Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
02-06-2023 09:21
Static task
static1
Behavioral task
behavioral1
Sample
a1d05206520518a47f710e7197bbc336.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
a1d05206520518a47f710e7197bbc336.exe
Resource
win10v2004-20230221-en
General
-
Target
a1d05206520518a47f710e7197bbc336.exe
-
Size
1.5MB
-
MD5
a1d05206520518a47f710e7197bbc336
-
SHA1
270ac60027ac01b78139bec3a6fe54f702c4fe96
-
SHA256
374eba5495779dc24974bb881e0c3f298861a91d88d710da4f684bf8a2a01fe6
-
SHA512
6164910de359dd7f9ad12e75c1ea170ff5fb313598da249c12888a100cd01e3888bbea25240a7924ea825147a7979b0b941e9d8916a322dbb3846c077959921a
-
SSDEEP
24576:YW3QhwWwORHtx07i/85O8q9Fx7hFsf1gj7xN9sKrogXMAGqo3K6L29ufIOT0Gj:YW3QNRH/07imOljZhFsf1s9ZkgXZkKxC
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process 42 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2360 2840 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 780 2840 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2496 2840 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1656 2840 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3712 2840 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 692 2840 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4464 2840 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3920 2840 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3340 2840 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 920 2840 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1172 2840 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3692 2840 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4812 2840 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3660 2840 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4056 2840 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2692 2840 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 916 2840 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3680 2840 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3496 2840 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2732 2840 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2132 2840 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5084 2840 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4784 2840 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1004 2840 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 848 2840 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4500 2840 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1368 2840 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2988 2840 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4908 2840 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3640 2840 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 756 2840 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3340 2840 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2300 2840 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1636 2840 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1852 2840 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3244 2840 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1836 2840 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2208 2840 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2628 2840 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1688 2840 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2456 2840 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3748 2840 schtasks.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\GoogleChromeUpdate\GoogleChromeUpdate.exe dcrat C:\Users\Admin\AppData\Local\Temp\GoogleChromeUpdate\GoogleChromeUpdate.exe dcrat C:\Users\Admin\AppData\Local\Temp\GoogleChromeUpdate\GoogleChromeUpdate.exe dcrat C:\ProgramData\componentsessioncrt.exe dcrat C:\ProgramData\componentsessioncrt.exe dcrat behavioral2/memory/3156-158-0x0000000000D30000-0x0000000000E2E000-memory.dmp dcrat C:\Program Files (x86)\Internet Explorer\conhost.exe dcrat C:\ProgramData\componentsessioncrt.exe dcrat C:\odt\lsass.exe dcrat C:\odt\lsass.exe dcrat -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
a1d05206520518a47f710e7197bbc336.exeGoogleChromeUpdate.exeWScript.execomponentsessioncrt.execomponentsessioncrt.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation a1d05206520518a47f710e7197bbc336.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation GoogleChromeUpdate.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation componentsessioncrt.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation componentsessioncrt.exe -
Executes dropped EXE 4 IoCs
Processes:
GoogleChromeUpdate.execomponentsessioncrt.execomponentsessioncrt.exelsass.exepid process 4736 GoogleChromeUpdate.exe 3156 componentsessioncrt.exe 4132 componentsessioncrt.exe 3784 lsass.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in Program Files directory 12 IoCs
Processes:
componentsessioncrt.execomponentsessioncrt.exedescription ioc process File created C:\Program Files (x86)\Internet Explorer\088424020bedd6 componentsessioncrt.exe File created C:\Program Files\7-Zip\Lang\RuntimeBroker.exe componentsessioncrt.exe File created C:\Program Files (x86)\Windows Photo Viewer\de-DE\csrss.exe componentsessioncrt.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\de-DE\csrss.exe componentsessioncrt.exe File created C:\Program Files (x86)\Windows NT\TableTextService\en-US\explorer.exe componentsessioncrt.exe File created C:\Program Files (x86)\Windows NT\TableTextService\en-US\7a0fd90576e088 componentsessioncrt.exe File created C:\Program Files (x86)\Windows Media Player\Skins\MoUsoCoreWorker.exe componentsessioncrt.exe File created C:\Program Files (x86)\Internet Explorer\conhost.exe componentsessioncrt.exe File created C:\Program Files (x86)\Windows Photo Viewer\de-DE\886983d96e3d3e componentsessioncrt.exe File created C:\Program Files\ModifiableWindowsApps\smss.exe componentsessioncrt.exe File created C:\Program Files (x86)\Windows Media Player\Skins\1f93f77a7f4778 componentsessioncrt.exe File created C:\Program Files\7-Zip\Lang\9e8d7a4ca61bd9 componentsessioncrt.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 42 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 4908 schtasks.exe 3640 schtasks.exe 2300 schtasks.exe 3712 schtasks.exe 692 schtasks.exe 4812 schtasks.exe 4500 schtasks.exe 2988 schtasks.exe 1636 schtasks.exe 780 schtasks.exe 3340 schtasks.exe 1172 schtasks.exe 916 schtasks.exe 1852 schtasks.exe 2496 schtasks.exe 1004 schtasks.exe 3748 schtasks.exe 3680 schtasks.exe 5084 schtasks.exe 4784 schtasks.exe 3244 schtasks.exe 1688 schtasks.exe 2732 schtasks.exe 3340 schtasks.exe 1836 schtasks.exe 2208 schtasks.exe 2628 schtasks.exe 4464 schtasks.exe 3660 schtasks.exe 2132 schtasks.exe 2456 schtasks.exe 756 schtasks.exe 1656 schtasks.exe 3692 schtasks.exe 4056 schtasks.exe 848 schtasks.exe 1368 schtasks.exe 2360 schtasks.exe 3920 schtasks.exe 920 schtasks.exe 2692 schtasks.exe 3496 schtasks.exe -
Modifies registry class 3 IoCs
Processes:
GoogleChromeUpdate.execomponentsessioncrt.execomponentsessioncrt.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings GoogleChromeUpdate.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings componentsessioncrt.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings componentsessioncrt.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
componentsessioncrt.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exeschtasks.execomponentsessioncrt.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid process 3156 componentsessioncrt.exe 3156 componentsessioncrt.exe 3156 componentsessioncrt.exe 3156 componentsessioncrt.exe 3156 componentsessioncrt.exe 3156 componentsessioncrt.exe 3156 componentsessioncrt.exe 3156 componentsessioncrt.exe 3156 componentsessioncrt.exe 3124 powershell.exe 3124 powershell.exe 3548 powershell.exe 3548 powershell.exe 1636 powershell.exe 1636 powershell.exe 5092 powershell.exe 5092 powershell.exe 3388 powershell.exe 3388 powershell.exe 5008 powershell.exe 5008 powershell.exe 3848 powershell.exe 3848 powershell.exe 1384 powershell.exe 1384 powershell.exe 4520 powershell.exe 4520 powershell.exe 2968 powershell.exe 2968 powershell.exe 3040 powershell.exe 3040 powershell.exe 4192 powershell.exe 4192 powershell.exe 1384 powershell.exe 4192 1636 schtasks.exe 3124 powershell.exe 5092 powershell.exe 3848 powershell.exe 5008 powershell.exe 3388 powershell.exe 4520 powershell.exe 3040 powershell.exe 2968 powershell.exe 3548 powershell.exe 4132 componentsessioncrt.exe 4132 componentsessioncrt.exe 4132 componentsessioncrt.exe 4132 componentsessioncrt.exe 4132 componentsessioncrt.exe 4132 componentsessioncrt.exe 4132 componentsessioncrt.exe 4132 componentsessioncrt.exe 4132 componentsessioncrt.exe 2228 powershell.exe 2228 powershell.exe 2256 powershell.exe 2256 powershell.exe 1172 powershell.exe 1172 powershell.exe 2940 powershell.exe 2940 powershell.exe 2348 powershell.exe 2348 powershell.exe -
Suspicious use of AdjustPrivilegeToken 27 IoCs
Processes:
componentsessioncrt.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.execomponentsessioncrt.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exelsass.exedescription pid process Token: SeDebugPrivilege 3156 componentsessioncrt.exe Token: SeDebugPrivilege 3124 powershell.exe Token: SeDebugPrivilege 3548 powershell.exe Token: SeDebugPrivilege 1636 powershell.exe Token: SeDebugPrivilege 5092 powershell.exe Token: SeDebugPrivilege 3388 powershell.exe Token: SeDebugPrivilege 5008 powershell.exe Token: SeDebugPrivilege 3848 powershell.exe Token: SeDebugPrivilege 1384 powershell.exe Token: SeDebugPrivilege 4520 powershell.exe Token: SeDebugPrivilege 4192 powershell.exe Token: SeDebugPrivilege 2968 powershell.exe Token: SeDebugPrivilege 3040 powershell.exe Token: SeDebugPrivilege 4132 componentsessioncrt.exe Token: SeDebugPrivilege 2228 powershell.exe Token: SeDebugPrivilege 2256 powershell.exe Token: SeDebugPrivilege 1172 powershell.exe Token: SeDebugPrivilege 2940 powershell.exe Token: SeDebugPrivilege 2348 powershell.exe Token: SeDebugPrivilege 1740 powershell.exe Token: SeDebugPrivilege 1936 powershell.exe Token: SeDebugPrivilege 3576 powershell.exe Token: SeDebugPrivilege 4688 powershell.exe Token: SeDebugPrivilege 2116 powershell.exe Token: SeDebugPrivilege 1780 powershell.exe Token: SeDebugPrivilege 3064 powershell.exe Token: SeDebugPrivilege 3784 lsass.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
a1d05206520518a47f710e7197bbc336.exeGoogleChromeUpdate.exeWScript.execmd.execomponentsessioncrt.execmd.execomponentsessioncrt.exedescription pid process target process PID 2348 wrote to memory of 1300 2348 a1d05206520518a47f710e7197bbc336.exe cmd.exe PID 2348 wrote to memory of 1300 2348 a1d05206520518a47f710e7197bbc336.exe cmd.exe PID 2348 wrote to memory of 4736 2348 a1d05206520518a47f710e7197bbc336.exe GoogleChromeUpdate.exe PID 2348 wrote to memory of 4736 2348 a1d05206520518a47f710e7197bbc336.exe GoogleChromeUpdate.exe PID 2348 wrote to memory of 4736 2348 a1d05206520518a47f710e7197bbc336.exe GoogleChromeUpdate.exe PID 4736 wrote to memory of 2904 4736 GoogleChromeUpdate.exe WScript.exe PID 4736 wrote to memory of 2904 4736 GoogleChromeUpdate.exe WScript.exe PID 4736 wrote to memory of 2904 4736 GoogleChromeUpdate.exe WScript.exe PID 2904 wrote to memory of 880 2904 WScript.exe cmd.exe PID 2904 wrote to memory of 880 2904 WScript.exe cmd.exe PID 2904 wrote to memory of 880 2904 WScript.exe cmd.exe PID 880 wrote to memory of 3156 880 cmd.exe componentsessioncrt.exe PID 880 wrote to memory of 3156 880 cmd.exe componentsessioncrt.exe PID 3156 wrote to memory of 1384 3156 componentsessioncrt.exe powershell.exe PID 3156 wrote to memory of 1384 3156 componentsessioncrt.exe powershell.exe PID 3156 wrote to memory of 1636 3156 componentsessioncrt.exe powershell.exe PID 3156 wrote to memory of 1636 3156 componentsessioncrt.exe powershell.exe PID 3156 wrote to memory of 3548 3156 componentsessioncrt.exe powershell.exe PID 3156 wrote to memory of 3548 3156 componentsessioncrt.exe powershell.exe PID 3156 wrote to memory of 4192 3156 componentsessioncrt.exe powershell.exe PID 3156 wrote to memory of 4192 3156 componentsessioncrt.exe powershell.exe PID 3156 wrote to memory of 2968 3156 componentsessioncrt.exe powershell.exe PID 3156 wrote to memory of 2968 3156 componentsessioncrt.exe powershell.exe PID 3156 wrote to memory of 3040 3156 componentsessioncrt.exe powershell.exe PID 3156 wrote to memory of 3040 3156 componentsessioncrt.exe powershell.exe PID 3156 wrote to memory of 3388 3156 componentsessioncrt.exe powershell.exe PID 3156 wrote to memory of 3388 3156 componentsessioncrt.exe powershell.exe PID 3156 wrote to memory of 5008 3156 componentsessioncrt.exe powershell.exe PID 3156 wrote to memory of 5008 3156 componentsessioncrt.exe powershell.exe PID 3156 wrote to memory of 5092 3156 componentsessioncrt.exe powershell.exe PID 3156 wrote to memory of 5092 3156 componentsessioncrt.exe powershell.exe PID 3156 wrote to memory of 3848 3156 componentsessioncrt.exe powershell.exe PID 3156 wrote to memory of 3848 3156 componentsessioncrt.exe powershell.exe PID 3156 wrote to memory of 4520 3156 componentsessioncrt.exe powershell.exe PID 3156 wrote to memory of 4520 3156 componentsessioncrt.exe powershell.exe PID 3156 wrote to memory of 3124 3156 componentsessioncrt.exe powershell.exe PID 3156 wrote to memory of 3124 3156 componentsessioncrt.exe powershell.exe PID 3156 wrote to memory of 3776 3156 componentsessioncrt.exe cmd.exe PID 3156 wrote to memory of 3776 3156 componentsessioncrt.exe cmd.exe PID 3776 wrote to memory of 936 3776 cmd.exe w32tm.exe PID 3776 wrote to memory of 936 3776 cmd.exe w32tm.exe PID 3776 wrote to memory of 4132 3776 cmd.exe componentsessioncrt.exe PID 3776 wrote to memory of 4132 3776 cmd.exe componentsessioncrt.exe PID 4132 wrote to memory of 2256 4132 componentsessioncrt.exe powershell.exe PID 4132 wrote to memory of 2256 4132 componentsessioncrt.exe powershell.exe PID 4132 wrote to memory of 3064 4132 componentsessioncrt.exe powershell.exe PID 4132 wrote to memory of 3064 4132 componentsessioncrt.exe powershell.exe PID 4132 wrote to memory of 1936 4132 componentsessioncrt.exe powershell.exe PID 4132 wrote to memory of 1936 4132 componentsessioncrt.exe powershell.exe PID 4132 wrote to memory of 2228 4132 componentsessioncrt.exe powershell.exe PID 4132 wrote to memory of 2228 4132 componentsessioncrt.exe powershell.exe PID 4132 wrote to memory of 2940 4132 componentsessioncrt.exe powershell.exe PID 4132 wrote to memory of 2940 4132 componentsessioncrt.exe powershell.exe PID 4132 wrote to memory of 1172 4132 componentsessioncrt.exe powershell.exe PID 4132 wrote to memory of 1172 4132 componentsessioncrt.exe powershell.exe PID 4132 wrote to memory of 3576 4132 componentsessioncrt.exe powershell.exe PID 4132 wrote to memory of 3576 4132 componentsessioncrt.exe powershell.exe PID 4132 wrote to memory of 2348 4132 componentsessioncrt.exe powershell.exe PID 4132 wrote to memory of 2348 4132 componentsessioncrt.exe powershell.exe PID 4132 wrote to memory of 1740 4132 componentsessioncrt.exe powershell.exe PID 4132 wrote to memory of 1740 4132 componentsessioncrt.exe powershell.exe PID 4132 wrote to memory of 4688 4132 componentsessioncrt.exe powershell.exe PID 4132 wrote to memory of 4688 4132 componentsessioncrt.exe powershell.exe PID 4132 wrote to memory of 1780 4132 componentsessioncrt.exe powershell.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1d05206520518a47f710e7197bbc336.exe"C:\Users\Admin\AppData\Local\Temp\a1d05206520518a47f710e7197bbc336.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c ""C:\Users\Admin\AppData\Local\Temp\GoogleChromeUpdate\KillDuplicate.cmd" "C:\Users\Admin\AppData\Local\Temp\GoogleChromeUpdate" "a1d05206520518a47f710e7197bbc336.exe""2⤵
-
C:\Users\Admin\AppData\Local\Temp\GoogleChromeUpdate\GoogleChromeUpdate.exe"C:\Users\Admin\AppData\Local\Temp\GoogleChromeUpdate\GoogleChromeUpdate.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ProgramData\01JDjn9an.vbe"3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ProgramData\vyRlj1SkqrfRYAG7.bat" "4⤵
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\componentsessioncrt.exe"C:\ProgramData\componentsessioncrt.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/'6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/odt/'6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\mSSrp8dhrf.bat"6⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:27⤵
-
C:\ProgramData\componentsessioncrt.exe"C:\ProgramData\componentsessioncrt.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'8⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ybAbNnqa15.bat"8⤵
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:29⤵
-
C:\odt\lsass.exe"C:\odt\lsass.exe"9⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'8⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'8⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'8⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'8⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'8⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'8⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'8⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'8⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/odt/'8⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'8⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/'8⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TrustedInstallerT" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\TrustedInstaller.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TrustedInstaller" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\TrustedInstaller.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TrustedInstallerT" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\TrustedInstaller.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Internet Explorer\conhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Internet Explorer\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Internet Explorer\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 7 /tr "'C:\Program Files\7-Zip\Lang\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files\7-Zip\Lang\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 12 /tr "'C:\Program Files\7-Zip\Lang\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "componentsessioncrtc" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\componentsessioncrt.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "componentsessioncrt" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\componentsessioncrt.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "componentsessioncrtc" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\componentsessioncrt.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\SppExtComObj.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows Photo Viewer\de-DE\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Photo Viewer\de-DE\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows Photo Viewer\de-DE\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 14 /tr "'C:\Users\Default\Favorites\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Users\Default\Favorites\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 6 /tr "'C:\Users\Default\Favorites\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 10 /tr "'C:\odt\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\odt\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 5 /tr "'C:\odt\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows NT\TableTextService\en-US\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows NT\TableTextService\en-US\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows NT\TableTextService\en-US\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 14 /tr "'C:\odt\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\odt\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 5 /tr "'C:\odt\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 13 /tr "'C:\odt\System.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\odt\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 14 /tr "'C:\odt\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 12 /tr "'C:\Users\Public\taskhostw.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Users\Public\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 13 /tr "'C:\Users\Public\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MoUsoCoreWorkerM" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows Media Player\Skins\MoUsoCoreWorker.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MoUsoCoreWorker" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Media Player\Skins\MoUsoCoreWorker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MoUsoCoreWorkerM" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Windows Media Player\Skins\MoUsoCoreWorker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Internet Explorer\conhost.exeFilesize
983KB
MD55defd0000aa1bf0805c8d2e2fc3ed20d
SHA1e7a366a7a834e2ab3cabc3dd412f065c636b4efb
SHA256fc11e2bbd6d3e8dce36393b3b00504ce8ed994e0498fffee0ce42d838ae51888
SHA512e387cb219aec67da2eab62d7f091b8cad5b87cd971477f50c80ba263d009bc862ff272611a572de5cf51a27119e5ad0fae33cb9a4953b91768ed9252ebe84a7d
-
C:\ProgramData\01JDjn9an.vbeFilesize
205B
MD576db147c9e20a89ea972166168a4b9ba
SHA1475c26be4c2e8bc8ef0fd4bcc469e92e64f332ae
SHA2565699049e3e55284b66a98cdbce5b4c36c3ce7396bdf60632c544ce390bad6dd0
SHA512e32b9bfa54d9c71d1b17ea71ee5846a9f2220b77ad23045f5662c52324037e99cab253676d8d8e75bea44e2cf824b1ea3cc92ee84cced7866292eb73d51f77eb
-
C:\ProgramData\componentsessioncrt.exeFilesize
983KB
MD55defd0000aa1bf0805c8d2e2fc3ed20d
SHA1e7a366a7a834e2ab3cabc3dd412f065c636b4efb
SHA256fc11e2bbd6d3e8dce36393b3b00504ce8ed994e0498fffee0ce42d838ae51888
SHA512e387cb219aec67da2eab62d7f091b8cad5b87cd971477f50c80ba263d009bc862ff272611a572de5cf51a27119e5ad0fae33cb9a4953b91768ed9252ebe84a7d
-
C:\ProgramData\componentsessioncrt.exeFilesize
983KB
MD55defd0000aa1bf0805c8d2e2fc3ed20d
SHA1e7a366a7a834e2ab3cabc3dd412f065c636b4efb
SHA256fc11e2bbd6d3e8dce36393b3b00504ce8ed994e0498fffee0ce42d838ae51888
SHA512e387cb219aec67da2eab62d7f091b8cad5b87cd971477f50c80ba263d009bc862ff272611a572de5cf51a27119e5ad0fae33cb9a4953b91768ed9252ebe84a7d
-
C:\ProgramData\componentsessioncrt.exeFilesize
983KB
MD55defd0000aa1bf0805c8d2e2fc3ed20d
SHA1e7a366a7a834e2ab3cabc3dd412f065c636b4efb
SHA256fc11e2bbd6d3e8dce36393b3b00504ce8ed994e0498fffee0ce42d838ae51888
SHA512e387cb219aec67da2eab62d7f091b8cad5b87cd971477f50c80ba263d009bc862ff272611a572de5cf51a27119e5ad0fae33cb9a4953b91768ed9252ebe84a7d
-
C:\ProgramData\vyRlj1SkqrfRYAG7.batFilesize
40B
MD589947106df373d55eec5d73e11eac3e1
SHA1788822f62913626780934e0bae6239b2f945dc61
SHA256b30caba090d08a4bd296166f4833c90e5c0057d1bd04e0d50592319bccaf4637
SHA512cc4d1a9b2fc1596526e99488fffde8d39c263b5551c5c5696dacbe3065cf44f5a94d77a34821cfe10b53e0e9202c3328850bd53bc6e0d4aca3ff99d729e33168
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\componentsessioncrt.exe.logFilesize
1KB
MD57f3c0ae41f0d9ae10a8985a2c327b8fb
SHA1d58622bf6b5071beacf3b35bb505bde2000983e3
SHA256519fceae4d0dd4d09edd1b81bcdfa8aeab4b59eee77a4cd4b6295ce8e591a900
SHA5128a8fd17eef071f86e672cba0d8fc2cfed6118aff816100b9d7c06eb96443c04c04bc5692259c8d7ecb1563e877921939c61726605af4f969e3f586f0913ed125
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5cadef9abd087803c630df65264a6c81c
SHA1babbf3636c347c8727c35f3eef2ee643dbcc4bd2
SHA256cce65b73cdfe9304bcd5207913e8b60fb69faa20cd3b684f2b0343b755b99438
SHA5127278aa87124abb382d9024a645e881e7b7cf1b84e8894943b36e018dbf0399e6858392f77980b599fa5488e2e21bf757a0702fe6419417edac93b68e0c2ec085
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5cadef9abd087803c630df65264a6c81c
SHA1babbf3636c347c8727c35f3eef2ee643dbcc4bd2
SHA256cce65b73cdfe9304bcd5207913e8b60fb69faa20cd3b684f2b0343b755b99438
SHA5127278aa87124abb382d9024a645e881e7b7cf1b84e8894943b36e018dbf0399e6858392f77980b599fa5488e2e21bf757a0702fe6419417edac93b68e0c2ec085
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5cadef9abd087803c630df65264a6c81c
SHA1babbf3636c347c8727c35f3eef2ee643dbcc4bd2
SHA256cce65b73cdfe9304bcd5207913e8b60fb69faa20cd3b684f2b0343b755b99438
SHA5127278aa87124abb382d9024a645e881e7b7cf1b84e8894943b36e018dbf0399e6858392f77980b599fa5488e2e21bf757a0702fe6419417edac93b68e0c2ec085
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5cadef9abd087803c630df65264a6c81c
SHA1babbf3636c347c8727c35f3eef2ee643dbcc4bd2
SHA256cce65b73cdfe9304bcd5207913e8b60fb69faa20cd3b684f2b0343b755b99438
SHA5127278aa87124abb382d9024a645e881e7b7cf1b84e8894943b36e018dbf0399e6858392f77980b599fa5488e2e21bf757a0702fe6419417edac93b68e0c2ec085
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5cadef9abd087803c630df65264a6c81c
SHA1babbf3636c347c8727c35f3eef2ee643dbcc4bd2
SHA256cce65b73cdfe9304bcd5207913e8b60fb69faa20cd3b684f2b0343b755b99438
SHA5127278aa87124abb382d9024a645e881e7b7cf1b84e8894943b36e018dbf0399e6858392f77980b599fa5488e2e21bf757a0702fe6419417edac93b68e0c2ec085
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5e448fe0d240184c6597a31d3be2ced58
SHA1372b8d8c19246d3e38cd3ba123cc0f56070f03cd
SHA256c660f0db85a1e7f0f68db19868979bf50bd541531babf77a701e1b1ce5e6a391
SHA5120b7f7eae7700d32b18eee3677cb7f89b46ace717fa7e6b501d6c47d54f15dff7e12b49f5a7d36a6ffe4c16165c7d55162db4f3621db545b6af638035752beab4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5bd5940f08d0be56e65e5f2aaf47c538e
SHA1d7e31b87866e5e383ab5499da64aba50f03e8443
SHA2562d2f364c75bd2897504249f42cdf1d19374f5230aad68fa9154ea3d03e3031a6
SHA512c34d10c7e07da44a180fae9889b61f08903aa84e8ddfa80c31c272b1ef9d491b8cec6b8a4c836c3cb1583fe8f4955c6a8db872515de3a9e10eae09610c959406
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5bd5940f08d0be56e65e5f2aaf47c538e
SHA1d7e31b87866e5e383ab5499da64aba50f03e8443
SHA2562d2f364c75bd2897504249f42cdf1d19374f5230aad68fa9154ea3d03e3031a6
SHA512c34d10c7e07da44a180fae9889b61f08903aa84e8ddfa80c31c272b1ef9d491b8cec6b8a4c836c3cb1583fe8f4955c6a8db872515de3a9e10eae09610c959406
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5bd5940f08d0be56e65e5f2aaf47c538e
SHA1d7e31b87866e5e383ab5499da64aba50f03e8443
SHA2562d2f364c75bd2897504249f42cdf1d19374f5230aad68fa9154ea3d03e3031a6
SHA512c34d10c7e07da44a180fae9889b61f08903aa84e8ddfa80c31c272b1ef9d491b8cec6b8a4c836c3cb1583fe8f4955c6a8db872515de3a9e10eae09610c959406
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD55f0ddc7f3691c81ee14d17b419ba220d
SHA1f0ef5fde8bab9d17c0b47137e014c91be888ee53
SHA256a31805264b8b13ce4145f272cb2830728c186c46e314b48514d636866217add5
SHA5122ce7c2a0833f581297c13dd88ccfcd36bf129d2b5d7718c52b1d67c97cbd8fc93abc085a040229a0fd712e880c690de7f6b996b0b47c46a091fabb7931be58d3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD55f0ddc7f3691c81ee14d17b419ba220d
SHA1f0ef5fde8bab9d17c0b47137e014c91be888ee53
SHA256a31805264b8b13ce4145f272cb2830728c186c46e314b48514d636866217add5
SHA5122ce7c2a0833f581297c13dd88ccfcd36bf129d2b5d7718c52b1d67c97cbd8fc93abc085a040229a0fd712e880c690de7f6b996b0b47c46a091fabb7931be58d3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5e243a38635ff9a06c87c2a61a2200656
SHA1ecd95ed5bf1a9fbe96a8448fc2814a0210fa2afc
SHA256af5782703f3f2d5a29fb313dae6680a64134db26064d4a321a3f23b75f6ca00f
SHA5124418957a1b10eee44cf270c81816ae707352411c4f5ac14b6b61ab537c91480e24e0a0a2c276a6291081b4984c123cf673a45dcedb0ceeef682054ba0fc19cb4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5e243a38635ff9a06c87c2a61a2200656
SHA1ecd95ed5bf1a9fbe96a8448fc2814a0210fa2afc
SHA256af5782703f3f2d5a29fb313dae6680a64134db26064d4a321a3f23b75f6ca00f
SHA5124418957a1b10eee44cf270c81816ae707352411c4f5ac14b6b61ab537c91480e24e0a0a2c276a6291081b4984c123cf673a45dcedb0ceeef682054ba0fc19cb4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD57d9ecfe610b58440e18d2bffe5167d71
SHA17afeed064042ef5e614228f678a0c595699c3d84
SHA2562c42082be2718281fe2a2bf0136bf417ff214ce7c36bc22a40d23adb1d026632
SHA512017a63c4b81cd256adec796b9258fbae464d32af59cb654a81dd157e02896f50a252c25b6eac07fc6cb44a493b477e7debfaf9999c854dbd3fb34e24ef443c29
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5cbc41bceec6e8cf6d23f68d952487858
SHA1f52edbceff042ded7209e8be90ec5e09086d62eb
SHA256b97a8a2a5dbc3c1b994affa4751e61e1ac6bddcf336a4c77ee96a3ce07c59f4d
SHA5120f025ea2559e477c56500b9f4ecc251325793629cf1ae8d43ad783f1036b830c51757274b0aa8bb3183ac636cdfc1e0e8be1163a45695b8fb57df98c362534fb
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD520ccd8eee8fb63b0f660c38299f815d4
SHA15882e3b12448a5cd6ab57008c1be852ac84cade1
SHA256cad714968818e2c4fec544ad7aa0faf5da04809f8efd1a8699d2861d0c0809e3
SHA51228b87bd117a752ce699bd00c651c095dcfdb2a6cf71687177862c9062c3f73243ac32ac1b709804f940eef8c1f3e233593c73c4831449742c931d8c845c9fd8f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD520ccd8eee8fb63b0f660c38299f815d4
SHA15882e3b12448a5cd6ab57008c1be852ac84cade1
SHA256cad714968818e2c4fec544ad7aa0faf5da04809f8efd1a8699d2861d0c0809e3
SHA51228b87bd117a752ce699bd00c651c095dcfdb2a6cf71687177862c9062c3f73243ac32ac1b709804f940eef8c1f3e233593c73c4831449742c931d8c845c9fd8f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD520ccd8eee8fb63b0f660c38299f815d4
SHA15882e3b12448a5cd6ab57008c1be852ac84cade1
SHA256cad714968818e2c4fec544ad7aa0faf5da04809f8efd1a8699d2861d0c0809e3
SHA51228b87bd117a752ce699bd00c651c095dcfdb2a6cf71687177862c9062c3f73243ac32ac1b709804f940eef8c1f3e233593c73c4831449742c931d8c845c9fd8f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5fd86c55419dcac3423864e0b93f54bef
SHA19868d6cc8332229c610002cd554d6cf13324b2de
SHA256981dafd14ebbd0e40789a623c7f74770131706fbac0881f52339b752ed45eebb
SHA51270d7a2e579ace5f00dbe51c409c138506215997f12dfb73c26ee51ab2267e84ccaeace74d76f7378a1519f3d8cb4d8dc082fe481379ecdbee17c6e9a6dbdfe58
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5a9a7f35c006bbf5da72f9cb250ffbddb
SHA1458a8cedc38dac109631d9fccb3bf6d2c5c0e89e
SHA256a1db56d56e35a6c95f98204e40f69f70422969681d408e5edc4afbf732eef86b
SHA512d341773d30e09214567c65f24cd1854f1e438b8528aa30d35b6baac16e671dde1245edda654f19343b7c160da45985ab53f08453e7f6286e272d544f8741c131
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD589b9b22e2cb6f0b903e7f8755f49d7be
SHA1e13b62b19dccdbacb5fec9227e34f21e34fe5cad
SHA25617b31393e036af7d83e6ea288a0bbad0278c404f5e0698b3a28f2fa1faa99537
SHA512f4817348aa7f297c7c81db010bc0ce09c9193c32f0f7c2b0592df0c7731921830b5a3868486f986edfd863d7d82815e67598392b94782b9d317b7066b9fb7064
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD589b9b22e2cb6f0b903e7f8755f49d7be
SHA1e13b62b19dccdbacb5fec9227e34f21e34fe5cad
SHA25617b31393e036af7d83e6ea288a0bbad0278c404f5e0698b3a28f2fa1faa99537
SHA512f4817348aa7f297c7c81db010bc0ce09c9193c32f0f7c2b0592df0c7731921830b5a3868486f986edfd863d7d82815e67598392b94782b9d317b7066b9fb7064
-
C:\Users\Admin\AppData\Local\Temp\GoogleChromeUpdate\GoogleChromeUpdate.exeFilesize
1.3MB
MD5bced1e7139210b3cdd27938afeb88d8f
SHA106954c644d000863658b68dce36b6972f38da7d1
SHA256d74aba28905fc35c7163604b9a807f289e00b0b28b4c88d06e308b4c977c1ea7
SHA512310af594a2a744cb2e87aca3daeb2251d2219644bfc4f83fbcbce30119045fcbf68bd5a6ab318caa8090fd6598cc0de475c4687ae109458d71e11bf946df4b94
-
C:\Users\Admin\AppData\Local\Temp\GoogleChromeUpdate\GoogleChromeUpdate.exeFilesize
1.3MB
MD5bced1e7139210b3cdd27938afeb88d8f
SHA106954c644d000863658b68dce36b6972f38da7d1
SHA256d74aba28905fc35c7163604b9a807f289e00b0b28b4c88d06e308b4c977c1ea7
SHA512310af594a2a744cb2e87aca3daeb2251d2219644bfc4f83fbcbce30119045fcbf68bd5a6ab318caa8090fd6598cc0de475c4687ae109458d71e11bf946df4b94
-
C:\Users\Admin\AppData\Local\Temp\GoogleChromeUpdate\GoogleChromeUpdate.exeFilesize
1.3MB
MD5bced1e7139210b3cdd27938afeb88d8f
SHA106954c644d000863658b68dce36b6972f38da7d1
SHA256d74aba28905fc35c7163604b9a807f289e00b0b28b4c88d06e308b4c977c1ea7
SHA512310af594a2a744cb2e87aca3daeb2251d2219644bfc4f83fbcbce30119045fcbf68bd5a6ab318caa8090fd6598cc0de475c4687ae109458d71e11bf946df4b94
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_uhmvywjj.rxw.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Local\Temp\mSSrp8dhrf.batFilesize
203B
MD5c3284131e2e889437d1bf30d3bfa5d7d
SHA15e6eefa44a41153e47566fe729ac949e9c22cc8b
SHA2565dc2a001f86a74eb15006cbc04c3aa63d106e3967406382f9c3c08c4a150a57d
SHA512ad0ec62f1702d70633c23d99f2d257c29f69d76bdf69329dce5326cb591ef0f45af67d5afcc02ef1590a2bf7aeb8718e5c65444a9562aa6db947edfa428793b9
-
C:\Users\Admin\AppData\Local\Temp\ybAbNnqa15.batFilesize
181B
MD5077bd061997e6d295c90d917570b1be2
SHA1b4adf48246d2803bac0c47515a6f487ea1181183
SHA256fef594639ed5ee1c0a96073e56251d11ef0748c72dcc347610111512501ee27b
SHA512ef3c76162d420ef43a758bdf4eab85944c8db716c6a86d7875c743afba2ab3ae87963dae1f7fe6c5e82929472676eeb19b977b0bdc2b5f1c64ca4934e5bdf1cb
-
C:\odt\lsass.exeFilesize
983KB
MD55defd0000aa1bf0805c8d2e2fc3ed20d
SHA1e7a366a7a834e2ab3cabc3dd412f065c636b4efb
SHA256fc11e2bbd6d3e8dce36393b3b00504ce8ed994e0498fffee0ce42d838ae51888
SHA512e387cb219aec67da2eab62d7f091b8cad5b87cd971477f50c80ba263d009bc862ff272611a572de5cf51a27119e5ad0fae33cb9a4953b91768ed9252ebe84a7d
-
C:\odt\lsass.exeFilesize
983KB
MD55defd0000aa1bf0805c8d2e2fc3ed20d
SHA1e7a366a7a834e2ab3cabc3dd412f065c636b4efb
SHA256fc11e2bbd6d3e8dce36393b3b00504ce8ed994e0498fffee0ce42d838ae51888
SHA512e387cb219aec67da2eab62d7f091b8cad5b87cd971477f50c80ba263d009bc862ff272611a572de5cf51a27119e5ad0fae33cb9a4953b91768ed9252ebe84a7d
-
memory/1172-471-0x0000024DA7700000-0x0000024DA7710000-memory.dmpFilesize
64KB
-
memory/1384-241-0x00000174AEAB0000-0x00000174AEAC0000-memory.dmpFilesize
64KB
-
memory/1384-306-0x00000174AEAB0000-0x00000174AEAC0000-memory.dmpFilesize
64KB
-
memory/1384-501-0x00000174AEAB0000-0x00000174AEAC0000-memory.dmpFilesize
64KB
-
memory/1636-277-0x000002AE31090000-0x000002AE310A0000-memory.dmpFilesize
64KB
-
memory/1740-476-0x0000020054800000-0x0000020054810000-memory.dmpFilesize
64KB
-
memory/1740-477-0x0000020054800000-0x0000020054810000-memory.dmpFilesize
64KB
-
memory/1780-432-0x000001C0607D0000-0x000001C0607E0000-memory.dmpFilesize
64KB
-
memory/1780-473-0x000001C0607D0000-0x000001C0607E0000-memory.dmpFilesize
64KB
-
memory/1936-479-0x000001D8485C0000-0x000001D8485D0000-memory.dmpFilesize
64KB
-
memory/2228-447-0x000001E077C90000-0x000001E077CA0000-memory.dmpFilesize
64KB
-
memory/2348-472-0x000001E546C70000-0x000001E546C80000-memory.dmpFilesize
64KB
-
memory/2940-461-0x00000138DBB30000-0x00000138DBB40000-memory.dmpFilesize
64KB
-
memory/2968-322-0x0000013FD38B0000-0x0000013FD38C0000-memory.dmpFilesize
64KB
-
memory/3040-321-0x000001E476930000-0x000001E476940000-memory.dmpFilesize
64KB
-
memory/3040-298-0x000001E476930000-0x000001E476940000-memory.dmpFilesize
64KB
-
memory/3040-299-0x000001E476930000-0x000001E476940000-memory.dmpFilesize
64KB
-
memory/3064-478-0x0000021978690000-0x00000219786A0000-memory.dmpFilesize
64KB
-
memory/3124-185-0x00000184CD610000-0x00000184CD632000-memory.dmpFilesize
136KB
-
memory/3124-314-0x00000184CD6A0000-0x00000184CD6B0000-memory.dmpFilesize
64KB
-
memory/3124-251-0x00000184CD6A0000-0x00000184CD6B0000-memory.dmpFilesize
64KB
-
memory/3124-261-0x00000184CD6A0000-0x00000184CD6B0000-memory.dmpFilesize
64KB
-
memory/3124-502-0x00000184CD6A0000-0x00000184CD6B0000-memory.dmpFilesize
64KB
-
memory/3156-158-0x0000000000D30000-0x0000000000E2E000-memory.dmpFilesize
1016KB
-
memory/3156-159-0x000000001BB20000-0x000000001BB30000-memory.dmpFilesize
64KB
-
memory/3388-293-0x000001EB71E70000-0x000001EB71E80000-memory.dmpFilesize
64KB
-
memory/3388-294-0x000001EB71E70000-0x000001EB71E80000-memory.dmpFilesize
64KB
-
memory/3548-271-0x0000022E40B90000-0x0000022E40BA0000-memory.dmpFilesize
64KB
-
memory/3548-331-0x0000022E40B90000-0x0000022E40BA0000-memory.dmpFilesize
64KB
-
memory/3576-474-0x000001E074530000-0x000001E074540000-memory.dmpFilesize
64KB
-
memory/3576-475-0x000001E074530000-0x000001E074540000-memory.dmpFilesize
64KB
-
memory/3848-295-0x0000021A8A4C0000-0x0000021A8A4D0000-memory.dmpFilesize
64KB
-
memory/4132-344-0x0000000000F90000-0x0000000000FA0000-memory.dmpFilesize
64KB
-
memory/4192-309-0x0000023CC83F0000-0x0000023CC8400000-memory.dmpFilesize
64KB
-
memory/4192-296-0x0000023CC83F0000-0x0000023CC8400000-memory.dmpFilesize
64KB
-
memory/4192-297-0x0000023CC83F0000-0x0000023CC8400000-memory.dmpFilesize
64KB
-
memory/4520-320-0x00000241683D0000-0x00000241683E0000-memory.dmpFilesize
64KB
-
memory/4520-328-0x00000241683D0000-0x00000241683E0000-memory.dmpFilesize
64KB
-
memory/4688-480-0x000001D2D87D0000-0x000001D2D87E0000-memory.dmpFilesize
64KB
-
memory/5092-327-0x000001204F960000-0x000001204F970000-memory.dmpFilesize
64KB
-
memory/5092-315-0x000001204F960000-0x000001204F970000-memory.dmpFilesize
64KB
-
memory/5092-503-0x000001204F960000-0x000001204F970000-memory.dmpFilesize
64KB
-
memory/5092-282-0x000001204F960000-0x000001204F970000-memory.dmpFilesize
64KB
-
memory/5092-288-0x000001204F960000-0x000001204F970000-memory.dmpFilesize
64KB