Analysis

  • max time kernel
    149s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-09-2024 07:41

General

  • Target

    АОАОАОАОА БЕСПЛАТНЫЕ РОБУКСЫ.exe

  • Size

    745KB

  • MD5

    5e82f4a00b31da2ecd210a7c7575e29d

  • SHA1

    518e5f78b256ee794ebbc8f96275993a9252be23

  • SHA256

    80446e16d616fee4a8ffeef94f2dc1f5737435d07a111de9622f13a98a5f196e

  • SHA512

    5f794743493acff89407966cdc2b3df386389d90f2468ec5a32c4df2a2ba6dfddea60886ab14a6e9a1b4ddc173989278e2c7397d430aea8c01297b40d782a900

  • SSDEEP

    12288:sBpoIY///1UFxJF80IsoBVnsNxd2LFErkUzw2jtQsnmeTRf7qrc5PPjr21tM/7nf:ZIY/4FcHG/MnUzVhmMRfG4lLr2M/T

Malware Config

Extracted

Family

njrat

Version

Njrat 0.7 Golden By Hassan Amiri

Botnet

HacKed

C2

thomas-drops.gl.at.ply.gg:45773

Mutex

Windows Update

Attributes
  • reg_key

    Windows Update

  • splitter

    |Hassan|

Signatures

  • DcRat 63 IoCs

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Process spawned unexpected child process 64 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 9 IoCs
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • DCRat payload 3 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Checks computer location settings 2 TTPs 6 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 5 IoCs
  • Checks whether UAC is enabled 1 TTPs 6 IoCs
  • Drops file in Program Files directory 20 IoCs
  • Drops file in Windows directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 60 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 35 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 38 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs
  • System policy modification 1 TTPs 9 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\АОАОАОАОА БЕСПЛАТНЫЕ РОБУКСЫ.exe
    "C:\Users\Admin\AppData\Local\Temp\АОАОАОАОА БЕСПЛАТНЫЕ РОБУКСЫ.exe"
    1⤵
    • DcRat
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4560
    • C:\Users\Admin\AppData\Local\Temp\gggg.exe
      "C:\Users\Admin\AppData\Local\Temp\gggg.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:576
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\ChainComponentBrowserwin\zJJP8u9NRTk6u.vbe"
        3⤵
        • Checks computer location settings
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1400
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\ChainComponentBrowserwin\ZckenFSJPCIUJWjfI5CZYMEmaPZVg.bat" "
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1540
          • C:\ChainComponentBrowserwin\reviewdriver.exe
            "C:\ChainComponentBrowserwin\reviewdriver.exe"
            5⤵
            • DcRat
            • UAC bypass
            • Checks computer location settings
            • Executes dropped EXE
            • Checks whether UAC is enabled
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            • System policy modification
            PID:3260
            • C:\ChainComponentBrowserwin\reviewdriver.exe
              "C:\ChainComponentBrowserwin\reviewdriver.exe"
              6⤵
              • UAC bypass
              • Checks computer location settings
              • Executes dropped EXE
              • Checks whether UAC is enabled
              • Drops file in Program Files directory
              • Drops file in Windows directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              • System policy modification
              PID:1648
              • C:\ChainComponentBrowserwin\fontdrvhost.exe
                "C:\ChainComponentBrowserwin\fontdrvhost.exe"
                7⤵
                • Modifies WinLogon for persistence
                • UAC bypass
                • Checks computer location settings
                • Executes dropped EXE
                • Checks whether UAC is enabled
                • Modifies registry class
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                • System policy modification
                PID:4736
                • C:\Windows\System32\WScript.exe
                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\8925faa3-330b-41ca-9cb3-2848d9d060df.vbs"
                  8⤵
                    PID:2032
                  • C:\Windows\System32\WScript.exe
                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\1cbbb595-d5ac-4765-b353-13f5a3e03b02.vbs"
                    8⤵
                      PID:1408
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\d5cQTyHbvx.bat" "
                      8⤵
                      • Suspicious use of WriteProcessMemory
                      PID:3588
                      • C:\Windows\system32\w32tm.exe
                        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                        9⤵
                          PID:3656
          • C:\Users\Admin\AppData\Local\Temp\Server.exe
            "C:\Users\Admin\AppData\Local\Temp\Server.exe"
            2⤵
            • Drops startup file
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of AdjustPrivilegeToken
            PID:1836
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Microsoft.NET\csrss.exe'" /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:4020
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft.NET\csrss.exe'" /rl HIGHEST /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:4420
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Microsoft.NET\csrss.exe'" /rl HIGHEST /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1432
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "WaaSMedicAgentW" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\WaaSMedicAgent.exe'" /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:4736
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "WaaSMedicAgent" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Multimedia Platform\WaaSMedicAgent.exe'" /rl HIGHEST /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:4428
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "WaaSMedicAgentW" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\WaaSMedicAgent.exe'" /rl HIGHEST /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2352
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Microsoft.NET\spoolsv.exe'" /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1640
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft.NET\spoolsv.exe'" /rl HIGHEST /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:3320
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Microsoft.NET\spoolsv.exe'" /rl HIGHEST /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1296
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Microsoft\wininit.exe'" /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2184
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft\wininit.exe'" /rl HIGHEST /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:4908
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Microsoft\wininit.exe'" /rl HIGHEST /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2736
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 6 /tr "'C:\ChainComponentBrowserwin\unsecapp.exe'" /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2604
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\ChainComponentBrowserwin\unsecapp.exe'" /rl HIGHEST /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:3108
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 8 /tr "'C:\ChainComponentBrowserwin\unsecapp.exe'" /rl HIGHEST /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1696
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 7 /tr "'C:\Windows\LiveKernelReports\lsass.exe'" /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2696
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Windows\LiveKernelReports\lsass.exe'" /rl HIGHEST /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:3588
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 13 /tr "'C:\Windows\LiveKernelReports\lsass.exe'" /rl HIGHEST /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2756
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "ServerS" /sc MINUTE /mo 8 /tr "'C:\Users\Admin\Local Settings\Server.exe'" /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2624
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "Server" /sc ONLOGON /tr "'C:\Users\Admin\Local Settings\Server.exe'" /rl HIGHEST /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:4308
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "ServerS" /sc MINUTE /mo 7 /tr "'C:\Users\Admin\Local Settings\Server.exe'" /rl HIGHEST /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:4488
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 7 /tr "'C:\Windows\Temp\MsEdgeCrashpad\reports\RuntimeBroker.exe'" /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:4512
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\Temp\MsEdgeCrashpad\reports\RuntimeBroker.exe'" /rl HIGHEST /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:4344
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 9 /tr "'C:\Windows\Temp\MsEdgeCrashpad\reports\RuntimeBroker.exe'" /rl HIGHEST /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:3264
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 6 /tr "'C:\Program Files\Common Files\Services\Idle.exe'" /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:4988
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files\Common Files\Services\Idle.exe'" /rl HIGHEST /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:5024
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 10 /tr "'C:\Program Files\Common Files\Services\Idle.exe'" /rl HIGHEST /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:4680
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 5 /tr "'C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\en\SearchApp.exe'" /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:348
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\en\SearchApp.exe'" /rl HIGHEST /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:4948
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 9 /tr "'C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\en\SearchApp.exe'" /rl HIGHEST /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2812
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "ServerS" /sc MINUTE /mo 8 /tr "'C:\Windows\de-DE\Server.exe'" /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:968
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "Server" /sc ONLOGON /tr "'C:\Windows\de-DE\Server.exe'" /rl HIGHEST /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:4580
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "ServerS" /sc MINUTE /mo 14 /tr "'C:\Windows\de-DE\Server.exe'" /rl HIGHEST /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:444
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 7 /tr "'C:\Users\All Users\Templates\RuntimeBroker.exe'" /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:4972
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Users\All Users\Templates\RuntimeBroker.exe'" /rl HIGHEST /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:3732
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 12 /tr "'C:\Users\All Users\Templates\RuntimeBroker.exe'" /rl HIGHEST /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2172
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Security\csrss.exe'" /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:716
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\Windows Security\csrss.exe'" /rl HIGHEST /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:3920
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\Program Files\Windows Security\csrss.exe'" /rl HIGHEST /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1932
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "servicess" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\services.exe'" /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:4888
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\services.exe'" /rl HIGHEST /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:4828
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "servicess" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\services.exe'" /rl HIGHEST /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:4560
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 5 /tr "'C:\ChainComponentBrowserwin\StartMenuExperienceHost.exe'" /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1208
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\ChainComponentBrowserwin\StartMenuExperienceHost.exe'" /rl HIGHEST /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1756
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 10 /tr "'C:\ChainComponentBrowserwin\StartMenuExperienceHost.exe'" /rl HIGHEST /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1564
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "smsss" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Sidebar\Shared Gadgets\smss.exe'" /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2712
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files\Windows Sidebar\Shared Gadgets\smss.exe'" /rl HIGHEST /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:5072
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "smsss" /sc MINUTE /mo 11 /tr "'C:\Program Files\Windows Sidebar\Shared Gadgets\smss.exe'" /rl HIGHEST /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:576
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 9 /tr "'C:\ChainComponentBrowserwin\fontdrvhost.exe'" /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1232
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\ChainComponentBrowserwin\fontdrvhost.exe'" /rl HIGHEST /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2784
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 6 /tr "'C:\ChainComponentBrowserwin\fontdrvhost.exe'" /rl HIGHEST /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1736
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 9 /tr "'C:\ChainComponentBrowserwin\conhost.exe'" /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:388
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\ChainComponentBrowserwin\conhost.exe'" /rl HIGHEST /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1448
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 5 /tr "'C:\ChainComponentBrowserwin\conhost.exe'" /rl HIGHEST /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:3392
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows Mail\RuntimeBroker.exe'" /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1020
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Mail\RuntimeBroker.exe'" /rl HIGHEST /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:4040
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows Mail\RuntimeBroker.exe'" /rl HIGHEST /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2120
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\Windows\L2Schemas\csrss.exe'" /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1908
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\L2Schemas\csrss.exe'" /rl HIGHEST /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:5100
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\Windows\L2Schemas\csrss.exe'" /rl HIGHEST /f
          1⤵
          • DcRat
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:4020
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /delete /tn "reviewdriver" /f
          1⤵
          • Process spawned unexpected child process
          PID:3384
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /delete /tn "reviewdriverr" /f
          1⤵
          • Process spawned unexpected child process
          PID:2036
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /delete /tn "spoolsv" /f
          1⤵
          • Process spawned unexpected child process
          PID:2956
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /delete /tn "spoolsvs" /f
          1⤵
          • Process spawned unexpected child process
          PID:4760
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /delete /tn "wininit" /f
          1⤵
            PID:4828
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /delete /tn "wininitw" /f
            1⤵
              PID:2952
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /delete /tn "unsecapp" /f
              1⤵
                PID:1208
              • C:\Windows\system32\schtasks.exe
                schtasks.exe /delete /tn "unsecappu" /f
                1⤵
                  PID:2292
                • C:\Windows\system32\schtasks.exe
                  schtasks.exe /delete /tn "lsass" /f
                  1⤵
                    PID:5040
                  • C:\Windows\system32\schtasks.exe
                    schtasks.exe /delete /tn "lsassl" /f
                    1⤵
                      PID:832
                    • C:\Windows\system32\schtasks.exe
                      schtasks.exe /delete /tn "Server" /f
                      1⤵
                        PID:2216
                      • C:\Windows\system32\schtasks.exe
                        schtasks.exe /delete /tn "ServerS" /f
                        1⤵
                          PID:3944
                        • C:\Windows\system32\schtasks.exe
                          schtasks.exe /delete /tn "RuntimeBroker" /f
                          1⤵
                            PID:4044
                          • C:\Windows\system32\schtasks.exe
                            schtasks.exe /delete /tn "RuntimeBrokerR" /f
                            1⤵
                              PID:1488
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /delete /tn "Idle" /f
                              1⤵
                                PID:4092
                              • C:\Windows\system32\schtasks.exe
                                schtasks.exe /delete /tn "IdleI" /f
                                1⤵
                                  PID:2008
                                • C:\Windows\system32\schtasks.exe
                                  schtasks.exe /delete /tn "SearchApp" /f
                                  1⤵
                                    PID:3960
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks.exe /delete /tn "SearchAppS" /f
                                    1⤵
                                      PID:1412
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /delete /tn "Server" /f
                                      1⤵
                                        PID:3144
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /delete /tn "ServerS" /f
                                        1⤵
                                          PID:2240
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /delete /tn "RuntimeBroker" /f
                                          1⤵
                                            PID:2256
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /delete /tn "RuntimeBrokerR" /f
                                            1⤵
                                              PID:1700
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /delete /tn "csrss" /f
                                              1⤵
                                                PID:1544
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /delete /tn "csrssc" /f
                                                1⤵
                                                  PID:2600
                                                • C:\Windows\system32\schtasks.exe
                                                  schtasks.exe /delete /tn "services" /f
                                                  1⤵
                                                    PID:1612
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /delete /tn "servicess" /f
                                                    1⤵
                                                      PID:3304
                                                    • C:\Windows\system32\schtasks.exe
                                                      schtasks.exe /delete /tn "StartMenuExperienceHost" /f
                                                      1⤵
                                                        PID:1992
                                                      • C:\Windows\system32\schtasks.exe
                                                        schtasks.exe /delete /tn "StartMenuExperienceHostS" /f
                                                        1⤵
                                                          PID:4420
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /delete /tn "smss" /f
                                                          1⤵
                                                            PID:216
                                                          • C:\Windows\system32\schtasks.exe
                                                            schtasks.exe /delete /tn "smsss" /f
                                                            1⤵
                                                              PID:3836
                                                            • C:\Windows\system32\schtasks.exe
                                                              schtasks.exe /delete /tn "fontdrvhost" /f
                                                              1⤵
                                                                PID:1296
                                                              • C:\Windows\system32\schtasks.exe
                                                                schtasks.exe /delete /tn "fontdrvhostf" /f
                                                                1⤵
                                                                  PID:3596
                                                                • C:\Windows\system32\schtasks.exe
                                                                  schtasks.exe /delete /tn "conhost" /f
                                                                  1⤵
                                                                    PID:4984
                                                                  • C:\Windows\system32\schtasks.exe
                                                                    schtasks.exe /delete /tn "conhostc" /f
                                                                    1⤵
                                                                      PID:4768
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /delete /tn "RuntimeBroker" /f
                                                                      1⤵
                                                                        PID:1204
                                                                      • C:\Windows\system32\schtasks.exe
                                                                        schtasks.exe /delete /tn "RuntimeBrokerR" /f
                                                                        1⤵
                                                                          PID:4324
                                                                        • C:\Windows\system32\schtasks.exe
                                                                          schtasks.exe /delete /tn "csrss" /f
                                                                          1⤵
                                                                            PID:1112
                                                                          • C:\Windows\system32\schtasks.exe
                                                                            schtasks.exe /delete /tn "csrssc" /f
                                                                            1⤵
                                                                              PID:4928
                                                                            • C:\Windows\system32\schtasks.exe
                                                                              schtasks.exe /delete /tn "fontdrvhost" /f
                                                                              1⤵
                                                                                PID:3120
                                                                              • C:\Windows\system32\schtasks.exe
                                                                                schtasks.exe /delete /tn "fontdrvhostf" /f
                                                                                1⤵
                                                                                  PID:3140

                                                                                Network

                                                                                MITRE ATT&CK Enterprise v15

                                                                                Replay Monitor

                                                                                Loading Replay Monitor...

                                                                                Downloads

                                                                                • C:\ChainComponentBrowserwin\088424020bedd6

                                                                                  Filesize

                                                                                  772B

                                                                                  MD5

                                                                                  2496153b0e0b9e4688e48218aa4e2e59

                                                                                  SHA1

                                                                                  cd5980bcfd1d8fba01685302c7ae1a10cc3c91f2

                                                                                  SHA256

                                                                                  95a162e48a5195f90776af01c9e800cf54204f8ff0604aa99730f8db8e0a82ca

                                                                                  SHA512

                                                                                  58eed187b842d546da1ca02799490cca8e860def59763bd63e34a2fcd565990b4096b8bff51f38e6657b32d4b48da221b39a3c03bdfd7ee5fd36ff231f0c5b24

                                                                                • C:\ChainComponentBrowserwin\29c1c3cc0f7685

                                                                                  Filesize

                                                                                  543B

                                                                                  MD5

                                                                                  ad0946f5e36c449efe21e3ebd9e9a7bd

                                                                                  SHA1

                                                                                  d9b95edb5b1ab677381965df88e5e6bc8f04f7dc

                                                                                  SHA256

                                                                                  0dd35ffb9b40167fc6a03e145c7b6e872a58b7538652ebacaa900e4bd1024980

                                                                                  SHA512

                                                                                  0c9dfe5cb7c39af9943c64d9de17d05861e99b1e4afd94ff248204b3ad399ca454989e4f36cb68e93edbddfe624fc21596993e9fe27fb1aea5328607319d27fc

                                                                                • C:\ChainComponentBrowserwin\55b276f4edf653

                                                                                  Filesize

                                                                                  69B

                                                                                  MD5

                                                                                  dad34facc7f20e49f393aefdf20608d9

                                                                                  SHA1

                                                                                  928da3a4d37ef4b952f6edf5a6c7db9fa3a72a18

                                                                                  SHA256

                                                                                  b9805cd9218d84f93a907b73c72119c9e5c2c79230886c8d1660fb1234e05a9c

                                                                                  SHA512

                                                                                  aa3b38025bb93a9354d2d969004d39ef0ca444f48db6eeee6bad386e1e79203bc3b4b9e2affb1e054d20b1c2463ba770e69f172235b1034f00638c8ade7c3f67

                                                                                • C:\ChainComponentBrowserwin\5b884080fd4f94

                                                                                  Filesize

                                                                                  984B

                                                                                  MD5

                                                                                  99f73389fd5f6010519c4b807b232b65

                                                                                  SHA1

                                                                                  6799e7bc813e6c30ac51496a3fe701bc09e1ee35

                                                                                  SHA256

                                                                                  90832768726fc965ed7d62f7dc1098078eb9270c8b5e505d582ce5e61c512541

                                                                                  SHA512

                                                                                  d8ee205232391286ed2e44d95e6411589052221220ab371c2e245617432e82a9f09b12b7b16943e635d8a46b9eb2a0aefaeed891d83511f476494598b1862148

                                                                                • C:\ChainComponentBrowserwin\ZckenFSJPCIUJWjfI5CZYMEmaPZVg.bat

                                                                                  Filesize

                                                                                  46B

                                                                                  MD5

                                                                                  3e83fda43f1932bb71d930d2f89e68b2

                                                                                  SHA1

                                                                                  1fa2f89990c21a7f0eebfbf06f7064c19e46b081

                                                                                  SHA256

                                                                                  ecb36758516d13f656baac1a37f3af9dd3e683e8aab3847d65bb82c9eb05cb51

                                                                                  SHA512

                                                                                  d6efea92b244d10f5a0e2b228782cc7e1b45fcf262dcc7ea709a9ab8fa458b2e8d3e3bfa4cdf4a4852812d01bb9ff1c7bba65abbe62527e5a84e5b3b15f8ea9b

                                                                                • C:\ChainComponentBrowserwin\reviewdriver.exe

                                                                                  Filesize

                                                                                  948KB

                                                                                  MD5

                                                                                  2e2c059f61338c40914c10d40502e57e

                                                                                  SHA1

                                                                                  e6cb5a1ffdf369b3135c72ab12d71cc3d5f2b053

                                                                                  SHA256

                                                                                  8e4df816223a625bf911553d5f80219f81fc44f07ba98c95f379fd12169c2918

                                                                                  SHA512

                                                                                  1b1f2dae55f50874532b37ad4ab74a54452f65d7499004b37b0afc3dc2c1d16d66a0e41c1733ac1f4cff9993325d32ea714b441c06ba4eba350136835c746d3e

                                                                                • C:\ChainComponentBrowserwin\zJJP8u9NRTk6u.vbe

                                                                                  Filesize

                                                                                  230B

                                                                                  MD5

                                                                                  b9b72befe720ec640eb23938f752a453

                                                                                  SHA1

                                                                                  c621298c3cfac9aa9c5cdfebd5efa0a1b01c7b34

                                                                                  SHA256

                                                                                  bddc35ffa29cfc10fc39778a551335781091aec61771943662e66cdf4c4a07ad

                                                                                  SHA512

                                                                                  4d119e2aba40fe14d624690103d08620369eeeb0a922a3091027a7cf90597db7d491653ed356eb85a45104bdcbd3eb5876e5c4c508ed85d0e235d71a65578f26

                                                                                • C:\Program Files (x86)\Microsoft.NET\f3b6ecef712a24

                                                                                  Filesize

                                                                                  330B

                                                                                  MD5

                                                                                  7e59303a70fc7f5e13c41900c8333cbc

                                                                                  SHA1

                                                                                  0c02597bc5b437388abb6539e977f99d9ad6b9ac

                                                                                  SHA256

                                                                                  9987ac26a59104efcee720a8d2f2f97a71eb4d6e11c46216db3578babe2d9115

                                                                                  SHA512

                                                                                  605a304d2d1d88408f78995699d52079c2086cec6b55b173977c47143db7058a5b362a115c37860e7cdc96a1ceb3b432007d4adacd680f32792ff71b3cbbbcae

                                                                                • C:\Program Files (x86)\Microsoft\56085415360792

                                                                                  Filesize

                                                                                  768B

                                                                                  MD5

                                                                                  fcd885a14b96931df06402697e81495d

                                                                                  SHA1

                                                                                  07b43071d2d7b338f8661cb0b7e2a791b8e054b3

                                                                                  SHA256

                                                                                  fd3c251c09fb6321b5258a325a3c5a96b7d5e27d0d6a56ac1c69d66d95d20f96

                                                                                  SHA512

                                                                                  27c5f49f9562cd97fa756ad681943e0caa929038d5dd1c5b2b233ac8c415a29f1386d8fcaf8ae672a5fd797884a59947bc1dfbda5499b909d145061f34a5453f

                                                                                • C:\Program Files (x86)\Windows Mail\9e8d7a4ca61bd9

                                                                                  Filesize

                                                                                  598B

                                                                                  MD5

                                                                                  3e147b00753d3c0baa60e8fe4a78f4ec

                                                                                  SHA1

                                                                                  fca01707532955b1bfb756c4dbd8b0da94fdd181

                                                                                  SHA256

                                                                                  9edd833e50ff6b827f32973930cc52d110e081361acabfa9240894270024ea73

                                                                                  SHA512

                                                                                  cff4eb97408ebbbe29c28738a2117da2d989683be7c9692903f55cf2280e60549f164bd6e1efb6cc14851652cf79082b31392f4007af205fc13bd2691dcf26d5

                                                                                • C:\Program Files\Common Files\Services\6ccacd8608530f

                                                                                  Filesize

                                                                                  699B

                                                                                  MD5

                                                                                  a3b9434254a498535e72a160947574cb

                                                                                  SHA1

                                                                                  a8c477b99f22b0d9e006a230a3af506265867c12

                                                                                  SHA256

                                                                                  62599ccce4f6b14ed01ccbbfeb65cccb50ff18b06280eaf24d021594735d5f03

                                                                                  SHA512

                                                                                  1756567ab8da45b1ffbb81a4270b3e886f923162936e0c5d8ebecf82acef06fb3aa753be115af07a91e72e40c51c570550af2992ae2717117ef3adc33278c7d6

                                                                                • C:\Program Files\Windows Security\886983d96e3d3e

                                                                                  Filesize

                                                                                  591B

                                                                                  MD5

                                                                                  6c4b8489d4e33f0b43943de3a8aecacf

                                                                                  SHA1

                                                                                  1eaa6f4d94a39831fe2136329337e4007616c25a

                                                                                  SHA256

                                                                                  1415fb806afa9466bc75fb0d58ab9bae4693b627694b1617ba1b3bd6e9834e67

                                                                                  SHA512

                                                                                  1792b78ba9f94631f162f07b2e3344fc7387fcdc59abd8488cda5abb78783a85d47bf08d787c4ebd1eecfb087911d5e288cf53aaf1d0112ef4fc3125f4f5c045

                                                                                • C:\Program Files\Windows Sidebar\Shared Gadgets\69ddcba757bf72

                                                                                  Filesize

                                                                                  473B

                                                                                  MD5

                                                                                  1b789fc71c9ae0f256865ae0f3242b70

                                                                                  SHA1

                                                                                  abf2a047fc996096e8d8bc94c2b7f2ec5251c636

                                                                                  SHA256

                                                                                  330a42a688d01ac48cd25804e788a7342e85ccdea9bdc4480409b4ddc552443e

                                                                                  SHA512

                                                                                  14229c11a7d22c7a604f7f9f159b280b0043f9987e32145a140f7f29b9541d9b151aff357e75a11121493ccb2feed5f3709efbcc5404d868abef46d37fe1f94b

                                                                                • C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\en\38384e6a620884

                                                                                  Filesize

                                                                                  495B

                                                                                  MD5

                                                                                  6ae0b0ab23ef25c0cb2b7cda8b0ce3b5

                                                                                  SHA1

                                                                                  dcae0a353da57cd1054ec8b04172613faef8bb39

                                                                                  SHA256

                                                                                  128e9514ec237628c38386e0afe1f26e1f5de084cf317dae3e586db16db60148

                                                                                  SHA512

                                                                                  e0871e970c73d6bcfb3b169c93fcbfa4ca14b0630118f86f21449ffb56b12d849c9fa61f76d553c01ad62f1357e66f1630e3710ad5d5841c6aef7de9277b4a44

                                                                                • C:\Recovery\WindowsRE\c5b4cb5e9653cc

                                                                                  Filesize

                                                                                  601B

                                                                                  MD5

                                                                                  06cf621a8d35f167042776118b556072

                                                                                  SHA1

                                                                                  71985eec66bc311379934696edd269fc0c631e1a

                                                                                  SHA256

                                                                                  b883c83b87c283df5bf695aab33ad3d94aad9ef31b906084fa190627a3380760

                                                                                  SHA512

                                                                                  486b3a27f764ab36508bee1ce986fe10757880ca766acececaa6e069336b42967e053933828ef660bb790e556e82d2a2484b8cb82435dd8f7d8423ac2c7f6270

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\reviewdriver.exe.log

                                                                                  Filesize

                                                                                  1KB

                                                                                  MD5

                                                                                  7f3c0ae41f0d9ae10a8985a2c327b8fb

                                                                                  SHA1

                                                                                  d58622bf6b5071beacf3b35bb505bde2000983e3

                                                                                  SHA256

                                                                                  519fceae4d0dd4d09edd1b81bcdfa8aeab4b59eee77a4cd4b6295ce8e591a900

                                                                                  SHA512

                                                                                  8a8fd17eef071f86e672cba0d8fc2cfed6118aff816100b9d7c06eb96443c04c04bc5692259c8d7ecb1563e877921939c61726605af4f969e3f586f0913ed125

                                                                                • C:\Users\Admin\AppData\Local\Temp\1cbbb595-d5ac-4765-b353-13f5a3e03b02.vbs

                                                                                  Filesize

                                                                                  495B

                                                                                  MD5

                                                                                  ebca8dc0036b589236f206bf41ae32e5

                                                                                  SHA1

                                                                                  66bf651d1a41290d527f5080d79988af2ca9bf44

                                                                                  SHA256

                                                                                  960a52baa36f7435f7b0339c1604e6c378d16c5adda543469c2149b54ef0be71

                                                                                  SHA512

                                                                                  2a943acd9dbe36de873394461ed9c14766a7408df4cf12ec0af6570d5250e66209fab76f91526e0bd548ac6ba445d8c6a3b839d8b592dce02d161b8954a7c6f2

                                                                                • C:\Users\Admin\AppData\Local\Temp\8925faa3-330b-41ca-9cb3-2848d9d060df.vbs

                                                                                  Filesize

                                                                                  719B

                                                                                  MD5

                                                                                  7eab3205b977fbf8db6b37035ff7e975

                                                                                  SHA1

                                                                                  a300f890856d4297f8c8729c33d15079c83b298f

                                                                                  SHA256

                                                                                  8d9fa5230d4016c53a02bc52c0d8cdf931e0fd9a9c292f5b7927e5bbd0347741

                                                                                  SHA512

                                                                                  97855b45c1e4c0f4995d06572788593a184f9d53b97d053d1666004eef3112abe09bdc69a2d351118e9be5eaddc95c806a83e0a4555339304f3a64e656674e41

                                                                                • C:\Users\Admin\AppData\Local\Temp\Server.exe

                                                                                  Filesize

                                                                                  43KB

                                                                                  MD5

                                                                                  eab8788760465b2b46598ff289b4b8c4

                                                                                  SHA1

                                                                                  8c7b27c7ec66ea41f7e20afaf1394fb71b7c4a35

                                                                                  SHA256

                                                                                  7ba3084c6d0fcc0e6e1fedfdd04d24768b819aaf309b933d0f4243c37297821f

                                                                                  SHA512

                                                                                  996471d395c297950a4df7140cf0dda388f87ad8a26fb99feb35fa265873b77a7e100520df69770fbe1554ad4bf7f877f9214a61b44326353935dfe7def12ed0

                                                                                • C:\Users\Admin\AppData\Local\Temp\d5cQTyHbvx.bat

                                                                                  Filesize

                                                                                  271B

                                                                                  MD5

                                                                                  3e37d788d428cc1ee69b8fcc29e226fe

                                                                                  SHA1

                                                                                  faeb6063a01f0950c897b0ce605bab5d8a5495e5

                                                                                  SHA256

                                                                                  a1ea4d55e028371b0dd0de9b0838c7ca21384e4b777f24bd2dcc989a7201e9d2

                                                                                  SHA512

                                                                                  22d272b7d441dcd8e79996e44437c98d8772ce834bd537bb27f56295d979d1611446e26dd3c102e7085d93eedad755beb1fda10883dfba838189bdd0a17168d7

                                                                                • C:\Users\Admin\AppData\Local\Temp\gggg.exe

                                                                                  Filesize

                                                                                  1.2MB

                                                                                  MD5

                                                                                  c5607848210b7d664771584276d7d7ae

                                                                                  SHA1

                                                                                  9a395fbac63306fa240e51646cad80a803064352

                                                                                  SHA256

                                                                                  16de1516d3fc00a0873b270ffa44f20c13524827a88798e2743afe0bb06b9815

                                                                                  SHA512

                                                                                  ef9c622ee75161fc038456a2a7e7b9e881f66852dd06331fa2fecac13ce4d585b332672d51a6c8ab3dfd5a99de22b863dd52b53750669d0175aea45ed08a6e8b

                                                                                • C:\Users\Admin\Local Settings\786bd863e8d80c

                                                                                  Filesize

                                                                                  660B

                                                                                  MD5

                                                                                  3852fd6db5e4571fdb5542d79ec6779d

                                                                                  SHA1

                                                                                  923eca734d853d0fb133b09f7d9c8ae8afcbe244

                                                                                  SHA256

                                                                                  8ab6f6ee164e36734aba0e5bbb6243aa2dd8516e0447846ec17f5365fe8a3227

                                                                                  SHA512

                                                                                  4febb13db7a76cd36c42db1c632d753e7fcbeedad97ea80a574c3259907469e6bb9625b2c36bca0f2ad6214d6d4bfcef7bbfcb555518dc02716e835e84567f56

                                                                                • C:\Users\All Users\Templates\9e8d7a4ca61bd9

                                                                                  Filesize

                                                                                  117B

                                                                                  MD5

                                                                                  e1dee36b395905a9d9bafbfb3cab6886

                                                                                  SHA1

                                                                                  9b07f204948c514a9829e70edecdbccff45cf0a9

                                                                                  SHA256

                                                                                  ce5ea9d9d5600e33e840b0cd092b895fb510324679f73e56ce25aa5cbae09a65

                                                                                  SHA512

                                                                                  43eaaac434b73e5ff0975509bd6eec9b9b3cef886d1e83ee8c2fe4f9f51b05767d749eccad680d181dc081903dca31a7680d324e8a9920e200f456882b01d09c

                                                                                • C:\Windows\L2Schemas\886983d96e3d3e

                                                                                  Filesize

                                                                                  819B

                                                                                  MD5

                                                                                  0138de098009232d7104a26baa012bb0

                                                                                  SHA1

                                                                                  d0ac4d4cf0724b76f73ba5e623f591dc9b2a3da0

                                                                                  SHA256

                                                                                  45c858a0b82c5c38d783ab35506282ce316c9a288b9f1755f06745a242c2ebfd

                                                                                  SHA512

                                                                                  7a2bcaf29a8294c6230a6fc1cd94f358bb656e0bd0e97f0af40f1ab3bbf34f601995026cdbcd4983d9ae8f1ace21a0c1933c25273e734365f080cbd854cf9ea7

                                                                                • C:\Windows\LiveKernelReports\6203df4a6bafc7

                                                                                  Filesize

                                                                                  364B

                                                                                  MD5

                                                                                  46a2e20fe145afca115fe9e9f2e02b49

                                                                                  SHA1

                                                                                  7b6a3582789b28a0c84fb6df17f9e68c338c0606

                                                                                  SHA256

                                                                                  bd6b5a7438bbb037b64751a50d988e7240c9903415e5ecede8d95fca76349811

                                                                                  SHA512

                                                                                  b28ba666e230fd36c5da447ffabe564c222389a870adad663027d3d1b49d1814c2df6ecb308938089aecb372d2f7da03cdcbb9f802de3edac8a254904f9e01b1

                                                                                • C:\Windows\Temp\MsEdgeCrashpad\reports\9e8d7a4ca61bd9

                                                                                  Filesize

                                                                                  766B

                                                                                  MD5

                                                                                  58d1b368d16a8b6b91c52a41849aeb35

                                                                                  SHA1

                                                                                  46266c208a8e388ca559828350ea02b9b48cd5b2

                                                                                  SHA256

                                                                                  e0a41ad511d20e2498c5cae879f2f170a0445ae872a2be0fd955d752aa826195

                                                                                  SHA512

                                                                                  f1a348ad9182407b3e044ff9f3c4caac5e8da9e21074b11d01037eafaf033266ec76d6d4d907669941de7b1086b2ce764504d65f3d21a3b188f8f07ac5f8d25c

                                                                                • C:\Windows\de-DE\786bd863e8d80c

                                                                                  Filesize

                                                                                  460B

                                                                                  MD5

                                                                                  a7c7733f6b0540f16ace193d1ec4f555

                                                                                  SHA1

                                                                                  4d07a0352e6b7ae9dbd70c94cf03dd8edc893881

                                                                                  SHA256

                                                                                  2824c38dd372a71480bf21afd80767037eea03d9d804dd9624f67e870a95b4bf

                                                                                  SHA512

                                                                                  1cbe377ed14fc00f929bcb37d1a2ec6d88ef64e647403453b057d1e80003351eee3779eebf38eb0ba25c132fd9606e15aaca153010ef42ca628b40f9ccdbe4a0

                                                                                • memory/1836-21-0x0000000000390000-0x00000000003A2000-memory.dmp

                                                                                  Filesize

                                                                                  72KB

                                                                                • memory/1836-23-0x0000000004D60000-0x0000000004DFC000-memory.dmp

                                                                                  Filesize

                                                                                  624KB

                                                                                • memory/1836-26-0x00000000051B0000-0x0000000005242000-memory.dmp

                                                                                  Filesize

                                                                                  584KB

                                                                                • memory/1836-20-0x000000007473E000-0x000000007473F000-memory.dmp

                                                                                  Filesize

                                                                                  4KB

                                                                                • memory/1836-25-0x0000000074730000-0x0000000074EE0000-memory.dmp

                                                                                  Filesize

                                                                                  7.7MB

                                                                                • memory/1836-107-0x000000007473E000-0x000000007473F000-memory.dmp

                                                                                  Filesize

                                                                                  4KB

                                                                                • memory/1836-108-0x0000000074730000-0x0000000074EE0000-memory.dmp

                                                                                  Filesize

                                                                                  7.7MB

                                                                                • memory/1836-24-0x00000000056C0000-0x0000000005C64000-memory.dmp

                                                                                  Filesize

                                                                                  5.6MB

                                                                                • memory/1836-77-0x0000000004FE0000-0x0000000004FEA000-memory.dmp

                                                                                  Filesize

                                                                                  40KB

                                                                                • memory/3260-40-0x00000000029A0000-0x00000000029AA000-memory.dmp

                                                                                  Filesize

                                                                                  40KB

                                                                                • memory/3260-39-0x00000000006D0000-0x00000000007C4000-memory.dmp

                                                                                  Filesize

                                                                                  976KB

                                                                                • memory/3260-42-0x000000001B3B0000-0x000000001B3BA000-memory.dmp

                                                                                  Filesize

                                                                                  40KB

                                                                                • memory/3260-41-0x00000000029B0000-0x00000000029BC000-memory.dmp

                                                                                  Filesize

                                                                                  48KB

                                                                                • memory/4560-0-0x00007FFE7A4B3000-0x00007FFE7A4B5000-memory.dmp

                                                                                  Filesize

                                                                                  8KB

                                                                                • memory/4560-19-0x00007FFE7A4B0000-0x00007FFE7AF71000-memory.dmp

                                                                                  Filesize

                                                                                  10.8MB

                                                                                • memory/4560-7-0x00007FFE7A4B0000-0x00007FFE7AF71000-memory.dmp

                                                                                  Filesize

                                                                                  10.8MB

                                                                                • memory/4560-1-0x0000000000590000-0x0000000000650000-memory.dmp

                                                                                  Filesize

                                                                                  768KB