874e14b8c43b050d633c63b34c0a4e1f00fbe53ba4beb057
-
\Users\Admin\AppData\Roaming\Adobe\Java.exeFilesize
1.3MB
MD55818b9c7e1e4f408f28f5a6c6d0a7565
SHA1b18ddaf0338af454365b5acd9d5d3ac7a6a890e0
SHA256a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68
SHA5129fbc0219849c3735c35972cb323a393341f2691913676bf1d01159579fe28198db310b6738113550874e14b8c43b050d633c63b34c0a4e1f00fbe53ba4beb057
-
\Users\Admin\AppData\Roaming\Adobe\Java.exeFilesize
1.3MB
MD55818b9c7e1e4f408f28f5a6c6d0a7565
SHA1b18ddaf0338af454365b5acd9d5d3ac7a6a890e0
SHA256a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68
SHA5129fbc0219849c3735c35972cb323a393341f2691913676bf1d01159579fe28198db310b6738113550874e14b8c43b050d633c63b34c0a4e1f00fbe53ba4beb057
-
\Users\Admin\AppData\Roaming\Adobe\Java.exeFilesize
1.3MB
MD55818b9c7e1e4f408f28f5a6c6d0a7565
SHA1b18ddaf0338af454365b5acd9d5d3ac7a6a890e0
SHA256a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68
SHA5129fbc0219849c3735c35972cb323a393341f2691913676bf1d01159579fe28198db310b6738113550874e14b8c43b050d633c63b34c0a4e1f00fbe53ba4beb057
-
\Users\Admin\AppData\Roaming\Adobe\Java.exeFilesize
1.3MB
MD55818b9c7e1e4f408f28f5a6c6d0a7565
SHA1b18ddaf0338af454365b5acd9d5d3ac7a6a890e0
SHA256a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68
SHA5129fbc0219849c3735c35972cb323a393341f2691913676bf1d01159579fe28198db310b6738113550874e14b8c43b050d633c63b34c0a4e1f00fbe53ba4beb057
-
\Users\Admin\AppData\Roaming\Adobe\Java.exeFilesize
1.3MB
MD55818b9c7e1e4f408f28f5a6c6d0a7565
SHA1b18ddaf0338af454365b5acd9d5d3ac7a6a890e0
SHA256a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68
SHA5129fbc0219849c3735c35972cb323a393341f2691913676bf1d01159579fe28198db310b6738113550874e14b8c43b050d633c63b34c0a4e1f00fbe53ba4beb057
-
\Users\Admin\AppData\Roaming\Adobe\Java.exeFilesize
1.3MB
MD55818b9c7e1e4f408f28f5a6c6d0a7565
SHA1b18ddaf0338af454365b5acd9d5d3ac7a6a890e0
SHA256a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68
SHA5129fbc0219849c3735c35972cb323a393341f2691913676bf1d01159579fe28198db310b6738113550874e14b8c43b050d633c63b34c0a4e1f00fbe53ba4beb057
-
\Users\Admin\AppData\Roaming\Adobe\Java.exeFilesize
1.3MB
MD55818b9c7e1e4f408f28f5a6c6d0a7565
SHA1b18ddaf0338af454365b5acd9d5d3ac7a6a890e0
SHA256a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68
SHA5129fbc0219849c3735c35972cb323a393341f2691913676bf1d01159579fe28198db310b6738113550874e14b8c43b050d633c63b34c0a4e1f00fbe53ba4beb057
-
\Users\Admin\AppData\Roaming\Adobe\Java.exeFilesize
1.3MB
MD55818b9c7e1e4f408f28f5a6c6d0a7565
SHA1b18ddaf0338af454365b5acd9d5d3ac7a6a890e0
SHA256a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68
SHA5129fbc0219849c3735c35972cb323a393341f2691913676bf1d01159579fe28198db310b6738113550874e14b8c43b050d633c63b34c0a4e1f00fbe53ba4beb057
-
\Users\Admin\AppData\Roaming\Adobe\Java.exeFilesize
1.3MB
MD55818b9c7e1e4f408f28f5a6c6d0a7565
SHA1b18ddaf0338af454365b5acd9d5d3ac7a6a890e0
SHA256a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68
SHA5129fbc0219849c3735c35972cb323a393341f2691913676bf1d01159579fe28198db310b6738113550874e14b8c43b050d633c63b34c0a4e1f00fbe53ba4beb057
-
\Users\Admin\AppData\Roaming\Adobe\Java.exeFilesize
1.3MB
MD55818b9c7e1e4f408f28f5a6c6d0a7565
SHA1b18ddaf0338af454365b5acd9d5d3ac7a6a890e0
SHA256a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68
SHA5129fbc0219849c3735c35972cb323a393341f2691913676bf1d01159579fe28198db310b6738113550874e14b8c43b050d633c63b34c0a4e1f00fbe53ba4beb057
-
\Users\Admin\AppData\Roaming\Adobe\Java.exeFilesize
1.3MB
MD55818b9c7e1e4f408f28f5a6c6d0a7565
SHA1b18ddaf0338af454365b5acd9d5d3ac7a6a890e0
SHA256a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68
SHA5129fbc0219849c3735c35972cb323a393341f2691913676bf1d01159579fe28198db310b6738113550874e14b8c43b050d633c63b34c0a4e1f00fbe53ba4beb057
-
\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exeFilesize
1.3MB
MD55818b9c7e1e4f408f28f5a6c6d0a7565
SHA1b18ddaf0338af454365b5acd9d5d3ac7a6a890e0
SHA256a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68
SHA5129fbc0219849c3735c35972cb323a393341f2691913676bf1d01159579fe28198db310b6738113550874e14b8c43b050d633c63b34c0a4e1f00fbe53ba4beb057
-
\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exeFilesize
1.3MB
MD55818b9c7e1e4f408f28f5a6c6d0a7565
SHA1b18ddaf0338af454365b5acd9d5d3ac7a6a890e0
SHA256a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68
SHA5129fbc0219849c3735c35972cb323a393341f2691913676bf1d01159579fe28198db310b6738113550874e14b8c43b050d633c63b34c0a4e1f00fbe53ba4beb057
-
\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exeFilesize
1.3MB
MD55818b9c7e1e4f408f28f5a6c6d0a7565
SHA1b18ddaf0338af454365b5acd9d5d3ac7a6a890e0
SHA256a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68
SHA5129fbc0219849c3735c35972cb323a393341f2691913676bf1d01159579fe28198db310b6738113550874e14b8c43b050d633c63b34c0a4e1f00fbe53ba4beb057
-
\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exeFilesize
1.3MB
MD55818b9c7e1e4f408f28f5a6c6d0a7565
SHA1b18ddaf0338af454365b5acd9d5d3ac7a6a890e0
SHA256a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68
SHA5129fbc0219849c3735c35972cb323a393341f2691913676bf1d01159579fe28198db310b6738113550874e14b8c43b050d633c63b34c0a4e1f00fbe53ba4beb057
-
\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exeFilesize
1.3MB
MD55818b9c7e1e4f408f28f5a6c6d0a7565
SHA1b18ddaf0338af454365b5acd9d5d3ac7a6a890e0
SHA256a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68
SHA5129fbc0219849c3735c35972cb323a393341f2691913676bf1d01159579fe28198db310b6738113550874e14b8c43b050d633c63b34c0a4e1f00fbe53ba4beb057
-
\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exeFilesize
1.3MB
MD55818b9c7e1e4f408f28f5a6c6d0a7565
SHA1b18ddaf0338af454365b5acd9d5d3ac7a6a890e0
SHA256a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68
SHA5129fbc0219849c3735c35972cb323a393341f2691913676bf1d01159579fe28198db310b6738113550874e14b8c43b050d633c63b34c0a4e1f00fbe53ba4beb057
-
\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exeFilesize
1.3MB
MD55818b9c7e1e4f408f28f5a6c6d0a7565
SHA1b18ddaf0338af454365b5acd9d5d3ac7a6a890e0
SHA256a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68
SHA5129fbc0219849c3735c35972cb323a393341f2691913676bf1d01159579fe28198db310b6738113550874e14b8c43b050d633c63b34c0a4e1f00fbe53ba4beb057
-
\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exeFilesize
1.3MB
MD55818b9c7e1e4f408f28f5a6c6d0a7565
SHA1b18ddaf0338af454365b5acd9d5d3ac7a6a890e0
SHA256a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68
SHA5129fbc0219849c3735c35972cb323a393341f2691913676bf1d01159579fe28198db310b6738113550874e14b8c43b050d633c63b34c0a4e1f00fbe53ba4beb057
-
\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\msdcsc.exeFilesize
1.3MB
MD55818b9c7e1e4f408f28f5a6c6d0a7565
SHA1b18ddaf0338af454365b5acd9d5d3ac7a6a890e0
SHA256a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68
SHA5129fbc0219849c3735c35972cb323a393341f2691913676bf1d01159579fe28198db310b6738113550874e14b8c43b050d633c63b34c0a4e1f00fbe53ba4beb057
-
\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\msdcsc.exeFilesize
1.3MB
MD55818b9c7e1e4f408f28f5a6c6d0a7565
SHA1b18ddaf0338af454365b5acd9d5d3ac7a6a890e0
SHA256a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68
SHA5129fbc0219849c3735c35972cb323a393341f2691913676bf1d01159579fe28198db310b6738113550874e14b8c43b050d633c63b34c0a4e1f00fbe53ba4beb057
-
\Windows\SysWOW64\MSDCSC\msdcsc.exeFilesize
1.3MB
MD55818b9c7e1e4f408f28f5a6c6d0a7565
SHA1b18ddaf0338af454365b5acd9d5d3ac7a6a890e0
SHA256a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68
SHA5129fbc0219849c3735c35972cb323a393341f2691913676bf1d01159579fe28198db310b6738113550874e14b8c43b050d633c63b34c0a4e1f00fbe53ba4beb057
-
\Windows\SysWOW64\MSDCSC\msdcsc.exeFilesize
1.3MB
MD55818b9c7e1e4f408f28f5a6c6d0a7565
SHA1b18ddaf0338af454365b5acd9d5d3ac7a6a890e0
SHA256a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68
SHA5129fbc0219849c3735c35972cb323a393341f2691913676bf1d01159579fe28198db310b6738113550874e14b8c43b050d633c63b34c0a4e1f00fbe53ba4beb057
-
memory/316-65-0x0000000000000000-mapping.dmp
-
memory/360-190-0x0000000000000000-mapping.dmp
-
memory/432-186-0x0000000000000000-mapping.dmp
-
memory/520-68-0x0000000000000000-mapping.dmp
-
memory/604-108-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/604-102-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/604-90-0x0000000000000000-mapping.dmp
-
memory/684-128-0x0000000000000000-mapping.dmp
-
memory/824-70-0x0000000000000000-mapping.dmp
-
memory/844-98-0x0000000000000000-mapping.dmp
-
memory/900-158-0x0000000000000000-mapping.dmp
-
memory/924-144-0x0000000000000000-mapping.dmp
-
memory/952-131-0x0000000000000000-mapping.dmp
-
memory/1028-176-0x0000000000000000-mapping.dmp
-
memory/1072-161-0x0000000000000000-mapping.dmp
-
memory/1128-101-0x0000000000000000-mapping.dmp
-
memory/1172-69-0x0000000000000000-mapping.dmp
-
memory/1180-159-0x0000000000000000-mapping.dmp
-
memory/1204-188-0x0000000000000000-mapping.dmp
-
memory/1208-74-0x0000000000000000-mapping.dmp
-
memory/1212-125-0x0000000000000000-mapping.dmp
-
memory/1224-174-0x0000000000000000-mapping.dmp
-
memory/1240-138-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/1240-130-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/1240-118-0x0000000000000000-mapping.dmp
-
memory/1300-71-0x0000000000000000-mapping.dmp
-
memory/1412-220-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/1412-206-0x0000000000000000-mapping.dmp
-
memory/1412-227-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/1416-54-0x0000000074DC1000-0x0000000074DC3000-memory.dmpFilesize
8KB
-
memory/1416-57-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/1464-100-0x0000000000000000-mapping.dmp
-
memory/1516-184-0x0000000000000000-mapping.dmp
-
memory/1532-115-0x0000000000000000-mapping.dmp
-
memory/1548-169-0x0000000000000000-mapping.dmp
-
memory/1564-202-0x0000000000000000-mapping.dmp
-
memory/1584-84-0x0000000000000000-mapping.dmp
-
memory/1596-155-0x0000000000000000-mapping.dmp
-
memory/1608-165-0x0000000000000000-mapping.dmp
-
memory/1660-164-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/1660-153-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/1660-147-0x0000000000000000-mapping.dmp
-
memory/1660-171-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/1676-80-0x0000000000000000-mapping.dmp
-
memory/1676-126-0x0000000000000000-mapping.dmp
-
memory/1688-114-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/1688-107-0x0000000000000000-mapping.dmp
-
memory/1768-162-0x0000000000000000-mapping.dmp
-
memory/1776-103-0x0000000000000000-mapping.dmp
-
memory/1828-197-0x0000000000000000-mapping.dmp
-
memory/1828-142-0x0000000000000000-mapping.dmp
-
memory/1828-189-0x0000000000000000-mapping.dmp
-
memory/1892-193-0x0000000000000000-mapping.dmp
-
memory/1896-136-0x0000000000000000-mapping.dmp
-
memory/1896-140-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/1896-150-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/1920-76-0x0000000000000000-mapping.dmp
-
memory/1996-123-0x0000000000000000-mapping.dmp
-
memory/2000-97-0x0000000000000000-mapping.dmp
-
memory/2012-112-0x0000000000000000-mapping.dmp
-
memory/2020-55-0x0000000000000000-mapping.dmp
-
memory/2024-95-0x0000000000000000-mapping.dmp
-
memory/2032-180-0x0000000000000000-mapping.dmp
-
memory/2032-199-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/2032-192-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/2032-129-0x0000000000000000-mapping.dmp
-
memory/2036-60-0x0000000000000000-mapping.dmp
-
memory/2036-82-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/2036-67-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/2088-210-0x0000000000000000-mapping.dmp
-
memory/2136-212-0x0000000000000000-mapping.dmp
-
memory/2144-303-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/2144-301-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/2156-214-0x0000000000000000-mapping.dmp
-
memory/2176-215-0x0000000000000000-mapping.dmp
-
memory/2232-217-0x0000000000000000-mapping.dmp
-
memory/2240-279-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/2240-277-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/2264-218-0x0000000000000000-mapping.dmp
-
memory/2324-221-0x0000000000000000-mapping.dmp
-
memory/2332-261-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/2332-265-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/2332-263-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/2344-229-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/2344-225-0x0000000000000000-mapping.dmp
-
memory/2408-231-0x0000000000000000-mapping.dmp
-
memory/2420-233-0x0000000000000000-mapping.dmp
-
memory/2420-239-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/2420-241-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/2476-235-0x0000000000000000-mapping.dmp
-
memory/2492-282-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/2496-237-0x0000000000000000-mapping.dmp
-
memory/2508-238-0x0000000000000000-mapping.dmp
-
memory/2524-289-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/2584-297-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/2692-270-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/2692-272-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/2716-247-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/2716-245-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/2716-249-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/2860-285-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/2860-287-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/2896-293-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/2896-295-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/2944-252-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/2996-255-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/2996-257-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/3136-356-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/3136-358-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/3248-310-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/3248-308-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/3252-336-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/3316-349-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/3316-351-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/3476-367-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/3476-365-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/3476-362-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/3528-318-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/3528-316-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/3528-315-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/3568-370-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/3788-339-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/3808-324-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/3912-344-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/3912-342-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/4040-373-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/4040-375-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/4088-330-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/4088-364-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB