Analysis
-
max time kernel
159s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2022 13:36
Static task
static1
Behavioral task
behavioral1
Sample
a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68.exe
Resource
win10v2004-20220901-en
General
-
Target
a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68.exe
-
Size
1.3MB
-
MD5
5818b9c7e1e4f408f28f5a6c6d0a7565
-
SHA1
b18ddaf0338af454365b5acd9d5d3ac7a6a890e0
-
SHA256
a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68
-
SHA512
9fbc0219849c3735c35972cb323a393341f2691913676bf1d01159579fe28198db310b6738113550874e14b8c43b050d633c63b34c0a4e1f00fbe53ba4beb057
-
SSDEEP
24576:UJE8PA1dmGeDye5Dt3c2kFOoJU8PaTRFmYvQ49sMZ5D34zvXjycTZPVP6:qtPA8f+e5DpAc6wfmYvXZ5cjZPVP6
Malware Config
Extracted
darkcomet
THENTHACKER
thenthacker.no-ip.org:1604
DC_MUTEX-WPNYUQ7
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
92Uc0EZwdkTP
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Signatures
-
Modifies WinLogon for persistence 2 TTPs 36 IoCs
Processes:
Java.exeJava.exeJava.exeJava.exemsdcsc.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeattrib.exeJava.exeJava.exeJava.execmd.exeJava.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" attrib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe -
Executes dropped EXE 64 IoCs
Processes:
Java.exemsdcsc.exeJava.exemsdcsc.exeJava.exemsdcsc.exeJava.exemsdcsc.exeJava.exemsdcsc.exeJava.exemsdcsc.exeJava.exemsdcsc.exeJava.exeattrib.exeJava.exemsdcsc.exeJava.exemsdcsc.exeJava.exemsdcsc.exeJava.exemsdcsc.exeJava.exeattrib.exeJava.exemsdcsc.exeJava.exemsdcsc.exeJava.exemsdcsc.exeJava.exemsdcsc.execmd.exemsdcsc.exeJava.exemsdcsc.exeJava.exemsdcsc.exeJava.exemsdcsc.exeJava.exemsdcsc.exeattrib.exenotepad.exeJava.exemsdcsc.exeJava.exemsdcsc.exeJava.exemsdcsc.exeJava.exemsdcsc.exeJava.exeattrib.exeJava.exemsdcsc.exeJava.execmd.exeJava.exemsdcsc.exeJava.exemsdcsc.exepid process 1008 Java.exe 4260 msdcsc.exe 1580 Java.exe 380 msdcsc.exe 3464 Java.exe 1444 msdcsc.exe 1964 Java.exe 2020 msdcsc.exe 944 Java.exe 4676 msdcsc.exe 2224 Java.exe 4032 msdcsc.exe 312 Java.exe 536 msdcsc.exe 4348 Java.exe 1592 attrib.exe 3340 Java.exe 3720 msdcsc.exe 624 Java.exe 5184 msdcsc.exe 5284 Java.exe 5604 msdcsc.exe 5692 Java.exe 5968 msdcsc.exe 6048 Java.exe 1972 attrib.exe 5240 Java.exe 3008 msdcsc.exe 5636 Java.exe 6008 msdcsc.exe 5760 Java.exe 6128 msdcsc.exe 5228 Java.exe 3216 msdcsc.exe 5636 cmd.exe 5760 msdcsc.exe 6016 Java.exe 5368 msdcsc.exe 4380 Java.exe 4092 msdcsc.exe 480 Java.exe 5820 msdcsc.exe 5604 Java.exe 1852 msdcsc.exe 1696 attrib.exe 764 notepad.exe 224 Java.exe 3716 msdcsc.exe 4264 Java.exe 6084 msdcsc.exe 4528 Java.exe 5720 msdcsc.exe 4668 Java.exe 5356 msdcsc.exe 5492 Java.exe 5332 attrib.exe 5508 Java.exe 1656 msdcsc.exe 5016 Java.exe 4468 cmd.exe 3400 Java.exe 840 msdcsc.exe 3196 Java.exe 6224 msdcsc.exe -
Sets file to hidden 1 TTPs 64 IoCs
Modifies file attributes to stop it showing in Explorer etc.
Processes:
attrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exepid process 1840 attrib.exe 5900 attrib.exe 1608 attrib.exe 1592 attrib.exe 4448 attrib.exe 5084 attrib.exe 3340 attrib.exe 5696 attrib.exe 5756 attrib.exe 2568 attrib.exe 1452 attrib.exe 5332 attrib.exe 5920 attrib.exe 5216 attrib.exe 5784 attrib.exe 1696 attrib.exe 1448 attrib.exe 5016 attrib.exe 5552 attrib.exe 4368 attrib.exe 5136 attrib.exe 1500 attrib.exe 616 attrib.exe 3480 attrib.exe 3372 attrib.exe 1420 attrib.exe 624 attrib.exe 1408 attrib.exe 6540 attrib.exe 6936 attrib.exe 5740 attrib.exe 5804 attrib.exe 5912 attrib.exe 6044 attrib.exe 1972 attrib.exe 4976 attrib.exe 4156 attrib.exe 1652 attrib.exe 4108 attrib.exe 4712 attrib.exe 1592 attrib.exe 4800 attrib.exe 1504 attrib.exe 3316 attrib.exe 5528 attrib.exe 1696 attrib.exe 3196 attrib.exe 6172 attrib.exe 4024 attrib.exe 5300 attrib.exe 5272 attrib.exe 6084 attrib.exe 6916 attrib.exe 1772 attrib.exe 1320 attrib.exe 1696 attrib.exe 1860 attrib.exe 1484 attrib.exe 6524 attrib.exe 1152 attrib.exe 4028 attrib.exe 5524 attrib.exe 5492 attrib.exe 4648 attrib.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd upx C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd upx C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd upx C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd upx C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd upx C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd upx C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd upx C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd upx C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd upx C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd upx C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd upx C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd upx C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd upx C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd upx C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd upx C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd upx C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd upx C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd upx C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd upx C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd upx C:\Users\Admin\AppData\Local\Temp\bl4ckb4nd upx -
Checks computer location settings 2 TTPs 36 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Java.exeJava.exeJava.execmd.exeJava.exeJava.exeJava.exeJava.exeJava.exemsdcsc.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Java.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Java.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Java.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Java.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Java.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Java.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Java.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Java.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation msdcsc.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Java.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Java.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Java.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Java.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Java.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Java.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Java.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Java.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Java.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Java.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Java.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Java.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Java.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Java.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Java.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Java.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Java.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Java.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Java.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Java.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Java.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Java.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Java.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Java.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Java.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Java.exe -
Adds Run key to start application 2 TTPs 64 IoCs
Processes:
msdcsc.exeJava.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exeJava.exemsdcsc.exeJava.exeJava.exeJava.exemsdcsc.exeJava.exemsdcsc.execmd.exemsdcsc.exeJava.exemsdcsc.exeJava.exeJava.exemsdcsc.exeJava.exemsdcsc.exeJava.exemsdcsc.exeJava.exeJava.exeJava.exeJava.exeattrib.exeJava.exemsdcsc.exeJava.exeJava.exemsdcsc.exeJava.exemsdcsc.exemsdcsc.exeJava.exemsdcsc.exea92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68.exemsdcsc.exeattrib.exeJava.exemsdcsc.exeJava.exeJava.exemsdcsc.exeJava.exemsdcsc.exemsdcsc.execmd.exemsdcsc.exeJava.exemsdcsc.exeJava.exeJava.exemsdcsc.exeJava.exeattrib.exeJava.exeattrib.exeJava.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Runtime = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Java.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Runtime = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Java.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Runtime = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Java.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Runtime = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Java.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Runtime = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Java.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Runtime = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Java.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Runtime = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Java.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Runtime = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Java.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Runtime = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Java.exe" cmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Runtime = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Java.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Runtime = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Java.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Runtime = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Java.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Runtime = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Java.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Runtime = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Java.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" attrib.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Runtime = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Java.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Runtime = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Java.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Runtime = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Java.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Runtime = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Java.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Runtime = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Java.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Runtime = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Java.exe" a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Runtime = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Java.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Runtime = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Java.exe" attrib.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Runtime = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Java.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Runtime = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Java.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Runtime = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Java.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Runtime = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Java.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" cmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Runtime = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Java.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Runtime = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Java.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Runtime = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Java.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Runtime = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Java.exe" attrib.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Runtime = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Java.exe" attrib.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" Java.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\92Uc0EZwdkTP\\92Uc0EZwdkTP\\msdcsc.exe" msdcsc.exe -
Drops file in System32 directory 64 IoCs
Processes:
Java.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeJava.exeattrib.exeJava.exemsdcsc.execmd.exeJava.exedescription ioc process File created C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\msdcsc.exe Java.exe File created C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\msdcsc.exe Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\ Java.exe File created C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\msdcsc.exe Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\ Java.exe File created C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\msdcsc.exe Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\ Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\ Java.exe File created C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\msdcsc.exe Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\ Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\ Java.exe File created C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe Java.exe File created C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\msdcsc.exe Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\ Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\ Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe Java.exe File created C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\msdcsc.exe Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\ Java.exe File created C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe Java.exe File created C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\msdcsc.exe Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe Java.exe File created C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe Java.exe File created C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\ Java.exe File created C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\msdcsc.exe Java.exe File created C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\msdcsc.exe Java.exe File created C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\msdcsc.exe Java.exe File created C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\msdcsc.exe Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\ Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\ Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\ Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\ Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\msdcsc.exe Java.exe File created C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\ Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\ Java.exe File created C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\msdcsc.exe attrib.exe File created C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe Java.exe File created C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\msdcsc.exe Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\ Java.exe File created C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\msdcsc.exe Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\ Java.exe File created C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\msdcsc.exe msdcsc.exe File created C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe cmd.exe File created C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe Java.exe File created C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe Java.exe File created C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe Java.exe File created C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\msdcsc.exe Java.exe File created C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\msdcsc.exe Java.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\ Java.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 64 IoCs
Processes:
msdcsc.exeJava.exeOpenWith.exeJava.exeJava.exeOpenWith.exeJava.exeOpenWith.exenotepad.exeJava.exemsdcsc.exeJava.exeJava.exemsdcsc.exeJava.exeJava.exeOpenWith.exeJava.exeJava.exeOpenWith.exeOpenWith.exeOpenWith.exeOpenWith.exeOpenWith.exenotepad.exemsdcsc.exeOpenWith.exeJava.exeJava.exeOpenWith.exeOpenWith.exemsdcsc.exeOpenWith.exeOpenWith.exeJava.exemsdcsc.exeJava.exemsdcsc.exeOpenWith.exemsdcsc.exeOpenWith.exeJava.exeOpenWith.exemsdcsc.exeOpenWith.exeOpenWith.exemsdcsc.exeOpenWith.exeOpenWith.exeOpenWith.exeJava.exeOpenWith.exeOpenWith.exemsdcsc.exeOpenWith.exemsdcsc.exeOpenWith.exeOpenWith.exeattrib.exeOpenWith.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings msdcsc.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings Java.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Java.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings Java.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Java.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings notepad.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Java.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings msdcsc.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings Java.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Java.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings msdcsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Java.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Java.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings Java.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Java.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings notepad.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings msdcsc.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings Java.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings Java.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings msdcsc.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings Java.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings msdcsc.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings Java.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings msdcsc.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings msdcsc.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Java.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings msdcsc.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings msdcsc.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings Java.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings Java.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings msdcsc.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings msdcsc.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings attrib.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings Java.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings Java.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
Java.exeJava.exeJava.exedescription pid process Token: SeIncreaseQuotaPrivilege 1008 Java.exe Token: SeSecurityPrivilege 1008 Java.exe Token: SeTakeOwnershipPrivilege 1008 Java.exe Token: SeLoadDriverPrivilege 1008 Java.exe Token: SeSystemProfilePrivilege 1008 Java.exe Token: SeSystemtimePrivilege 1008 Java.exe Token: SeProfSingleProcessPrivilege 1008 Java.exe Token: SeIncBasePriorityPrivilege 1008 Java.exe Token: SeCreatePagefilePrivilege 1008 Java.exe Token: SeBackupPrivilege 1008 Java.exe Token: SeRestorePrivilege 1008 Java.exe Token: SeShutdownPrivilege 1008 Java.exe Token: SeDebugPrivilege 1008 Java.exe Token: SeSystemEnvironmentPrivilege 1008 Java.exe Token: SeChangeNotifyPrivilege 1008 Java.exe Token: SeRemoteShutdownPrivilege 1008 Java.exe Token: SeUndockPrivilege 1008 Java.exe Token: SeManageVolumePrivilege 1008 Java.exe Token: SeImpersonatePrivilege 1008 Java.exe Token: SeCreateGlobalPrivilege 1008 Java.exe Token: 33 1008 Java.exe Token: 34 1008 Java.exe Token: 35 1008 Java.exe Token: 36 1008 Java.exe Token: SeIncreaseQuotaPrivilege 1580 Java.exe Token: SeSecurityPrivilege 1580 Java.exe Token: SeTakeOwnershipPrivilege 1580 Java.exe Token: SeLoadDriverPrivilege 1580 Java.exe Token: SeSystemProfilePrivilege 1580 Java.exe Token: SeSystemtimePrivilege 1580 Java.exe Token: SeProfSingleProcessPrivilege 1580 Java.exe Token: SeIncBasePriorityPrivilege 1580 Java.exe Token: SeCreatePagefilePrivilege 1580 Java.exe Token: SeBackupPrivilege 1580 Java.exe Token: SeRestorePrivilege 1580 Java.exe Token: SeShutdownPrivilege 1580 Java.exe Token: SeDebugPrivilege 1580 Java.exe Token: SeSystemEnvironmentPrivilege 1580 Java.exe Token: SeChangeNotifyPrivilege 1580 Java.exe Token: SeRemoteShutdownPrivilege 1580 Java.exe Token: SeUndockPrivilege 1580 Java.exe Token: SeManageVolumePrivilege 1580 Java.exe Token: SeImpersonatePrivilege 1580 Java.exe Token: SeCreateGlobalPrivilege 1580 Java.exe Token: 33 1580 Java.exe Token: 34 1580 Java.exe Token: 35 1580 Java.exe Token: 36 1580 Java.exe Token: SeIncreaseQuotaPrivilege 3464 Java.exe Token: SeSecurityPrivilege 3464 Java.exe Token: SeTakeOwnershipPrivilege 3464 Java.exe Token: SeLoadDriverPrivilege 3464 Java.exe Token: SeSystemProfilePrivilege 3464 Java.exe Token: SeSystemtimePrivilege 3464 Java.exe Token: SeProfSingleProcessPrivilege 3464 Java.exe Token: SeIncBasePriorityPrivilege 3464 Java.exe Token: SeCreatePagefilePrivilege 3464 Java.exe Token: SeBackupPrivilege 3464 Java.exe Token: SeRestorePrivilege 3464 Java.exe Token: SeShutdownPrivilege 3464 Java.exe Token: SeDebugPrivilege 3464 Java.exe Token: SeSystemEnvironmentPrivilege 3464 Java.exe Token: SeChangeNotifyPrivilege 3464 Java.exe Token: SeRemoteShutdownPrivilege 3464 Java.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
Processes:
OpenWith.exeOpenWith.exeOpenWith.exeOpenWith.exeOpenWith.exeOpenWith.exeOpenWith.exeOpenWith.exeOpenWith.exeOpenWith.exeOpenWith.exeOpenWith.exeOpenWith.exeOpenWith.exeOpenWith.exeOpenWith.exeOpenWith.exeOpenWith.exeOpenWith.exeOpenWith.exeOpenWith.exeOpenWith.exeOpenWith.exeOpenWith.exeOpenWith.exeOpenWith.exeOpenWith.exeOpenWith.exeOpenWith.exeOpenWith.exeattrib.exeOpenWith.execmd.exeOpenWith.exeOpenWith.exeOpenWith.exeOpenWith.exeOpenWith.exeOpenWith.exeOpenWith.exeOpenWith.exeOpenWith.exeOpenWith.exeOpenWith.exeOpenWith.exeOpenWith.exeOpenWith.exeOpenWith.exeOpenWith.exeOpenWith.exeOpenWith.exeOpenWith.exenotepad.exeOpenWith.exeOpenWith.exeOpenWith.exeOpenWith.exeOpenWith.exeOpenWith.exeOpenWith.exeOpenWith.exeOpenWith.exeOpenWith.exepid process 4140 OpenWith.exe 2052 OpenWith.exe 4812 OpenWith.exe 1420 OpenWith.exe 4576 OpenWith.exe 2508 OpenWith.exe 4580 OpenWith.exe 3632 OpenWith.exe 4960 OpenWith.exe 1408 OpenWith.exe 1484 OpenWith.exe 4124 OpenWith.exe 4100 OpenWith.exe 3924 OpenWith.exe 2720 OpenWith.exe 3288 OpenWith.exe 4220 OpenWith.exe 1484 OpenWith.exe 4384 OpenWith.exe 3908 OpenWith.exe 5248 OpenWith.exe 5372 OpenWith.exe 5660 OpenWith.exe 5760 OpenWith.exe 6016 OpenWith.exe 6124 OpenWith.exe 5220 OpenWith.exe 1488 OpenWith.exe 3552 OpenWith.exe 5392 OpenWith.exe 5804 attrib.exe 6056 OpenWith.exe 5324 cmd.exe 3152 OpenWith.exe 5412 OpenWith.exe 5732 OpenWith.exe 4300 OpenWith.exe 5740 OpenWith.exe 5800 OpenWith.exe 5412 5632 OpenWith.exe 1384 OpenWith.exe 5968 OpenWith.exe 4304 OpenWith.exe 6052 OpenWith.exe 6040 OpenWith.exe 5676 OpenWith.exe 5716 OpenWith.exe 4600 OpenWith.exe 3444 OpenWith.exe 5668 OpenWith.exe 3364 OpenWith.exe 3016 OpenWith.exe 4580 notepad.exe 5644 OpenWith.exe 2948 OpenWith.exe 5164 OpenWith.exe 4444 OpenWith.exe 1304 OpenWith.exe 1632 OpenWith.exe 5004 OpenWith.exe 6060 OpenWith.exe 3352 OpenWith.exe 2660 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68.exeJava.execmd.execmd.exemsdcsc.exeJava.execmd.execmd.exedescription pid process target process PID 4296 wrote to memory of 1008 4296 a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68.exe Java.exe PID 4296 wrote to memory of 1008 4296 a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68.exe Java.exe PID 4296 wrote to memory of 1008 4296 a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68.exe Java.exe PID 1008 wrote to memory of 204 1008 Java.exe cmd.exe PID 1008 wrote to memory of 204 1008 Java.exe cmd.exe PID 1008 wrote to memory of 204 1008 Java.exe cmd.exe PID 1008 wrote to memory of 4988 1008 Java.exe cmd.exe PID 1008 wrote to memory of 4988 1008 Java.exe cmd.exe PID 1008 wrote to memory of 4988 1008 Java.exe cmd.exe PID 204 wrote to memory of 1772 204 cmd.exe attrib.exe PID 204 wrote to memory of 1772 204 cmd.exe attrib.exe PID 204 wrote to memory of 1772 204 cmd.exe attrib.exe PID 4988 wrote to memory of 1840 4988 cmd.exe attrib.exe PID 4988 wrote to memory of 1840 4988 cmd.exe attrib.exe PID 4988 wrote to memory of 1840 4988 cmd.exe attrib.exe PID 1008 wrote to memory of 4272 1008 Java.exe notepad.exe PID 1008 wrote to memory of 4272 1008 Java.exe notepad.exe PID 1008 wrote to memory of 4272 1008 Java.exe notepad.exe PID 1008 wrote to memory of 4272 1008 Java.exe notepad.exe PID 1008 wrote to memory of 4272 1008 Java.exe notepad.exe PID 1008 wrote to memory of 4272 1008 Java.exe notepad.exe PID 1008 wrote to memory of 4272 1008 Java.exe notepad.exe PID 1008 wrote to memory of 4272 1008 Java.exe notepad.exe PID 1008 wrote to memory of 4272 1008 Java.exe notepad.exe PID 1008 wrote to memory of 4272 1008 Java.exe notepad.exe PID 1008 wrote to memory of 4272 1008 Java.exe notepad.exe PID 1008 wrote to memory of 4272 1008 Java.exe notepad.exe PID 1008 wrote to memory of 4272 1008 Java.exe notepad.exe PID 1008 wrote to memory of 4272 1008 Java.exe notepad.exe PID 1008 wrote to memory of 4272 1008 Java.exe notepad.exe PID 1008 wrote to memory of 4272 1008 Java.exe notepad.exe PID 1008 wrote to memory of 4272 1008 Java.exe notepad.exe PID 1008 wrote to memory of 4260 1008 Java.exe msdcsc.exe PID 1008 wrote to memory of 4260 1008 Java.exe msdcsc.exe PID 1008 wrote to memory of 4260 1008 Java.exe msdcsc.exe PID 4260 wrote to memory of 1580 4260 msdcsc.exe Java.exe PID 4260 wrote to memory of 1580 4260 msdcsc.exe Java.exe PID 4260 wrote to memory of 1580 4260 msdcsc.exe Java.exe PID 1580 wrote to memory of 1720 1580 Java.exe cmd.exe PID 1580 wrote to memory of 1720 1580 Java.exe cmd.exe PID 1580 wrote to memory of 1720 1580 Java.exe cmd.exe PID 1580 wrote to memory of 3896 1580 Java.exe cmd.exe PID 1580 wrote to memory of 3896 1580 Java.exe cmd.exe PID 1580 wrote to memory of 3896 1580 Java.exe cmd.exe PID 1720 wrote to memory of 3316 1720 cmd.exe attrib.exe PID 1720 wrote to memory of 3316 1720 cmd.exe attrib.exe PID 1720 wrote to memory of 3316 1720 cmd.exe attrib.exe PID 3896 wrote to memory of 1448 3896 cmd.exe attrib.exe PID 3896 wrote to memory of 1448 3896 cmd.exe attrib.exe PID 3896 wrote to memory of 1448 3896 cmd.exe attrib.exe PID 1580 wrote to memory of 3404 1580 Java.exe notepad.exe PID 1580 wrote to memory of 3404 1580 Java.exe notepad.exe PID 1580 wrote to memory of 3404 1580 Java.exe notepad.exe PID 1580 wrote to memory of 3404 1580 Java.exe notepad.exe PID 1580 wrote to memory of 3404 1580 Java.exe notepad.exe PID 1580 wrote to memory of 3404 1580 Java.exe notepad.exe PID 1580 wrote to memory of 3404 1580 Java.exe notepad.exe PID 1580 wrote to memory of 3404 1580 Java.exe notepad.exe PID 1580 wrote to memory of 3404 1580 Java.exe notepad.exe PID 1580 wrote to memory of 3404 1580 Java.exe notepad.exe PID 1580 wrote to memory of 3404 1580 Java.exe notepad.exe PID 1580 wrote to memory of 3404 1580 Java.exe notepad.exe PID 1580 wrote to memory of 3404 1580 Java.exe notepad.exe PID 1580 wrote to memory of 3404 1580 Java.exe notepad.exe -
Views/modifies file attributes 1 TTPs 64 IoCs
Processes:
attrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exepid process 1696 attrib.exe 4800 attrib.exe 1696 attrib.exe 6936 attrib.exe 3316 attrib.exe 3372 attrib.exe 4648 attrib.exe 4368 attrib.exe 5312 attrib.exe 5016 attrib.exe 624 attrib.exe 5272 attrib.exe 5524 attrib.exe 1452 attrib.exe 1408 attrib.exe 4024 attrib.exe 1484 attrib.exe 6916 attrib.exe 1420 attrib.exe 1652 attrib.exe 1384 attrib.exe 1500 attrib.exe 1320 attrib.exe 5332 attrib.exe 6148 attrib.exe 1592 attrib.exe 3340 attrib.exe 1592 attrib.exe 2948 attrib.exe 6172 attrib.exe 1840 attrib.exe 5084 attrib.exe 224 attrib.exe 6044 attrib.exe 3480 attrib.exe 4108 attrib.exe 5712 attrib.exe 4712 attrib.exe 1972 attrib.exe 1504 attrib.exe 1448 attrib.exe 5528 attrib.exe 6084 attrib.exe 5492 attrib.exe 5756 attrib.exe 4756 attrib.exe 616 attrib.exe 5784 attrib.exe 1696 attrib.exe 6540 attrib.exe 4448 attrib.exe 4156 attrib.exe 1152 attrib.exe 5920 attrib.exe 5300 attrib.exe 5740 attrib.exe 5696 attrib.exe 4028 attrib.exe 6524 attrib.exe 1772 attrib.exe 2568 attrib.exe 5900 attrib.exe 5804 attrib.exe 4976 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68.exe"C:\Users\Admin\AppData\Local\Temp\a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h4⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h4⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad3⤵
-
C:\Windows\SysWOW64\MSDCSC\msdcsc.exe"C:\Windows\system32\MSDCSC\msdcsc.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"4⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h6⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h6⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad5⤵
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\msdcsc.exe"C:\Windows\system32\MSDCSC\92Uc0EZwdkTP\msdcsc.exe"5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"6⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h7⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h8⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h7⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h8⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad7⤵
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"C:\Windows\system32\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"7⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"8⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h9⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h10⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h9⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h10⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad9⤵
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"C:\Windows\system32\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"9⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"10⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h11⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h12⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h11⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h12⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad11⤵
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"C:\Windows\system32\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"11⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"12⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h13⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h14⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h13⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h14⤵
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad13⤵
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"C:\Windows\system32\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"13⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"14⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h15⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h16⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h15⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h16⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad15⤵
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"C:\Windows\system32\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"15⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"16⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h17⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h18⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h17⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h18⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad17⤵
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"C:\Windows\system32\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"17⤵
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"18⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h19⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h20⤵
- Executes dropped EXE
- Sets file to hidden
- Adds Run key to start application
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h19⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h20⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad19⤵
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"C:\Windows\system32\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"19⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"20⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h21⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h22⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h21⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h22⤵
- Sets file to hidden
-
C:\Windows\SysWOW64\notepad.exenotepad21⤵
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"C:\Windows\system32\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"21⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"22⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h23⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h24⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h23⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h24⤵
- Sets file to hidden
-
C:\Windows\SysWOW64\notepad.exenotepad23⤵
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"C:\Windows\system32\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"23⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"24⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h25⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h26⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h25⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h26⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad25⤵
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"C:\Windows\system32\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"25⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"26⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h27⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h28⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h27⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h28⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad27⤵
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"C:\Windows\system32\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"27⤵
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"28⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h29⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h30⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h29⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h30⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad29⤵
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"C:\Windows\system32\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"29⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"30⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h31⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h32⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h31⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h32⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad31⤵
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"C:\Windows\system32\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"31⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"32⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h33⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h34⤵
- Sets file to hidden
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h33⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h34⤵
- Executes dropped EXE
- Sets file to hidden
- Adds Run key to start application
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad33⤵
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"C:\Windows\system32\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"33⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"34⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h35⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h36⤵
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h35⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h36⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad35⤵
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"C:\Windows\system32\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"35⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"36⤵
- Checks computer location settings
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h37⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h38⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h37⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h38⤵
- Sets file to hidden
- Suspicious use of SetWindowsHookEx
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad37⤵
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"C:\Windows\system32\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"37⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"38⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h39⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h40⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h39⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h40⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad39⤵
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"C:\Windows\system32\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"39⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"40⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h41⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h42⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h41⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h42⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad41⤵
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"C:\Windows\system32\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"41⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"42⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h43⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h44⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h43⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h44⤵
- Sets file to hidden
-
C:\Windows\SysWOW64\notepad.exenotepad43⤵
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"C:\Windows\system32\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"43⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"44⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h45⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h46⤵
- Sets file to hidden
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h45⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h46⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad45⤵
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"C:\Windows\system32\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"45⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"46⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h47⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h48⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h47⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h48⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad47⤵
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"C:\Windows\system32\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"47⤵
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"48⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h49⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h50⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h49⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h50⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Sets file to hidden
- Adds Run key to start application
- Drops file in System32 directory
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad49⤵
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"C:\Windows\system32\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"49⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"50⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h51⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h52⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h51⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h52⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad51⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"C:\Windows\system32\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"51⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"52⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h53⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h54⤵
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h53⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h54⤵
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad53⤵
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"C:\Windows\system32\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"53⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"54⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h55⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h56⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h55⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h56⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad55⤵
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"C:\Windows\system32\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"55⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"56⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h57⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h58⤵
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h57⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h58⤵
-
C:\Windows\SysWOW64\notepad.exenotepad57⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"C:\Windows\system32\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"57⤵
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"58⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h59⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h60⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h59⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h60⤵
- Executes dropped EXE
- Sets file to hidden
- Adds Run key to start application
- Modifies registry class
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad59⤵
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"C:\Windows\system32\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"59⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"60⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h61⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h62⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h61⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h62⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad61⤵
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"C:\Windows\system32\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"61⤵
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"62⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h63⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h64⤵
- Sets file to hidden
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h63⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h64⤵
- Sets file to hidden
-
C:\Windows\SysWOW64\notepad.exenotepad63⤵
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"C:\Windows\system32\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"63⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"64⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h65⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h66⤵
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h65⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h66⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad65⤵
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"C:\Windows\system32\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"65⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"66⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h67⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h68⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h67⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h68⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad67⤵
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"C:\Windows\system32\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"67⤵
- Adds Run key to start application
- Modifies registry class
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"68⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h69⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h70⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h69⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h70⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad69⤵
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"C:\Windows\system32\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"69⤵
- Adds Run key to start application
- Modifies registry class
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"70⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Adds Run key to start application
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h71⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h72⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h71⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h72⤵
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad71⤵
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"C:\Windows\system32\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"71⤵
- Adds Run key to start application
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"C:\Users\Admin\AppData\Roaming\Adobe\Java.exe"72⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h73⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe\Java.exe" +s +h74⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h73⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Adobe" +s +h74⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad73⤵
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"C:\Windows\system32\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exe"73⤵
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\DI-TDR7.JPGFilesize
690KB
MD514f0e088c890ad590f84ae2170e6a94d
SHA14fa31298a2824081738ab90d17aaaa03353e1b0e
SHA25656adf781705c9cb171f965d6dd31a07aca27ced68f4d2e6c9d37dab2d1fb909c
SHA51288ece7985fec461e599f126e68b92daf1228e8057a40a3d9675a53867d613c059fa1b33da7c33f068db5b114da05401a8bef0b6856df9a9287d02d68d071c75d
-
C:\Users\Admin\AppData\Local\Temp\DI-TDR7.JPGFilesize
690KB
MD514f0e088c890ad590f84ae2170e6a94d
SHA14fa31298a2824081738ab90d17aaaa03353e1b0e
SHA25656adf781705c9cb171f965d6dd31a07aca27ced68f4d2e6c9d37dab2d1fb909c
SHA51288ece7985fec461e599f126e68b92daf1228e8057a40a3d9675a53867d613c059fa1b33da7c33f068db5b114da05401a8bef0b6856df9a9287d02d68d071c75d
-
C:\Users\Admin\AppData\Local\Temp\DI-TDR7.JPGFilesize
690KB
MD514f0e088c890ad590f84ae2170e6a94d
SHA14fa31298a2824081738ab90d17aaaa03353e1b0e
SHA25656adf781705c9cb171f965d6dd31a07aca27ced68f4d2e6c9d37dab2d1fb909c
SHA51288ece7985fec461e599f126e68b92daf1228e8057a40a3d9675a53867d613c059fa1b33da7c33f068db5b114da05401a8bef0b6856df9a9287d02d68d071c75d
-
C:\Users\Admin\AppData\Local\Temp\DI-TDR7.JPGFilesize
690KB
MD514f0e088c890ad590f84ae2170e6a94d
SHA14fa31298a2824081738ab90d17aaaa03353e1b0e
SHA25656adf781705c9cb171f965d6dd31a07aca27ced68f4d2e6c9d37dab2d1fb909c
SHA51288ece7985fec461e599f126e68b92daf1228e8057a40a3d9675a53867d613c059fa1b33da7c33f068db5b114da05401a8bef0b6856df9a9287d02d68d071c75d
-
C:\Users\Admin\AppData\Local\Temp\DI-TDR7.JPGFilesize
690KB
MD514f0e088c890ad590f84ae2170e6a94d
SHA14fa31298a2824081738ab90d17aaaa03353e1b0e
SHA25656adf781705c9cb171f965d6dd31a07aca27ced68f4d2e6c9d37dab2d1fb909c
SHA51288ece7985fec461e599f126e68b92daf1228e8057a40a3d9675a53867d613c059fa1b33da7c33f068db5b114da05401a8bef0b6856df9a9287d02d68d071c75d
-
C:\Users\Admin\AppData\Local\Temp\DI-TDR7.JPGFilesize
690KB
MD514f0e088c890ad590f84ae2170e6a94d
SHA14fa31298a2824081738ab90d17aaaa03353e1b0e
SHA25656adf781705c9cb171f965d6dd31a07aca27ced68f4d2e6c9d37dab2d1fb909c
SHA51288ece7985fec461e599f126e68b92daf1228e8057a40a3d9675a53867d613c059fa1b33da7c33f068db5b114da05401a8bef0b6856df9a9287d02d68d071c75d
-
C:\Users\Admin\AppData\Local\Temp\DI-TDR7.JPGFilesize
690KB
MD514f0e088c890ad590f84ae2170e6a94d
SHA14fa31298a2824081738ab90d17aaaa03353e1b0e
SHA25656adf781705c9cb171f965d6dd31a07aca27ced68f4d2e6c9d37dab2d1fb909c
SHA51288ece7985fec461e599f126e68b92daf1228e8057a40a3d9675a53867d613c059fa1b33da7c33f068db5b114da05401a8bef0b6856df9a9287d02d68d071c75d
-
C:\Users\Admin\AppData\Local\Temp\DI-TDR7.JPGFilesize
690KB
MD514f0e088c890ad590f84ae2170e6a94d
SHA14fa31298a2824081738ab90d17aaaa03353e1b0e
SHA25656adf781705c9cb171f965d6dd31a07aca27ced68f4d2e6c9d37dab2d1fb909c
SHA51288ece7985fec461e599f126e68b92daf1228e8057a40a3d9675a53867d613c059fa1b33da7c33f068db5b114da05401a8bef0b6856df9a9287d02d68d071c75d
-
C:\Users\Admin\AppData\Local\Temp\DI-TDR7.JPGFilesize
690KB
MD514f0e088c890ad590f84ae2170e6a94d
SHA14fa31298a2824081738ab90d17aaaa03353e1b0e
SHA25656adf781705c9cb171f965d6dd31a07aca27ced68f4d2e6c9d37dab2d1fb909c
SHA51288ece7985fec461e599f126e68b92daf1228e8057a40a3d9675a53867d613c059fa1b33da7c33f068db5b114da05401a8bef0b6856df9a9287d02d68d071c75d
-
C:\Users\Admin\AppData\Local\Temp\bl4ckb4ndFilesize
34KB
MD546f30194bd5792c73072d6cd782820d6
SHA1367635e048ba13741b461b864b8adc76841ae476
SHA2568bc9f898a96c6c90517a24919a45888f68d92232a8592b3cae8610c2d279cfa3
SHA512888aec428b266b4aed6e895d0c075c56780548396f678720423de01a173911e3d00229bd1672bf073de54323043d44277974f15852393b4d97b915561a5ca510
-
C:\Users\Admin\AppData\Local\Temp\bl4ckb4ndFilesize
34KB
MD546f30194bd5792c73072d6cd782820d6
SHA1367635e048ba13741b461b864b8adc76841ae476
SHA2568bc9f898a96c6c90517a24919a45888f68d92232a8592b3cae8610c2d279cfa3
SHA512888aec428b266b4aed6e895d0c075c56780548396f678720423de01a173911e3d00229bd1672bf073de54323043d44277974f15852393b4d97b915561a5ca510
-
C:\Users\Admin\AppData\Local\Temp\bl4ckb4ndFilesize
34KB
MD546f30194bd5792c73072d6cd782820d6
SHA1367635e048ba13741b461b864b8adc76841ae476
SHA2568bc9f898a96c6c90517a24919a45888f68d92232a8592b3cae8610c2d279cfa3
SHA512888aec428b266b4aed6e895d0c075c56780548396f678720423de01a173911e3d00229bd1672bf073de54323043d44277974f15852393b4d97b915561a5ca510
-
C:\Users\Admin\AppData\Local\Temp\bl4ckb4ndFilesize
34KB
MD546f30194bd5792c73072d6cd782820d6
SHA1367635e048ba13741b461b864b8adc76841ae476
SHA2568bc9f898a96c6c90517a24919a45888f68d92232a8592b3cae8610c2d279cfa3
SHA512888aec428b266b4aed6e895d0c075c56780548396f678720423de01a173911e3d00229bd1672bf073de54323043d44277974f15852393b4d97b915561a5ca510
-
C:\Users\Admin\AppData\Local\Temp\bl4ckb4ndFilesize
34KB
MD546f30194bd5792c73072d6cd782820d6
SHA1367635e048ba13741b461b864b8adc76841ae476
SHA2568bc9f898a96c6c90517a24919a45888f68d92232a8592b3cae8610c2d279cfa3
SHA512888aec428b266b4aed6e895d0c075c56780548396f678720423de01a173911e3d00229bd1672bf073de54323043d44277974f15852393b4d97b915561a5ca510
-
C:\Users\Admin\AppData\Local\Temp\bl4ckb4ndFilesize
34KB
MD546f30194bd5792c73072d6cd782820d6
SHA1367635e048ba13741b461b864b8adc76841ae476
SHA2568bc9f898a96c6c90517a24919a45888f68d92232a8592b3cae8610c2d279cfa3
SHA512888aec428b266b4aed6e895d0c075c56780548396f678720423de01a173911e3d00229bd1672bf073de54323043d44277974f15852393b4d97b915561a5ca510
-
C:\Users\Admin\AppData\Local\Temp\bl4ckb4ndFilesize
34KB
MD546f30194bd5792c73072d6cd782820d6
SHA1367635e048ba13741b461b864b8adc76841ae476
SHA2568bc9f898a96c6c90517a24919a45888f68d92232a8592b3cae8610c2d279cfa3
SHA512888aec428b266b4aed6e895d0c075c56780548396f678720423de01a173911e3d00229bd1672bf073de54323043d44277974f15852393b4d97b915561a5ca510
-
C:\Users\Admin\AppData\Local\Temp\bl4ckb4ndFilesize
34KB
MD546f30194bd5792c73072d6cd782820d6
SHA1367635e048ba13741b461b864b8adc76841ae476
SHA2568bc9f898a96c6c90517a24919a45888f68d92232a8592b3cae8610c2d279cfa3
SHA512888aec428b266b4aed6e895d0c075c56780548396f678720423de01a173911e3d00229bd1672bf073de54323043d44277974f15852393b4d97b915561a5ca510
-
C:\Users\Admin\AppData\Local\Temp\bl4ckb4ndFilesize
34KB
MD546f30194bd5792c73072d6cd782820d6
SHA1367635e048ba13741b461b864b8adc76841ae476
SHA2568bc9f898a96c6c90517a24919a45888f68d92232a8592b3cae8610c2d279cfa3
SHA512888aec428b266b4aed6e895d0c075c56780548396f678720423de01a173911e3d00229bd1672bf073de54323043d44277974f15852393b4d97b915561a5ca510
-
C:\Users\Admin\AppData\Local\Temp\bl4ckb4ndFilesize
34KB
MD546f30194bd5792c73072d6cd782820d6
SHA1367635e048ba13741b461b864b8adc76841ae476
SHA2568bc9f898a96c6c90517a24919a45888f68d92232a8592b3cae8610c2d279cfa3
SHA512888aec428b266b4aed6e895d0c075c56780548396f678720423de01a173911e3d00229bd1672bf073de54323043d44277974f15852393b4d97b915561a5ca510
-
C:\Users\Admin\AppData\Local\Temp\bl4ckb4ndFilesize
34KB
MD546f30194bd5792c73072d6cd782820d6
SHA1367635e048ba13741b461b864b8adc76841ae476
SHA2568bc9f898a96c6c90517a24919a45888f68d92232a8592b3cae8610c2d279cfa3
SHA512888aec428b266b4aed6e895d0c075c56780548396f678720423de01a173911e3d00229bd1672bf073de54323043d44277974f15852393b4d97b915561a5ca510
-
C:\Users\Admin\AppData\Local\Temp\bl4ckb4ndFilesize
34KB
MD546f30194bd5792c73072d6cd782820d6
SHA1367635e048ba13741b461b864b8adc76841ae476
SHA2568bc9f898a96c6c90517a24919a45888f68d92232a8592b3cae8610c2d279cfa3
SHA512888aec428b266b4aed6e895d0c075c56780548396f678720423de01a173911e3d00229bd1672bf073de54323043d44277974f15852393b4d97b915561a5ca510
-
C:\Users\Admin\AppData\Local\Temp\bl4ckb4ndFilesize
34KB
MD546f30194bd5792c73072d6cd782820d6
SHA1367635e048ba13741b461b864b8adc76841ae476
SHA2568bc9f898a96c6c90517a24919a45888f68d92232a8592b3cae8610c2d279cfa3
SHA512888aec428b266b4aed6e895d0c075c56780548396f678720423de01a173911e3d00229bd1672bf073de54323043d44277974f15852393b4d97b915561a5ca510
-
C:\Users\Admin\AppData\Local\Temp\bl4ckb4ndFilesize
34KB
MD546f30194bd5792c73072d6cd782820d6
SHA1367635e048ba13741b461b864b8adc76841ae476
SHA2568bc9f898a96c6c90517a24919a45888f68d92232a8592b3cae8610c2d279cfa3
SHA512888aec428b266b4aed6e895d0c075c56780548396f678720423de01a173911e3d00229bd1672bf073de54323043d44277974f15852393b4d97b915561a5ca510
-
C:\Users\Admin\AppData\Local\Temp\bl4ckb4ndFilesize
34KB
MD546f30194bd5792c73072d6cd782820d6
SHA1367635e048ba13741b461b864b8adc76841ae476
SHA2568bc9f898a96c6c90517a24919a45888f68d92232a8592b3cae8610c2d279cfa3
SHA512888aec428b266b4aed6e895d0c075c56780548396f678720423de01a173911e3d00229bd1672bf073de54323043d44277974f15852393b4d97b915561a5ca510
-
C:\Users\Admin\AppData\Local\Temp\bl4ckb4ndFilesize
34KB
MD546f30194bd5792c73072d6cd782820d6
SHA1367635e048ba13741b461b864b8adc76841ae476
SHA2568bc9f898a96c6c90517a24919a45888f68d92232a8592b3cae8610c2d279cfa3
SHA512888aec428b266b4aed6e895d0c075c56780548396f678720423de01a173911e3d00229bd1672bf073de54323043d44277974f15852393b4d97b915561a5ca510
-
C:\Users\Admin\AppData\Local\Temp\bl4ckb4ndFilesize
34KB
MD546f30194bd5792c73072d6cd782820d6
SHA1367635e048ba13741b461b864b8adc76841ae476
SHA2568bc9f898a96c6c90517a24919a45888f68d92232a8592b3cae8610c2d279cfa3
SHA512888aec428b266b4aed6e895d0c075c56780548396f678720423de01a173911e3d00229bd1672bf073de54323043d44277974f15852393b4d97b915561a5ca510
-
C:\Users\Admin\AppData\Local\Temp\bl4ckb4ndFilesize
34KB
MD546f30194bd5792c73072d6cd782820d6
SHA1367635e048ba13741b461b864b8adc76841ae476
SHA2568bc9f898a96c6c90517a24919a45888f68d92232a8592b3cae8610c2d279cfa3
SHA512888aec428b266b4aed6e895d0c075c56780548396f678720423de01a173911e3d00229bd1672bf073de54323043d44277974f15852393b4d97b915561a5ca510
-
C:\Users\Admin\AppData\Local\Temp\bl4ckb4ndFilesize
34KB
MD546f30194bd5792c73072d6cd782820d6
SHA1367635e048ba13741b461b864b8adc76841ae476
SHA2568bc9f898a96c6c90517a24919a45888f68d92232a8592b3cae8610c2d279cfa3
SHA512888aec428b266b4aed6e895d0c075c56780548396f678720423de01a173911e3d00229bd1672bf073de54323043d44277974f15852393b4d97b915561a5ca510
-
C:\Users\Admin\AppData\Local\Temp\bl4ckb4ndFilesize
34KB
MD546f30194bd5792c73072d6cd782820d6
SHA1367635e048ba13741b461b864b8adc76841ae476
SHA2568bc9f898a96c6c90517a24919a45888f68d92232a8592b3cae8610c2d279cfa3
SHA512888aec428b266b4aed6e895d0c075c56780548396f678720423de01a173911e3d00229bd1672bf073de54323043d44277974f15852393b4d97b915561a5ca510
-
C:\Users\Admin\AppData\Local\Temp\bl4ckb4ndFilesize
34KB
MD546f30194bd5792c73072d6cd782820d6
SHA1367635e048ba13741b461b864b8adc76841ae476
SHA2568bc9f898a96c6c90517a24919a45888f68d92232a8592b3cae8610c2d279cfa3
SHA512888aec428b266b4aed6e895d0c075c56780548396f678720423de01a173911e3d00229bd1672bf073de54323043d44277974f15852393b4d97b915561a5ca510
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exeFilesize
1.3MB
MD55818b9c7e1e4f408f28f5a6c6d0a7565
SHA1b18ddaf0338af454365b5acd9d5d3ac7a6a890e0
SHA256a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68
SHA5129fbc0219849c3735c35972cb323a393341f2691913676bf1d01159579fe28198db310b6738113550874e14b8c43b050d633c63b34c0a4e1f00fbe53ba4beb057
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exeFilesize
1.3MB
MD55818b9c7e1e4f408f28f5a6c6d0a7565
SHA1b18ddaf0338af454365b5acd9d5d3ac7a6a890e0
SHA256a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68
SHA5129fbc0219849c3735c35972cb323a393341f2691913676bf1d01159579fe28198db310b6738113550874e14b8c43b050d633c63b34c0a4e1f00fbe53ba4beb057
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exeFilesize
1.3MB
MD55818b9c7e1e4f408f28f5a6c6d0a7565
SHA1b18ddaf0338af454365b5acd9d5d3ac7a6a890e0
SHA256a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68
SHA5129fbc0219849c3735c35972cb323a393341f2691913676bf1d01159579fe28198db310b6738113550874e14b8c43b050d633c63b34c0a4e1f00fbe53ba4beb057
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exeFilesize
1.3MB
MD55818b9c7e1e4f408f28f5a6c6d0a7565
SHA1b18ddaf0338af454365b5acd9d5d3ac7a6a890e0
SHA256a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68
SHA5129fbc0219849c3735c35972cb323a393341f2691913676bf1d01159579fe28198db310b6738113550874e14b8c43b050d633c63b34c0a4e1f00fbe53ba4beb057
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exeFilesize
1.3MB
MD55818b9c7e1e4f408f28f5a6c6d0a7565
SHA1b18ddaf0338af454365b5acd9d5d3ac7a6a890e0
SHA256a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68
SHA5129fbc0219849c3735c35972cb323a393341f2691913676bf1d01159579fe28198db310b6738113550874e14b8c43b050d633c63b34c0a4e1f00fbe53ba4beb057
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exeFilesize
1.3MB
MD55818b9c7e1e4f408f28f5a6c6d0a7565
SHA1b18ddaf0338af454365b5acd9d5d3ac7a6a890e0
SHA256a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68
SHA5129fbc0219849c3735c35972cb323a393341f2691913676bf1d01159579fe28198db310b6738113550874e14b8c43b050d633c63b34c0a4e1f00fbe53ba4beb057
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exeFilesize
1.3MB
MD55818b9c7e1e4f408f28f5a6c6d0a7565
SHA1b18ddaf0338af454365b5acd9d5d3ac7a6a890e0
SHA256a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68
SHA5129fbc0219849c3735c35972cb323a393341f2691913676bf1d01159579fe28198db310b6738113550874e14b8c43b050d633c63b34c0a4e1f00fbe53ba4beb057
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exeFilesize
1.3MB
MD55818b9c7e1e4f408f28f5a6c6d0a7565
SHA1b18ddaf0338af454365b5acd9d5d3ac7a6a890e0
SHA256a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68
SHA5129fbc0219849c3735c35972cb323a393341f2691913676bf1d01159579fe28198db310b6738113550874e14b8c43b050d633c63b34c0a4e1f00fbe53ba4beb057
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exeFilesize
1.3MB
MD55818b9c7e1e4f408f28f5a6c6d0a7565
SHA1b18ddaf0338af454365b5acd9d5d3ac7a6a890e0
SHA256a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68
SHA5129fbc0219849c3735c35972cb323a393341f2691913676bf1d01159579fe28198db310b6738113550874e14b8c43b050d633c63b34c0a4e1f00fbe53ba4beb057
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exeFilesize
1.3MB
MD55818b9c7e1e4f408f28f5a6c6d0a7565
SHA1b18ddaf0338af454365b5acd9d5d3ac7a6a890e0
SHA256a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68
SHA5129fbc0219849c3735c35972cb323a393341f2691913676bf1d01159579fe28198db310b6738113550874e14b8c43b050d633c63b34c0a4e1f00fbe53ba4beb057
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exeFilesize
1.3MB
MD55818b9c7e1e4f408f28f5a6c6d0a7565
SHA1b18ddaf0338af454365b5acd9d5d3ac7a6a890e0
SHA256a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68
SHA5129fbc0219849c3735c35972cb323a393341f2691913676bf1d01159579fe28198db310b6738113550874e14b8c43b050d633c63b34c0a4e1f00fbe53ba4beb057
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exeFilesize
1.3MB
MD55818b9c7e1e4f408f28f5a6c6d0a7565
SHA1b18ddaf0338af454365b5acd9d5d3ac7a6a890e0
SHA256a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68
SHA5129fbc0219849c3735c35972cb323a393341f2691913676bf1d01159579fe28198db310b6738113550874e14b8c43b050d633c63b34c0a4e1f00fbe53ba4beb057
-
C:\Users\Admin\AppData\Roaming\Adobe\Java.exeFilesize
1.3MB
MD55818b9c7e1e4f408f28f5a6c6d0a7565
SHA1b18ddaf0338af454365b5acd9d5d3ac7a6a890e0
SHA256a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68
SHA5129fbc0219849c3735c35972cb323a393341f2691913676bf1d01159579fe28198db310b6738113550874e14b8c43b050d633c63b34c0a4e1f00fbe53ba4beb057
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exeFilesize
1.3MB
MD55818b9c7e1e4f408f28f5a6c6d0a7565
SHA1b18ddaf0338af454365b5acd9d5d3ac7a6a890e0
SHA256a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68
SHA5129fbc0219849c3735c35972cb323a393341f2691913676bf1d01159579fe28198db310b6738113550874e14b8c43b050d633c63b34c0a4e1f00fbe53ba4beb057
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exeFilesize
1.3MB
MD55818b9c7e1e4f408f28f5a6c6d0a7565
SHA1b18ddaf0338af454365b5acd9d5d3ac7a6a890e0
SHA256a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68
SHA5129fbc0219849c3735c35972cb323a393341f2691913676bf1d01159579fe28198db310b6738113550874e14b8c43b050d633c63b34c0a4e1f00fbe53ba4beb057
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exeFilesize
1.3MB
MD55818b9c7e1e4f408f28f5a6c6d0a7565
SHA1b18ddaf0338af454365b5acd9d5d3ac7a6a890e0
SHA256a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68
SHA5129fbc0219849c3735c35972cb323a393341f2691913676bf1d01159579fe28198db310b6738113550874e14b8c43b050d633c63b34c0a4e1f00fbe53ba4beb057
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exeFilesize
1.3MB
MD55818b9c7e1e4f408f28f5a6c6d0a7565
SHA1b18ddaf0338af454365b5acd9d5d3ac7a6a890e0
SHA256a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68
SHA5129fbc0219849c3735c35972cb323a393341f2691913676bf1d01159579fe28198db310b6738113550874e14b8c43b050d633c63b34c0a4e1f00fbe53ba4beb057
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exeFilesize
1.3MB
MD55818b9c7e1e4f408f28f5a6c6d0a7565
SHA1b18ddaf0338af454365b5acd9d5d3ac7a6a890e0
SHA256a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68
SHA5129fbc0219849c3735c35972cb323a393341f2691913676bf1d01159579fe28198db310b6738113550874e14b8c43b050d633c63b34c0a4e1f00fbe53ba4beb057
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exeFilesize
1.3MB
MD55818b9c7e1e4f408f28f5a6c6d0a7565
SHA1b18ddaf0338af454365b5acd9d5d3ac7a6a890e0
SHA256a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68
SHA5129fbc0219849c3735c35972cb323a393341f2691913676bf1d01159579fe28198db310b6738113550874e14b8c43b050d633c63b34c0a4e1f00fbe53ba4beb057
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exeFilesize
1.3MB
MD55818b9c7e1e4f408f28f5a6c6d0a7565
SHA1b18ddaf0338af454365b5acd9d5d3ac7a6a890e0
SHA256a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68
SHA5129fbc0219849c3735c35972cb323a393341f2691913676bf1d01159579fe28198db310b6738113550874e14b8c43b050d633c63b34c0a4e1f00fbe53ba4beb057
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exeFilesize
1.3MB
MD55818b9c7e1e4f408f28f5a6c6d0a7565
SHA1b18ddaf0338af454365b5acd9d5d3ac7a6a890e0
SHA256a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68
SHA5129fbc0219849c3735c35972cb323a393341f2691913676bf1d01159579fe28198db310b6738113550874e14b8c43b050d633c63b34c0a4e1f00fbe53ba4beb057
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\92Uc0EZwdkTP\msdcsc.exeFilesize
1.3MB
MD55818b9c7e1e4f408f28f5a6c6d0a7565
SHA1b18ddaf0338af454365b5acd9d5d3ac7a6a890e0
SHA256a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68
SHA5129fbc0219849c3735c35972cb323a393341f2691913676bf1d01159579fe28198db310b6738113550874e14b8c43b050d633c63b34c0a4e1f00fbe53ba4beb057
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\msdcsc.exeFilesize
1.3MB
MD55818b9c7e1e4f408f28f5a6c6d0a7565
SHA1b18ddaf0338af454365b5acd9d5d3ac7a6a890e0
SHA256a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68
SHA5129fbc0219849c3735c35972cb323a393341f2691913676bf1d01159579fe28198db310b6738113550874e14b8c43b050d633c63b34c0a4e1f00fbe53ba4beb057
-
C:\Windows\SysWOW64\MSDCSC\92Uc0EZwdkTP\msdcsc.exeFilesize
1.3MB
MD55818b9c7e1e4f408f28f5a6c6d0a7565
SHA1b18ddaf0338af454365b5acd9d5d3ac7a6a890e0
SHA256a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68
SHA5129fbc0219849c3735c35972cb323a393341f2691913676bf1d01159579fe28198db310b6738113550874e14b8c43b050d633c63b34c0a4e1f00fbe53ba4beb057
-
C:\Windows\SysWOW64\MSDCSC\msdcsc.exeFilesize
1.3MB
MD55818b9c7e1e4f408f28f5a6c6d0a7565
SHA1b18ddaf0338af454365b5acd9d5d3ac7a6a890e0
SHA256a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68
SHA5129fbc0219849c3735c35972cb323a393341f2691913676bf1d01159579fe28198db310b6738113550874e14b8c43b050d633c63b34c0a4e1f00fbe53ba4beb057
-
C:\Windows\SysWOW64\MSDCSC\msdcsc.exeFilesize
1.3MB
MD55818b9c7e1e4f408f28f5a6c6d0a7565
SHA1b18ddaf0338af454365b5acd9d5d3ac7a6a890e0
SHA256a92da5f4be8e9765ace3961ffc07677f0645589dade7fa271a2dc453f751cb68
SHA5129fbc0219849c3735c35972cb323a393341f2691913676bf1d01159579fe28198db310b6738113550874e14b8c43b050d633c63b34c0a4e1f00fbe53ba4beb057
-
memory/100-191-0x0000000000000000-mapping.dmp
-
memory/116-221-0x0000000000000000-mapping.dmp
-
memory/204-140-0x0000000000000000-mapping.dmp
-
memory/224-225-0x0000000000000000-mapping.dmp
-
memory/308-196-0x0000000000000000-mapping.dmp
-
memory/312-246-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/312-242-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/312-232-0x0000000000000000-mapping.dmp
-
memory/312-236-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/380-163-0x0000000000000000-mapping.dmp
-
memory/380-167-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/536-244-0x0000000000000000-mapping.dmp
-
memory/624-282-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/624-255-0x0000000000000000-mapping.dmp
-
memory/624-285-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/624-279-0x0000000000000000-mapping.dmp
-
memory/944-202-0x0000000000000000-mapping.dmp
-
memory/944-204-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/944-215-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/944-211-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/1008-139-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/1008-137-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/1008-133-0x0000000000000000-mapping.dmp
-
memory/1008-148-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/1064-273-0x0000000000000000-mapping.dmp
-
memory/1152-195-0x0000000000000000-mapping.dmp
-
memory/1212-173-0x0000000000000000-mapping.dmp
-
memory/1408-256-0x0000000000000000-mapping.dmp
-
memory/1420-209-0x0000000000000000-mapping.dmp
-
memory/1444-180-0x0000000000000000-mapping.dmp
-
memory/1444-187-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/1444-183-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/1448-161-0x0000000000000000-mapping.dmp
-
memory/1580-154-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/1580-151-0x0000000000000000-mapping.dmp
-
memory/1580-166-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/1580-160-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/1592-271-0x0000000000000000-mapping.dmp
-
memory/1592-259-0x0000000000000000-mapping.dmp
-
memory/1652-240-0x0000000000000000-mapping.dmp
-
memory/1720-156-0x0000000000000000-mapping.dmp
-
memory/1772-142-0x0000000000000000-mapping.dmp
-
memory/1840-143-0x0000000000000000-mapping.dmp
-
memory/1964-185-0x0000000000000000-mapping.dmp
-
memory/1964-188-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/1964-192-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/1964-199-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/2020-197-0x0000000000000000-mapping.dmp
-
memory/2020-201-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/2224-223-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/2224-217-0x0000000000000000-mapping.dmp
-
memory/2224-229-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/2256-206-0x0000000000000000-mapping.dmp
-
memory/2568-210-0x0000000000000000-mapping.dmp
-
memory/2588-190-0x0000000000000000-mapping.dmp
-
memory/3008-303-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/3316-159-0x0000000000000000-mapping.dmp
-
memory/3340-276-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/3340-267-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/3340-265-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/3340-263-0x0000000000000000-mapping.dmp
-
memory/3372-194-0x0000000000000000-mapping.dmp
-
memory/3404-162-0x0000000000000000-mapping.dmp
-
memory/3464-179-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/3464-169-0x0000000000000000-mapping.dmp
-
memory/3464-171-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/3476-237-0x0000000000000000-mapping.dmp
-
memory/3720-277-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/3720-281-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/3720-274-0x0000000000000000-mapping.dmp
-
memory/3768-238-0x0000000000000000-mapping.dmp
-
memory/3816-253-0x0000000000000000-mapping.dmp
-
memory/3896-157-0x0000000000000000-mapping.dmp
-
memory/3984-212-0x0000000000000000-mapping.dmp
-
memory/4016-269-0x0000000000000000-mapping.dmp
-
memory/4024-272-0x0000000000000000-mapping.dmp
-
memory/4032-230-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/4032-234-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/4032-227-0x0000000000000000-mapping.dmp
-
memory/4148-268-0x0000000000000000-mapping.dmp
-
memory/4156-177-0x0000000000000000-mapping.dmp
-
memory/4168-258-0x0000000000000000-mapping.dmp
-
memory/4260-145-0x0000000000000000-mapping.dmp
-
memory/4260-150-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/4272-144-0x0000000000000000-mapping.dmp
-
memory/4284-220-0x0000000000000000-mapping.dmp
-
memory/4296-136-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/4296-132-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/4348-257-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/4348-251-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/4348-261-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/4348-248-0x0000000000000000-mapping.dmp
-
memory/4380-315-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/4408-174-0x0000000000000000-mapping.dmp
-
memory/4500-226-0x0000000000000000-mapping.dmp
-
memory/4620-252-0x0000000000000000-mapping.dmp
-
memory/4648-224-0x0000000000000000-mapping.dmp
-
memory/4676-213-0x0000000000000000-mapping.dmp
-
memory/4868-178-0x0000000000000000-mapping.dmp
-
memory/4988-141-0x0000000000000000-mapping.dmp
-
memory/5016-241-0x0000000000000000-mapping.dmp
-
memory/5044-243-0x0000000000000000-mapping.dmp
-
memory/5084-176-0x0000000000000000-mapping.dmp
-
memory/5100-207-0x0000000000000000-mapping.dmp
-
memory/5184-287-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/5184-290-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/5228-308-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/5240-301-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/5240-302-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/5284-293-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/5284-292-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/5368-313-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/5368-314-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/5604-294-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/5636-310-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/5636-309-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/5636-304-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/5636-305-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/5692-295-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/5692-296-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/5760-306-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/5968-297-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/6016-311-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/6016-312-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/6048-300-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/6048-299-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/6048-298-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB
-
memory/6128-307-0x0000000000400000-0x00000000006C7000-memory.dmpFilesize
2.8MB