Analysis

  • max time kernel
    16s
  • max time network
    47s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    18-09-2024 04:34

General

  • Target

    Fellos RAT-Pack.exe

  • Size

    6.5MB

  • MD5

    58fe672cdb9c2f380f4ab2157a57cfa9

  • SHA1

    de2869332551a4f97a1ae65000adf1edf91f0121

  • SHA256

    cf7d328ce0b9c53b4613030296421f1cc710aa391bca418b3e3566db1128cbe5

  • SHA512

    60898c5480ff869d6402901a265dd1028c170201b051db7bf485eef6a8eef2683be909ee1092c29056fd6fcac05f02f2fd6997b51a94c876fd332a7ffa8fa7cd

  • SSDEEP

    196608:JXN6Jm1BFYcVWj7gKLWCPP/31b8XN6Jm1I:Nh1cl7gKRP39Yh1

Malware Config

Extracted

Family

cybergate

Version

v1.05.1

Botnet

cyber

C2

sonytester.no-ip.biz:99

Mutex

SA237HSP65QY45

Attributes
  • enable_keylogger

    true

  • enable_message_box

    true

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    Winbooterr

  • install_file

    Svchost.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Wait For Server Comming Up Again.

  • message_box_title

    FAIL 759.

  • password

    123456

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Extracted

Family

njrat

Version

Njrat 0.7 Golden By Hassan Amiri

Botnet

HacKed

C2

thomas-drops.gl.at.ply.gg:45773

Mutex

Windows Update

Attributes
  • reg_key

    Windows Update

  • splitter

    |Hassan|

Signatures

  • CyberGate, Rebhip

    CyberGate is a lightweight remote administration tool with a wide array of functionalities.

  • DcRat 64 IoCs

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Process spawned unexpected child process 64 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • DCRat payload 5 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 9 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file
  • Executes dropped EXE 13 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • AutoIT Executable 4 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 8 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 18 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 64 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3320
      • C:\Users\Admin\AppData\Local\Temp\Fellos RAT-Pack.exe
        "C:\Users\Admin\AppData\Local\Temp\Fellos RAT-Pack.exe"
        2⤵
        • DcRat
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4732
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4504
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGwAeABwACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AeABkACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAagBxACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGYAbgBiACMAPgA="
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1444
        • C:\Windows\1.exe
          "C:\Windows\1.exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:4124
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\bUwNWDK.exe"
            4⤵
            • Command and Scripting Interpreter: PowerShell
            PID:15508
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\bUwNWDK" /XML "C:\Users\Admin\AppData\Local\Temp\tmpBD83.tmp"
            4⤵
              PID:15520
            • C:\Windows\1.exe
              "C:\Windows\1.exe"
              4⤵
                PID:16032
            • C:\Users\Admin\AppData\Local\Temp\2.exe
              "C:\Users\Admin\AppData\Local\Temp\2.exe"
              3⤵
              • Executes dropped EXE
              • Drops file in Program Files directory
              • Drops file in Windows directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2644
              • C:\Users\Admin\AppData\Local\Temp\LNSTJ2GMT6V1URY.exe
                "C:\Users\Admin\AppData\Local\Temp\LNSTJ2GMT6V1URY.exe"
                4⤵
                  PID:12564
                  • C:\Windows\SysWOW64\WScript.exe
                    "C:\Windows\System32\WScript.exe" "C:\PortsurrogateWinhostdhcp\ya0aIw.vbe"
                    5⤵
                      PID:8628
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /c ""C:\PortsurrogateWinhostdhcp\AW1Fe6Q61HGStQsO0.bat" "
                        6⤵
                          PID:8332
                          • C:\PortsurrogateWinhostdhcp\WebReviewWinSvc.exe
                            "C:\PortsurrogateWinhostdhcp/WebReviewWinSvc.exe"
                            7⤵
                              PID:7772
                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Downloaded Program Files\dllhost.exe'
                                8⤵
                                • Command and Scripting Interpreter: PowerShell
                                PID:9560
                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Defender Advanced Threat Protection\en-US\spoolsv.exe'
                                8⤵
                                • Command and Scripting Interpreter: PowerShell
                                PID:9564
                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Public\Libraries\schtasks.exe'
                                8⤵
                                • Command and Scripting Interpreter: PowerShell
                                PID:9508
                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\SchCache\RegAsm.exe'
                                8⤵
                                • Command and Scripting Interpreter: PowerShell
                                PID:9584
                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\All Users\Templates\WerFault.exe'
                                8⤵
                                • Command and Scripting Interpreter: PowerShell
                                PID:9588
                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                "powershell" -Command Add-MpPreference -ExclusionPath 'C:\PortsurrogateWinhostdhcp\WebReviewWinSvc.exe'
                                8⤵
                                • Command and Scripting Interpreter: PowerShell
                                PID:9596
                              • C:\Windows\System32\cmd.exe
                                "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\mvpsNVzKkb.bat"
                                8⤵
                                  PID:7324
                                  • C:\Windows\system32\chcp.com
                                    chcp 65001
                                    9⤵
                                      PID:15356
                                    • C:\Windows\system32\w32tm.exe
                                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                      9⤵
                                        PID:16412
                                      • C:\Users\Public\Libraries\schtasks.exe
                                        "C:\Users\Public\Libraries\schtasks.exe"
                                        9⤵
                                          PID:8072
                              • C:\Windows\debug\wininit.exe
                                "C:\Windows\debug\wininit.exe"
                                4⤵
                                  PID:12912
                              • C:\Users\Admin\AppData\Local\Temp\3.exe
                                "C:\Users\Admin\AppData\Local\Temp\3.exe"
                                3⤵
                                • Executes dropped EXE
                                • Suspicious use of SetThreadContext
                                • System Location Discovery: System Language Discovery
                                PID:1176
                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                  4⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:5064
                              • C:\Users\Admin\AppData\Local\Temp\4.exe
                                "C:\Users\Admin\AppData\Local\Temp\4.exe"
                                3⤵
                                • Adds policy Run key to start application
                                • Boot or Logon Autostart Execution: Active Setup
                                • Executes dropped EXE
                                • Adds Run key to start application
                                • Drops file in System32 directory
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of FindShellTrayWindow
                                • Suspicious use of WriteProcessMemory
                                PID:3548
                                • C:\Windows\SysWOW64\explorer.exe
                                  explorer.exe
                                  4⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:4604
                                • C:\Program Files\Internet Explorer\iexplore.exe
                                  "C:\Program Files\Internet Explorer\iexplore.exe"
                                  4⤵
                                    PID:4436
                                  • C:\Users\Admin\AppData\Local\Temp\4.exe
                                    "C:\Users\Admin\AppData\Local\Temp\4.exe"
                                    4⤵
                                    • Executes dropped EXE
                                    • Drops file in System32 directory
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:3592
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -u -p 3592 -s 1576
                                      5⤵
                                      • Program crash
                                      PID:13076
                                    • C:\Windows\SysWOW64\Winbooterr\Svchost.exe
                                      "C:\Windows\system32\Winbooterr\Svchost.exe"
                                      5⤵
                                        PID:7792
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -u -p 7792 -s 644
                                          6⤵
                                          • Program crash
                                          PID:4956
                                  • C:\Users\Admin\AppData\Local\Temp\5.exe
                                    "C:\Users\Admin\AppData\Local\Temp\5.exe"
                                    3⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious use of FindShellTrayWindow
                                    • Suspicious use of SendNotifyMessage
                                    PID:1080
                                    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                                      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"
                                      4⤵
                                        PID:12624
                                    • C:\Users\Admin\AppData\Local\Temp\6.exe
                                      "C:\Users\Admin\AppData\Local\Temp\6.exe"
                                      3⤵
                                      • Executes dropped EXE
                                      PID:5012
                                      • C:\Users\Admin\AppData\Local\Temp\gggg.exe
                                        "C:\Users\Admin\AppData\Local\Temp\gggg.exe"
                                        4⤵
                                        • Executes dropped EXE
                                        • System Location Discovery: System Language Discovery
                                        PID:2916
                                        • C:\Windows\SysWOW64\WScript.exe
                                          "C:\Windows\System32\WScript.exe" "C:\ChainComponentBrowserwin\zJJP8u9NRTk6u.vbe"
                                          5⤵
                                            PID:4544
                                            • C:\Windows\SysWOW64\cmd.exe
                                              C:\Windows\system32\cmd.exe /c ""C:\ChainComponentBrowserwin\ZckenFSJPCIUJWjfI5CZYMEmaPZVg.bat" "
                                              6⤵
                                                PID:7852
                                                • C:\ChainComponentBrowserwin\reviewdriver.exe
                                                  "C:\ChainComponentBrowserwin\reviewdriver.exe"
                                                  7⤵
                                                    PID:7916
                                                    • C:\Windows\System32\cmd.exe
                                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\kuA3NUDiAU.bat"
                                                      8⤵
                                                        PID:14776
                                                        • C:\Windows\system32\w32tm.exe
                                                          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                          9⤵
                                                            PID:13508
                                                          • C:\ChainComponentBrowserwin\reviewdriver.exe
                                                            "C:\ChainComponentBrowserwin\reviewdriver.exe"
                                                            9⤵
                                                              PID:17352
                                                              • C:\PortsurrogateWinhostdhcp\iexplore.exe
                                                                "C:\PortsurrogateWinhostdhcp\iexplore.exe"
                                                                10⤵
                                                                  PID:13408
                                                                  • C:\Windows\System32\WScript.exe
                                                                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\20296d9b-b3bd-4860-860c-6039129e87a7.vbs"
                                                                    11⤵
                                                                      PID:8092
                                                                    • C:\Windows\System32\WScript.exe
                                                                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\e5c827bb-b9d1-4766-8513-341416ff007d.vbs"
                                                                      11⤵
                                                                        PID:7968
                                                        • C:\Users\Admin\AppData\Local\Temp\Server.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\Server.exe"
                                                          4⤵
                                                          • Executes dropped EXE
                                                          • System Location Discovery: System Language Discovery
                                                          PID:4800
                                                      • C:\Users\Admin\AppData\Local\Temp\7.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\7.exe"
                                                        3⤵
                                                        • Executes dropped EXE
                                                        • Drops file in Program Files directory
                                                        • Drops file in Windows directory
                                                        • System Location Discovery: System Language Discovery
                                                        PID:440
                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                          "powershell.exe" -windowstyle hidden "$Sustainment163=Get-Content 'C:\Users\Admin\AppData\Local\pyromanis\Fahrenheittermometret\Harquebusade\Vehefterne\Ewery.Cal';$Underretningernes=$Sustainment163.SubString(702,3);.$Underretningernes($Sustainment163)
                                                          4⤵
                                                          • Command and Scripting Interpreter: PowerShell
                                                          • System Location Discovery: System Language Discovery
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:4072
                                                      • C:\Users\Admin\AppData\Local\Temp\8.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\8.exe"
                                                        3⤵
                                                        • Executes dropped EXE
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:3968
                                                      • C:\Users\Admin\AppData\Local\Temp\9.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\9.exe"
                                                        3⤵
                                                        • Executes dropped EXE
                                                        • System Location Discovery: System Language Discovery
                                                        PID:5000
                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\bUwNWDK.exe"
                                                          4⤵
                                                          • Command and Scripting Interpreter: PowerShell
                                                          PID:15756
                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                          "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\bUwNWDK" /XML "C:\Users\Admin\AppData\Local\Temp\tmpBF87.tmp"
                                                          4⤵
                                                          • DcRat
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:15824
                                                        • C:\Users\Admin\AppData\Local\Temp\9.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\9.exe"
                                                          4⤵
                                                            PID:16720
                                                          • C:\Users\Admin\AppData\Local\Temp\9.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\9.exe"
                                                            4⤵
                                                              PID:16736
                                                          • C:\Users\Admin\AppData\Local\Temp\10.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\10.exe"
                                                            3⤵
                                                            • Executes dropped EXE
                                                            • Suspicious use of SetThreadContext
                                                            • System Location Discovery: System Language Discovery
                                                            PID:1336
                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                              4⤵
                                                                PID:1780
                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                                4⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:2700
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\Program Files\MSBuild\Microsoft\csrss.exe'" /f
                                                          1⤵
                                                          • DcRat
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:3644
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\MSBuild\Microsoft\csrss.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:4656
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\Program Files\MSBuild\Microsoft\csrss.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:4436
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "SearchUIS" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\SearchUI.exe'" /f
                                                          1⤵
                                                          • DcRat
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:2940
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "SearchUI" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\SearchUI.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • DcRat
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:2132
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "SearchUIS" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\SearchUI.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • DcRat
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:3308
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows Media Player\Media Renderer\lsass.exe'" /f
                                                          1⤵
                                                          • DcRat
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:2296
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Media Player\Media Renderer\lsass.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:1768
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows Media Player\Media Renderer\lsass.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:3904
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 7 /tr "'C:\Windows\debug\wininit.exe'" /f
                                                          1⤵
                                                          • DcRat
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:4992
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Windows\debug\wininit.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • DcRat
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:848
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 8 /tr "'C:\Windows\debug\wininit.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • DcRat
                                                          • Process spawned unexpected child process
                                                          PID:1940
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\ChainComponentBrowserwin\csrss.exe'" /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:4672
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\ChainComponentBrowserwin\csrss.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • DcRat
                                                          • Process spawned unexpected child process
                                                          PID:1056
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\ChainComponentBrowserwin\csrss.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • DcRat
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:4508
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "99" /sc MINUTE /mo 12 /tr "'C:\Windows\HoloShell\pris\9.exe'" /f
                                                          1⤵
                                                          • DcRat
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:4964
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "9" /sc ONLOGON /tr "'C:\Windows\HoloShell\pris\9.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • DcRat
                                                          • Process spawned unexpected child process
                                                          PID:3468
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "99" /sc MINUTE /mo 13 /tr "'C:\Windows\HoloShell\pris\9.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • DcRat
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:12308
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 8 /tr "'C:\Users\Public\lsass.exe'" /f
                                                          1⤵
                                                          • DcRat
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:12348
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Users\Public\lsass.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • DcRat
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:12356
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 5 /tr "'C:\Users\Public\lsass.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • DcRat
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:12368
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "55" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows Photo Viewer\fr-FR\5.exe'" /f
                                                          1⤵
                                                          • DcRat
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:12416
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "5" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Photo Viewer\fr-FR\5.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • DcRat
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:12432
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "55" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Windows Photo Viewer\fr-FR\5.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • DcRat
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:12444
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 9 /tr "'C:\ChainComponentBrowserwin\taskhostw.exe'" /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:12476
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\ChainComponentBrowserwin\taskhostw.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • DcRat
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:12492
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 8 /tr "'C:\ChainComponentBrowserwin\taskhostw.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • DcRat
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:12512
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "servicess" /sc MINUTE /mo 8 /tr "'C:\ChainComponentBrowserwin\services.exe'" /f
                                                          1⤵
                                                          • DcRat
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:12540
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\ChainComponentBrowserwin\services.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • DcRat
                                                          • Process spawned unexpected child process
                                                          PID:12576
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "servicess" /sc MINUTE /mo 13 /tr "'C:\ChainComponentBrowserwin\services.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • DcRat
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:12632
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /f
                                                          1⤵
                                                          • DcRat
                                                          • Process spawned unexpected child process
                                                          PID:12668
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • DcRat
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:12684
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • DcRat
                                                          • Process spawned unexpected child process
                                                          PID:12708
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "sihosts" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\sihost.exe'" /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:12736
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\sihost.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • DcRat
                                                          • Process spawned unexpected child process
                                                          PID:12760
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "sihosts" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\sihost.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:12784
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "101" /sc MINUTE /mo 13 /tr "'C:\Program Files\Common Files\System\ja-JP\10.exe'" /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:12824
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "10" /sc ONLOGON /tr "'C:\Program Files\Common Files\System\ja-JP\10.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • DcRat
                                                          • Process spawned unexpected child process
                                                          PID:12836
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "101" /sc MINUTE /mo 11 /tr "'C:\Program Files\Common Files\System\ja-JP\10.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • DcRat
                                                          • Process spawned unexpected child process
                                                          PID:12852
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "ApplicationFrameHostA" /sc MINUTE /mo 5 /tr "'C:\ChainComponentBrowserwin\ApplicationFrameHost.exe'" /f
                                                          1⤵
                                                          • DcRat
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:6280
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "ApplicationFrameHost" /sc ONLOGON /tr "'C:\ChainComponentBrowserwin\ApplicationFrameHost.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • DcRat
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:14444
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "ApplicationFrameHostA" /sc MINUTE /mo 14 /tr "'C:\ChainComponentBrowserwin\ApplicationFrameHost.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:15996
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 8 /tr "'C:\Users\Default User\OfficeClickToRun.exe'" /f
                                                          1⤵
                                                          • DcRat
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:17000
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Users\Default User\OfficeClickToRun.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • DcRat
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:17016
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 14 /tr "'C:\Users\Default User\OfficeClickToRun.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • DcRat
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:18364
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 13 /tr "'C:\Windows\Downloaded Program Files\dllhost.exe'" /f
                                                          1⤵
                                                          • DcRat
                                                          • Process spawned unexpected child process
                                                          PID:14720
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\Downloaded Program Files\dllhost.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:13532
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 7 /tr "'C:\Windows\Downloaded Program Files\dllhost.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • DcRat
                                                          • Process spawned unexpected child process
                                                          PID:13356
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 5 /tr "'C:\Program Files\Windows Defender Advanced Threat Protection\en-US\spoolsv.exe'" /f
                                                          1⤵
                                                          • DcRat
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:8632
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Program Files\Windows Defender Advanced Threat Protection\en-US\spoolsv.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • DcRat
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:8652
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Defender Advanced Threat Protection\en-US\spoolsv.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • DcRat
                                                          • Process spawned unexpected child process
                                                          PID:9140
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "schtaskss" /sc MINUTE /mo 6 /tr "'C:\Users\Public\Libraries\schtasks.exe'" /f
                                                          1⤵
                                                          • DcRat
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:9144
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "schtasks" /sc ONLOGON /tr "'C:\Users\Public\Libraries\schtasks.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:9208
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "schtaskss" /sc MINUTE /mo 5 /tr "'C:\Users\Public\Libraries\schtasks.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • DcRat
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:9236
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "RegAsmR" /sc MINUTE /mo 11 /tr "'C:\Windows\SchCache\RegAsm.exe'" /f
                                                          1⤵
                                                          • DcRat
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:9260
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "RegAsm" /sc ONLOGON /tr "'C:\Windows\SchCache\RegAsm.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • DcRat
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:9296
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "RegAsmR" /sc MINUTE /mo 8 /tr "'C:\Windows\SchCache\RegAsm.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • DcRat
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:9324
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "WerFaultW" /sc MINUTE /mo 14 /tr "'C:\Users\All Users\Templates\WerFault.exe'" /f
                                                          1⤵
                                                          • DcRat
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:2868
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "WerFault" /sc ONLOGON /tr "'C:\Users\All Users\Templates\WerFault.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          PID:9424
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "WerFaultW" /sc MINUTE /mo 5 /tr "'C:\Users\All Users\Templates\WerFault.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • DcRat
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:9428
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "WebReviewWinSvcW" /sc MINUTE /mo 14 /tr "'C:\PortsurrogateWinhostdhcp\WebReviewWinSvc.exe'" /f
                                                          1⤵
                                                          • DcRat
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:9460
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "WebReviewWinSvc" /sc ONLOGON /tr "'C:\PortsurrogateWinhostdhcp\WebReviewWinSvc.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:9504
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "WebReviewWinSvcW" /sc MINUTE /mo 5 /tr "'C:\PortsurrogateWinhostdhcp\WebReviewWinSvc.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • DcRat
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:9488
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\OfficeClickToRun.exe'" /f
                                                          1⤵
                                                          • DcRat
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:18032
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\OfficeClickToRun.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • DcRat
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:18056
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\OfficeClickToRun.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • DcRat
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:14060
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 14 /tr "'C:\Windows\Panther\dllhost.exe'" /f
                                                          1⤵
                                                          • DcRat
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:13764
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\Panther\dllhost.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • DcRat
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:13960
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 7 /tr "'C:\Windows\Panther\dllhost.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • DcRat
                                                          PID:13696
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /f
                                                          1⤵
                                                          • DcRat
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:13656
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • DcRat
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:13632
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • DcRat
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:13620
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 6 /tr "'C:\Program Files\Windows NT\TableTextService\taskhostw.exe'" /f
                                                          1⤵
                                                          • DcRat
                                                          PID:13560
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Program Files\Windows NT\TableTextService\taskhostw.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • DcRat
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:13512
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 6 /tr "'C:\Program Files\Windows NT\TableTextService\taskhostw.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • DcRat
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:13348
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "iexplorei" /sc MINUTE /mo 5 /tr "'C:\PortsurrogateWinhostdhcp\iexplore.exe'" /f
                                                          1⤵
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:6532
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "iexplore" /sc ONLOGON /tr "'C:\PortsurrogateWinhostdhcp\iexplore.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:13484
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "iexplorei" /sc MINUTE /mo 5 /tr "'C:\PortsurrogateWinhostdhcp\iexplore.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • DcRat
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:13456
                                                        • C:\Windows\SysWOW64\werfault.exe
                                                          werfault.exe /h /shared Global\b669326ae9224b04a6e061bf3d4a36ec /t 676 /p 3968
                                                          1⤵
                                                            PID:10372

                                                          Network

                                                          MITRE ATT&CK Enterprise v15

                                                          Replay Monitor

                                                          Loading Replay Monitor...

                                                          Downloads

                                                          • C:\ChainComponentBrowserwin\ZckenFSJPCIUJWjfI5CZYMEmaPZVg.bat

                                                            Filesize

                                                            46B

                                                            MD5

                                                            3e83fda43f1932bb71d930d2f89e68b2

                                                            SHA1

                                                            1fa2f89990c21a7f0eebfbf06f7064c19e46b081

                                                            SHA256

                                                            ecb36758516d13f656baac1a37f3af9dd3e683e8aab3847d65bb82c9eb05cb51

                                                            SHA512

                                                            d6efea92b244d10f5a0e2b228782cc7e1b45fcf262dcc7ea709a9ab8fa458b2e8d3e3bfa4cdf4a4852812d01bb9ff1c7bba65abbe62527e5a84e5b3b15f8ea9b

                                                          • C:\ChainComponentBrowserwin\reviewdriver.exe

                                                            Filesize

                                                            948KB

                                                            MD5

                                                            2e2c059f61338c40914c10d40502e57e

                                                            SHA1

                                                            e6cb5a1ffdf369b3135c72ab12d71cc3d5f2b053

                                                            SHA256

                                                            8e4df816223a625bf911553d5f80219f81fc44f07ba98c95f379fd12169c2918

                                                            SHA512

                                                            1b1f2dae55f50874532b37ad4ab74a54452f65d7499004b37b0afc3dc2c1d16d66a0e41c1733ac1f4cff9993325d32ea714b441c06ba4eba350136835c746d3e

                                                          • C:\ChainComponentBrowserwin\zJJP8u9NRTk6u.vbe

                                                            Filesize

                                                            230B

                                                            MD5

                                                            b9b72befe720ec640eb23938f752a453

                                                            SHA1

                                                            c621298c3cfac9aa9c5cdfebd5efa0a1b01c7b34

                                                            SHA256

                                                            bddc35ffa29cfc10fc39778a551335781091aec61771943662e66cdf4c4a07ad

                                                            SHA512

                                                            4d119e2aba40fe14d624690103d08620369eeeb0a922a3091027a7cf90597db7d491653ed356eb85a45104bdcbd3eb5876e5c4c508ed85d0e235d71a65578f26

                                                          • C:\PortsurrogateWinhostdhcp\AW1Fe6Q61HGStQsO0.bat

                                                            Filesize

                                                            92B

                                                            MD5

                                                            7a0242e21fbe67928f8bb2a34df50776

                                                            SHA1

                                                            79e56085bc21f93a0f6a6f9141e65e56f15250ac

                                                            SHA256

                                                            bf8d81fbca5474b93fdadc88c08d3c97c8458a4985339b575cfea79cd1808beb

                                                            SHA512

                                                            3a14220e9881aff2a2ee1fb8427e9e546ee08cbea80a753217e0424ecd284cc5284323caadd4592d01e493c74609c77f49249c7305185832de993a6ddd384896

                                                          • C:\PortsurrogateWinhostdhcp\WebReviewWinSvc.exe

                                                            Filesize

                                                            1.9MB

                                                            MD5

                                                            b9ae6cecac930e2d1ab60253e735a423

                                                            SHA1

                                                            bb4da2c1ca3802ecb9743871daed567fdfec55ed

                                                            SHA256

                                                            1e1a1ba9b92b5c91284b94606192c66fafe90db8c08c1aa748bf990e488f0a57

                                                            SHA512

                                                            04d621a1dcd636c6fd796862f6c982c5715516837d55ef32ecec441a36d0e6d132777c1bad9bffa1b5e264316e4d7969fa7e9d43eb6b68fb5c49034cf67ba93b

                                                          • C:\PortsurrogateWinhostdhcp\ya0aIw.vbe

                                                            Filesize

                                                            219B

                                                            MD5

                                                            ad58de97ade18e52cfb2e41c4e5e44dd

                                                            SHA1

                                                            fe841efc401030312934c1f99d4d791fc436ee2a

                                                            SHA256

                                                            949429a184c0e107f49eafe6e4997d358d53864911a2f0837f4bf2ef443dac53

                                                            SHA512

                                                            f2bbe1a7018eff02062734f504193f148f7e8382e1dd722d013fd3bc94f6d823bfc3acfc267a92bcf894231717a8f5daa7da4403cc0c8d58bc9c2abc5bee7792

                                                          • C:\Recovery\WindowsRE\5b884080fd4f94

                                                            Filesize

                                                            254B

                                                            MD5

                                                            beeab6e64258896c3acdf94c7376789c

                                                            SHA1

                                                            76c0891150bbe7b12a5af3fe916835480362f1be

                                                            SHA256

                                                            22ef37d4ae618695e1a875baf4a1b6be11d9b263c7920977130c7fb73d1f48eb

                                                            SHA512

                                                            af834e7b6c65658c9039519b158d28db5eac13c27bf1b1c46d7d078b597fa1eb39462eb00575d6e0eb25afe4b1ad04767dc9c58b703086bae4bb9d872e247988

                                                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\reviewdriver.exe.log

                                                            Filesize

                                                            1KB

                                                            MD5

                                                            b4268d8ae66fdd920476b97a1776bf85

                                                            SHA1

                                                            f920de54f7467f0970eccc053d3c6c8dd181d49a

                                                            SHA256

                                                            61d17affcc8d91ecb1858e710c455186f9d0ccfc4d8ae17a1145d87bc7317879

                                                            SHA512

                                                            03b6b90641837f9efb6065698602220d6c5ad263d51d7b7714747c2a3c3c618bd3d94add206b034d6fa2b8e43cbd1ac4a1741cfa1c2b1c1fc8589ae0b0c89516

                                                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                            Filesize

                                                            2KB

                                                            MD5

                                                            32e05f2444df5b7af684f8105b7b87f8

                                                            SHA1

                                                            381941d3d35458b454eaa7fbc7694c827194c5a8

                                                            SHA256

                                                            d41e68a5a3165192ac482de7b0d76e07d77eb04c81243b0b889e6abfb97d187d

                                                            SHA512

                                                            fc0c994c5be244b347b80aef2d54f918159ef85a6b9574408f0237ac26c99e3cb2142627d4386740b92e4eff1693e6d04a9c43d0ba1e11104453b35285d85caf

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                            Filesize

                                                            17KB

                                                            MD5

                                                            241a0a9e01734163ea257f61c032ef92

                                                            SHA1

                                                            f4edac5205a41c4f2ce5352c25996824b4a75587

                                                            SHA256

                                                            066ce88ea2bbca467e729454c3b22c5ac28f80d6e21f160cbdbf2c86e7e981cb

                                                            SHA512

                                                            1e9b068ee46411a436a6410242086742d5295d8f90bfe61552d8d2799c1d20dc61eccadfc66914fd6d600657caa7671c68f4d9b1f41f92f293a0f9d92af6f553

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                            Filesize

                                                            18KB

                                                            MD5

                                                            336b3df0a7bc482263dc1171bce552f2

                                                            SHA1

                                                            77c269135465228b693fe46d839170e3aaec0899

                                                            SHA256

                                                            97d377a8e73bb30bb43d725c374999eb31a003bb9198affc0e502a42fb049fe7

                                                            SHA512

                                                            70ff990090e6658c8f9e3e924844d3a02dafdee30136dc4fbc2b5d7a5af7c0dcb9a72db26e634874dfa20b0760ecd0bb5d88831b929577be6580aa85ec6ae154

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                            Filesize

                                                            18KB

                                                            MD5

                                                            244054a3dce5acce3723a9635d3746ef

                                                            SHA1

                                                            debbb0fef2f2f628a7420ce358cece238fc05cfd

                                                            SHA256

                                                            efefe16eb89d9d083079b1972dfc86e75fda4f00d2ee3f9ac195a29bf964152e

                                                            SHA512

                                                            704098c0eac64a42e8260be3f1f36afa8e7b6260da79ca371cf55655cccfeb3602609306250ff35138454d77fca508ed0e72866a951ff565ac8b7636bf9572d1

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                            Filesize

                                                            1KB

                                                            MD5

                                                            453fbb8c24446e8c2866d75fb15cf79d

                                                            SHA1

                                                            a8ed973fc1ae3ab3dab0d7d8720aa4551d6f94db

                                                            SHA256

                                                            a206b98d3a6497468dcbd2015bee85e502cf1cd00622f58e2c0662bd3eab1c02

                                                            SHA512

                                                            7089483a0a72b5fefb4a428a1abcf236d1af16f78a1ed2763005dd69660298c07d2a6486d3c61d15cdaadb04b67aa0c8fc4fcfe249c4127838cc67299161403e

                                                          • C:\Users\Admin\AppData\Local\Temp\2.exe

                                                            Filesize

                                                            831KB

                                                            MD5

                                                            5135618d33266e9e7adc34e2986a53da

                                                            SHA1

                                                            cf884e57db74aa4c64eae1d07da23ec4efb22fb1

                                                            SHA256

                                                            fb760e57930d4fea345937fa7507c2e515a401d54c31c241e0634a67363d67bc

                                                            SHA512

                                                            e6191d2892be1c9fc05b81d3b069be3498aac351709a13a0d734b6a4951763ea004c7e39b59deb4d01922ed8d619b8f6e1d62262742868478575ceee62e0c1a9

                                                          • C:\Users\Admin\AppData\Local\Temp\20296d9b-b3bd-4860-860c-6039129e87a7.vbs

                                                            Filesize

                                                            717B

                                                            MD5

                                                            c08c5804d7bec34bc2f2da3ef8050b0c

                                                            SHA1

                                                            8455fd52908d0d5153c89c35bd26a8da62839d3e

                                                            SHA256

                                                            ef3b4174a4b92c00a342f4e3635201df3a666c0478a2485206e3cc2663f7358d

                                                            SHA512

                                                            aff03987454f05229f2ddbec0850aa8c6da76cb22a0dd53efdb8a7b115b980b335bfee3c7578faa9c4e3100aee0432324e9672a2d7990ab12ae83e9ca52811f2

                                                          • C:\Users\Admin\AppData\Local\Temp\3.exe

                                                            Filesize

                                                            364KB

                                                            MD5

                                                            a252de615a5852a029b1f95e2c91635c

                                                            SHA1

                                                            5a0f6b27a4df52c16d2f729b57c64759cbb217d5

                                                            SHA256

                                                            bd932fe231cd172e18f84cc47e4a87f881db88371b5693f09ffdf59f0e973a5c

                                                            SHA512

                                                            b7412a2c69a7323d3a6e554b227bf19d4312f3c6e9f533cc0a4d64f540e6f4bbe743c027eba490c1833c0072af9936e1ab776d5ba9353067e00aaf574a799f68

                                                          • C:\Users\Admin\AppData\Local\Temp\4.exe

                                                            Filesize

                                                            276KB

                                                            MD5

                                                            e55d6a80961f66de323394265cfcadb3

                                                            SHA1

                                                            bd2a1cf2b7d12ed6ab355e5cdd984d948b86ad6a

                                                            SHA256

                                                            854a09292d0b6d497b54db9287e05e06a877bd6173c4c0b72316fb254281ba18

                                                            SHA512

                                                            0946bfc6e278fb0795ae376ac51e7aab7f3e5f0f1b0bd8fff314a7d8bf015ec6652ab07435be9a8437b34b98a8d040b2f6fad00b0e3e018ebed6ab01d076c160

                                                          • C:\Users\Admin\AppData\Local\Temp\5.exe

                                                            Filesize

                                                            952KB

                                                            MD5

                                                            071db015daf3af6847cc5ed4a6754700

                                                            SHA1

                                                            c108d0164f901f272e92d3b86a0b572b9028348d

                                                            SHA256

                                                            728740f38287f3b9aa634987bcdd60c62cc743afb119a7f5166d057a9c9277de

                                                            SHA512

                                                            597c828645b07aab730b8bb7790a199579af617173c40300626571300d7de042604cf5eb3e7a14f5ec131c8a1d7a012865e52b6d347061fc5eabca500a9288e8

                                                          • C:\Users\Admin\AppData\Local\Temp\6.exe

                                                            Filesize

                                                            745KB

                                                            MD5

                                                            5e82f4a00b31da2ecd210a7c7575e29d

                                                            SHA1

                                                            518e5f78b256ee794ebbc8f96275993a9252be23

                                                            SHA256

                                                            80446e16d616fee4a8ffeef94f2dc1f5737435d07a111de9622f13a98a5f196e

                                                            SHA512

                                                            5f794743493acff89407966cdc2b3df386389d90f2468ec5a32c4df2a2ba6dfddea60886ab14a6e9a1b4ddc173989278e2c7397d430aea8c01297b40d782a900

                                                          • C:\Users\Admin\AppData\Local\Temp\7.exe

                                                            Filesize

                                                            749KB

                                                            MD5

                                                            cae3afdd724de922b10dd64584e774f1

                                                            SHA1

                                                            d03bc1c01bd39d1aac23a3bfddf36f47c99f0dcd

                                                            SHA256

                                                            92d1e524ad186c9eee020e49e42a4b420b8ddaa5f2174690295786df3d9f7cd9

                                                            SHA512

                                                            8ca15921c8fbd3ecd3cdb05e4587b3836ca71c14032fd80ea50b121e7c7d57e4ba6c58329188649ab52749e631b3fc41fbec56d0ae3160aaee41a0162f2abd8b

                                                          • C:\Users\Admin\AppData\Local\Temp\8.exe

                                                            Filesize

                                                            329KB

                                                            MD5

                                                            0b0d247aa1f24c2f5867b3bf29f69450

                                                            SHA1

                                                            48de9f34226fd7f637e2379365be035af5c0df1a

                                                            SHA256

                                                            a6e7292e734c3a15cfa654bba8dea72a2f55f1c24cf6bbdc2fd7e63887e9315a

                                                            SHA512

                                                            56ee21ee4ab9ece7542c7f3068889b0b98aa7d73274b71682ab39be5cce42efda99830b12910908f06ccb99a83024ac3096108d132fd44cddf4e83191c145706

                                                          • C:\Users\Admin\AppData\Local\Temp\LNSTJ2GMT6V1URY.exe

                                                            Filesize

                                                            2.2MB

                                                            MD5

                                                            51e9fd97423e9b74aea906f0ce0dcd71

                                                            SHA1

                                                            4dcce453a3f6a6624827b2075afff043e3921491

                                                            SHA256

                                                            059b3f10324e5234e9d76365d78dad2e6f9d807c75100f103c5cdc6eefbaf464

                                                            SHA512

                                                            8ff65be5a76f342255e93fc89a304e91f9d6d8af9de679d77977186224313db381f1e778a4c2302978ac51df69f6e9e0d19f135717b55690dd9bb93451af5aab

                                                          • C:\Users\Admin\AppData\Local\Temp\Server.exe

                                                            Filesize

                                                            43KB

                                                            MD5

                                                            eab8788760465b2b46598ff289b4b8c4

                                                            SHA1

                                                            8c7b27c7ec66ea41f7e20afaf1394fb71b7c4a35

                                                            SHA256

                                                            7ba3084c6d0fcc0e6e1fedfdd04d24768b819aaf309b933d0f4243c37297821f

                                                            SHA512

                                                            996471d395c297950a4df7140cf0dda388f87ad8a26fb99feb35fa265873b77a7e100520df69770fbe1554ad4bf7f877f9214a61b44326353935dfe7def12ed0

                                                          • C:\Users\Admin\AppData\Local\Temp\XX--XX--XX.txt

                                                            Filesize

                                                            222KB

                                                            MD5

                                                            1e56a438b536b761f63c23f6a3b09f0d

                                                            SHA1

                                                            cc964106f6d41f89bb1c3f5ee21d4713420eecea

                                                            SHA256

                                                            eafbb8c3bfc6ab627b78e7b81d14946ffd1687028276397aa37df8485b57ce02

                                                            SHA512

                                                            6896d0a228a0d29e93de8ee3a1432953d28fd31996765037baf09c6bd7d3b5731a63f19e0503f05531acfa19b448f06bfefccccfb6d4ccf13ac08fa8d3bdc424

                                                          • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

                                                            Filesize

                                                            8B

                                                            MD5

                                                            16adb78f78d2f161d646a4c6fe62c101

                                                            SHA1

                                                            92d99f3001c7861a8a085e076456db87c8bdb651

                                                            SHA256

                                                            0375133a2772665e63a922ea6b865e0ac1e3d0f3d2bcf728bd3599eedb2f66bb

                                                            SHA512

                                                            3cff35db4ef1c0658b286be594a3495f99155f3eaf95a93e81657b6c60c99680fefdcf11570e7ea1b7154dfbe8aeca7ef19c3e071f701af5b11063963c013f4c

                                                          • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

                                                            Filesize

                                                            8B

                                                            MD5

                                                            cd4df3493b9a8664c9fce440d5f891c4

                                                            SHA1

                                                            b806176edd4306663fcee7aaed4ad46b8f92c8db

                                                            SHA256

                                                            84efbdf1a1ddd32d6b4d40aa33578305056c1dc2bd9ec1952fae8945671d29e0

                                                            SHA512

                                                            1238853c2a07b3bbf5b3fc9c31fcca8fc06b51d52964f4b06a3c7ff6a12b439408e19a4a69b7e18164204ad9bf976a80e1383eef8523eaeb1c9a636d3cadbc44

                                                          • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

                                                            Filesize

                                                            8B

                                                            MD5

                                                            58e3d4bbdeffc72970ff52a649f76da1

                                                            SHA1

                                                            5ed3e38c2826c8f655e09fb0ec9809eab8575aef

                                                            SHA256

                                                            0710c890ad62c592a14ff24c6088ca0dadca2d5d5d01f789ae32c23a8abb22b1

                                                            SHA512

                                                            8d5c8afb1f3d9bcc2a086303d302e1bc4ec64cdd263260d7aeca1312768318377c907a2c8e51a68ecad0d079059df928d575398926b265955f79e7f37cfb7358

                                                          • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

                                                            Filesize

                                                            8B

                                                            MD5

                                                            95b8be2391610767f75802f4dc549354

                                                            SHA1

                                                            04968d80132c6a5a84bc20c6b878fda92fdbf21e

                                                            SHA256

                                                            675bf9d0829f943ae93223639b50b64637e5f8f675d6e885a648dd377c5b8309

                                                            SHA512

                                                            3795e93b2afabec4fdbc2122e0efed48321b1511c3b78bd9a2e390afc03c6bf1aaf2df237325fd51b9708561b54402a69b708f0c16a6aa48f8db3ebd329a84b0

                                                          • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

                                                            Filesize

                                                            8B

                                                            MD5

                                                            1a8f1e0accdeb840585f435ad4129ae7

                                                            SHA1

                                                            27a1ce093d2967147ea50665a5824854b2d04b80

                                                            SHA256

                                                            fea152dfef0b0f200fe03d44c882463fd758e7c78d6b2a39bf5f2527e0ceaab6

                                                            SHA512

                                                            0321f1e6917ec3caf4fcf3dbb21f51358be0ebae142a20d0559b48a1d181c1980931f663ecdae59fa95a592ce6cd54af236b03c51bd0061659cfa47e2b663740

                                                          • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

                                                            Filesize

                                                            8B

                                                            MD5

                                                            89db8dadde68ecb71657387e2979f6aa

                                                            SHA1

                                                            a791db5a25d9b9d9e9390ff0d1119ee85e4fa51b

                                                            SHA256

                                                            c56db97c270bc4f3a047e9404618a33b22835706352625ca7daec5c76a80bfec

                                                            SHA512

                                                            21a102cf8ae733fe0ad6ae37935fe4e0fbe015cd612a39f0f7c734d9df57ad5563489954a75fa0c84e81fd9dceac7a2cf09cf3a5b090ef3296263702f17e640c

                                                          • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

                                                            Filesize

                                                            8B

                                                            MD5

                                                            8675507119ba2e0007dbd2c06c26e13a

                                                            SHA1

                                                            28fadebbaf799a8a0198ad2fa424f6edc831cdad

                                                            SHA256

                                                            99310d165884c8ced0f4fdae093bd3a10b28dc6272dd422f7fa88c7a29901a86

                                                            SHA512

                                                            3a6c571c657107282c4c51c24015c83a724018c2080b9a0b53af04c6bb1235c9ea94518de72c9a0d4aa8e645eafb43dc3280200e314196b8d542f437530afaa6

                                                          • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

                                                            Filesize

                                                            8B

                                                            MD5

                                                            60fc0a5e02bd0b2ad09dd88ff6d340f9

                                                            SHA1

                                                            aecba69b20f5e38818f206279da79c82311d55c6

                                                            SHA256

                                                            abf1f0bfe0893b708a9d99702a8c66c18605ca58d48e3e05fd683eb23d53b286

                                                            SHA512

                                                            17880933fef84220ac464a4a2d556cce452ea8a61a698a776bf13168175cae70545723db00dbaf9eeded5c02469dd64d6be2362e5bebeffa2041b1eed85a53dc

                                                          • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

                                                            Filesize

                                                            8B

                                                            MD5

                                                            61f7210026ba26f910bc876a9cd49550

                                                            SHA1

                                                            4cbb43df4a5cb93db4be13d796ea6b4c15201b61

                                                            SHA256

                                                            a97efe3692a2a036158732d1a2d8934b3723b9b0c9c1a72ea52c6e65fad06abe

                                                            SHA512

                                                            1a4b66b0be9fe8d11a4a96226eda5bf3bf252528cce3cd6790120e3ec0504d70efb05561103b8568795c3b07cac79af0af92cbc58619559abc2b208fcfe5ba7c

                                                          • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

                                                            Filesize

                                                            8B

                                                            MD5

                                                            8d72a1812fd37468a450f19c60df0874

                                                            SHA1

                                                            d52e60a2fb6542819b302399f9db3272e9608180

                                                            SHA256

                                                            002aa187e9d1e58325d963682fc03d0a7f0c8b66ca708b5a0a2e423a108618c2

                                                            SHA512

                                                            24ac2502d23da23edac83be04862fafc1dc3ac8b764106c51299a4a98bf25c5b89f2bec534159050a81aa259a1bd4580e37043ddbd1f2cd6308e22a6ffd457b6

                                                          • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

                                                            Filesize

                                                            8B

                                                            MD5

                                                            fa7f7f590cc36e87eeb116b1ed8ce48d

                                                            SHA1

                                                            b0949bbf2c18b144d600f291b0cee2fa059d3c1b

                                                            SHA256

                                                            548fb44f222bf2e35361a4a086aa84f4deac738b7143cde63cbc3a40c2961fd7

                                                            SHA512

                                                            aa2595f9362a02bee531c824d2e13059ceff83f3b8fc236ecf0f1950dc11e68453f0c5a5f5da083cc9bd0db6a95293d4d73e7fbb49fdffb32b67729c4e52afc2

                                                          • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

                                                            Filesize

                                                            8B

                                                            MD5

                                                            1606f85fe3840a68eba5a0993c5c7c00

                                                            SHA1

                                                            f3cce811e7ddaf7debc2162999754ff6eb0d2607

                                                            SHA256

                                                            3b2820ce48e24fb9cb4378aa99245a962498189144530628ed32e7f31f709717

                                                            SHA512

                                                            7229c84297b49d4a69d5052ff93de52e26b589591723eee0e29d4980c92f6e77b9de0da612cf9ecad200ea1ced8e4321e5ae8a874a46c76a9bdbf0d9acf4fed6

                                                          • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

                                                            Filesize

                                                            8B

                                                            MD5

                                                            b9bc493a00399cb3998b01f98ff853a6

                                                            SHA1

                                                            4bb447078505b37bb325de76175201e50adc24cd

                                                            SHA256

                                                            f35d3cc477d830012db68138191019100f6359ec50927ed82d989a0c54ef621c

                                                            SHA512

                                                            e6a7906be8eadfb7d06692fa2422a0ee94e9216f5e0868f43e1b5ca05cc3c4ea9ea9c243aa493303830f99d37f4204ac8a0cc97d2470b658ccd82e733640f132

                                                          • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

                                                            Filesize

                                                            8B

                                                            MD5

                                                            21dc8f70dde2a1edcb3fb4796cf5ddfe

                                                            SHA1

                                                            1049c0a723f6da9385d5eb14768d20127a1d6d8c

                                                            SHA256

                                                            c948e117d51829bd19e4ac57e6931c87d58d445b9fae537e90db91ca37f1f537

                                                            SHA512

                                                            3eff451b0879b93993abf8d525ef946238db8ad1843c6136daa016195f385a87b9c215209284815cd3321c549ee7d8af26baf1e2079082cd80e5d1e1214e3e7b

                                                          • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

                                                            Filesize

                                                            8B

                                                            MD5

                                                            0397b78dad9f278cb6f099fdfe007945

                                                            SHA1

                                                            20ff300e13cb72c9480a1cc9f6f0bcb96928efdb

                                                            SHA256

                                                            7424c16526495f79f53b109debffa6042c9f4ccf3cb910a2de82dac5db4d16a1

                                                            SHA512

                                                            3172a7f162bc16fc1a193eb835d8b17cf766065846b8278e45ec31767ea34a0941b26281a09d408d90df3ec0a4cdd2013ec9733fc43d0dd76966605c59b89c4d

                                                          • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

                                                            Filesize

                                                            8B

                                                            MD5

                                                            3e03391bce643e5a2b0c4180cffe7944

                                                            SHA1

                                                            15cc328429143377776c6f554d2ce7055b904b4b

                                                            SHA256

                                                            5180a872514d622cf500fe7a04d3536c1c74033277a24dfe5c28925c73ef91a7

                                                            SHA512

                                                            d6286d66e0aa9548942e468a6c9bcd9a6e64060f0e4d3253882597329bceec97091727a395f5b7a715fdb38ca544538d13b294d7cd736d5da56efd99d05336d1

                                                          • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

                                                            Filesize

                                                            8B

                                                            MD5

                                                            72502da8590a021248057a66a67af86c

                                                            SHA1

                                                            65e5f7f7f4fc11357b9692f15bb466fe3f07c2aa

                                                            SHA256

                                                            8c28cc06c73fb69a5b0342857680567bff41b8d4fa30b69b71443bd716aa88c4

                                                            SHA512

                                                            9be04d575ff143eb2c7e84e80f1e7fd56951970e191e3a89bed7273a13323b3c72d8d172d43bee0818e9ac01e5c9470bb5c6eeeb3ca4a58777b09ce43cda60b8

                                                          • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

                                                            Filesize

                                                            8B

                                                            MD5

                                                            03eb038e6b239dbdc04c999aaefe8f31

                                                            SHA1

                                                            0e61518b68262b5471046b1c6bd5625b7788c301

                                                            SHA256

                                                            b5a453f85f04adf3fed3a00492af9921d8bb9a63df4af5a0a9739d287aa83030

                                                            SHA512

                                                            1db1b98e1d5c1b93ffcc9b57958330c2851d6472add6b1ea5acb0379f8f3eaf2b479042ad81bd993e22d8c9a8e26317026d8f9a85d1445bb6d93647920b79b24

                                                          • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

                                                            Filesize

                                                            8B

                                                            MD5

                                                            b23564ef2ef5273ef385df4e6a234d18

                                                            SHA1

                                                            22dcffe9cac864c8b49b2355242208a0b7241049

                                                            SHA256

                                                            7d9f98183057f60f11966097e00e3034a1820b93dcb2fe3efb734684b6739d56

                                                            SHA512

                                                            28bc049857fdc3ea55d103ff1938bcda7e7c7151c1c497cb63422da29eb0103c6e8f84772a30f81af292bb232a9bdfb1fb00593cb8c4d0cd17942f59f609068b

                                                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_luh5faxi.nn3.ps1

                                                            Filesize

                                                            1B

                                                            MD5

                                                            c4ca4238a0b923820dcc509a6f75849b

                                                            SHA1

                                                            356a192b7913b04c54574d18c28d46e6395428ab

                                                            SHA256

                                                            6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

                                                            SHA512

                                                            4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

                                                          • C:\Users\Admin\AppData\Local\Temp\e5c827bb-b9d1-4766-8513-341416ff007d.vbs

                                                            Filesize

                                                            492B

                                                            MD5

                                                            defee4249f5f88f760c0e8a8bd9d614c

                                                            SHA1

                                                            59ae250f5aa3c9638b9c9fc1839fab8caa8f6c63

                                                            SHA256

                                                            b8257d04e25bb0c6a6c649d00831e8d5634c68f9ca7a0632cbf4f3e5465a5ebe

                                                            SHA512

                                                            f2d8ec46a1c21bb378dbde60a4e1210237301034a5ec581fd035437e814984983d03d41481fb867abee8cfe2bd4d25fc02290bfc26371ea5d8f8df2089c130e0

                                                          • C:\Users\Admin\AppData\Local\Temp\gggg.exe

                                                            Filesize

                                                            1.2MB

                                                            MD5

                                                            c5607848210b7d664771584276d7d7ae

                                                            SHA1

                                                            9a395fbac63306fa240e51646cad80a803064352

                                                            SHA256

                                                            16de1516d3fc00a0873b270ffa44f20c13524827a88798e2743afe0bb06b9815

                                                            SHA512

                                                            ef9c622ee75161fc038456a2a7e7b9e881f66852dd06331fa2fecac13ce4d585b332672d51a6c8ab3dfd5a99de22b863dd52b53750669d0175aea45ed08a6e8b

                                                          • C:\Users\Admin\AppData\Local\Temp\kuA3NUDiAU.bat

                                                            Filesize

                                                            209B

                                                            MD5

                                                            ed32b5875a2f31de9d2b7bc6447e030e

                                                            SHA1

                                                            1feab5a23ea7353db83535f679c230c295187dfa

                                                            SHA256

                                                            4f5b35a622d95e969306f01c06c90f5c5ffb828d4f19e51a5dafda8fda9f87ca

                                                            SHA512

                                                            4a8d6979a7a3466bb8bfa25d7e4987e88825b3f13b5751a365889a81a1af8648584250fc8dd290074e6175bcd13530bc9988d75e9255bf6e5f0e31526de4d651

                                                          • C:\Users\Admin\AppData\Local\Temp\mvpsNVzKkb.bat

                                                            Filesize

                                                            214B

                                                            MD5

                                                            e6e5d2db027eeaddbb45a5d160c50c38

                                                            SHA1

                                                            68b7bbca57bc02480f84b6d205b07d32a82b1e2b

                                                            SHA256

                                                            89b2b70ebb237e846c35dd775bb20b82741685ba513b51a50f33cdfb3a19a31a

                                                            SHA512

                                                            2b908d980c9ea81b1f0f4022b3a5d82ced823b10e58f96a965aca17ba43811d678570283a301e6bac0e2fdf3befba31ad9de888896a721ad70336c86ac2ca2ba

                                                          • C:\Users\Admin\AppData\Local\Temp\tmpBD83.tmp

                                                            Filesize

                                                            1KB

                                                            MD5

                                                            529d21cd8ba4ab17241e52ef21e9770a

                                                            SHA1

                                                            0f5021c2275faa9600044cb7c2d0c9b9c1f4c6b3

                                                            SHA256

                                                            ddacdbbb950d5471c0c006ae5fd6adb63887915df31ff9dcade133c964556510

                                                            SHA512

                                                            2fad1fbb3c1b7089f0eb9a2986c2cf4ff0b150660b73c26ec319c3755a87ce70591eba1cf66aaee5078002367c4a457a05052255c1527bd4c1589d3b02ed301c

                                                          • C:\Users\Admin\AppData\Local\pyromanis\Fahrenheittermometret\Harquebusade\Vehefterne\Ewery.Cal

                                                            Filesize

                                                            70KB

                                                            MD5

                                                            c3441391a31d9f2d0e3a28796b372ed7

                                                            SHA1

                                                            17b1fbd3ed6e55a2fa9136d58a4c83dfe5b4d8a1

                                                            SHA256

                                                            c126133825166f5edd56a7bc04f1e62604896b169d2eb23259877e6c3d824da9

                                                            SHA512

                                                            5f8caf6dd323652d820baa7f6d9e58755edd4defaddc0694c1e2d425834fe47a31b4d2e69164ff7a11c7704497d1bf2d27607bd9d18861f96ae2302ca889e31d

                                                          • C:\Users\Admin\AppData\Local\pyromanis\Fahrenheittermometret\Harquebusade\Velgennemproevet.Sub

                                                            Filesize

                                                            352KB

                                                            MD5

                                                            0f9a0ca4a24509bd1d2745a6df9103c4

                                                            SHA1

                                                            d17e12c3cd1c04e315fd978e33530c5e19e5d0d3

                                                            SHA256

                                                            fb5f515aebeaf042d08c97ae56cbf0bee9997f870447916da7a1127760468e3b

                                                            SHA512

                                                            dd1064f628b4443d3c3ccf27374dd587b1daa4a04442e4b61c19f71d6dc43a7faf5a37dcb187caaa5afa083d8c7bd07497bff2c7784b0064ad86dc2e6bf5ce98

                                                          • C:\Users\Admin\AppData\Roaming\cglogs.dat

                                                            Filesize

                                                            15B

                                                            MD5

                                                            bf3dba41023802cf6d3f8c5fd683a0c7

                                                            SHA1

                                                            466530987a347b68ef28faad238d7b50db8656a5

                                                            SHA256

                                                            4a8e75390856bf822f492f7f605ca0c21f1905172f6d3ef610162533c140507d

                                                            SHA512

                                                            fec60f447dcc90753d693014135e24814f6e8294f6c0f436bc59d892b24e91552108dba6cf5a6fa7c0421f6d290d1bafee9f9f2d95ea8c4c05c2ad0f7c1bb314

                                                          • C:\Windows\1.exe

                                                            Filesize

                                                            863KB

                                                            MD5

                                                            17c6fe265edc0770cfdc81cd7b5645bc

                                                            SHA1

                                                            761409d5a10480a4fd897e37aa098ec333e96ab2

                                                            SHA256

                                                            cb2b849e4d24527ba41c0e5ae3982ecde5bd91b94b5ae8bb27dc221b4c775891

                                                            SHA512

                                                            6048186df40e5e653b051c8fa0071411a56ff48722340f95cfc84cfc4affda7ca6a75c65421795439433e5f566ed3469f160f2f2e156953a22b5f23ae13ced60

                                                          • memory/1080-88-0x0000000001310000-0x0000000001403000-memory.dmp

                                                            Filesize

                                                            972KB

                                                          • memory/1080-13967-0x0000000001310000-0x0000000001403000-memory.dmp

                                                            Filesize

                                                            972KB

                                                          • memory/1080-24334-0x0000000001310000-0x0000000001403000-memory.dmp

                                                            Filesize

                                                            972KB

                                                          • memory/1176-110-0x00000000006B0000-0x000000000070E000-memory.dmp

                                                            Filesize

                                                            376KB

                                                          • memory/1444-102-0x0000000007D30000-0x0000000008080000-memory.dmp

                                                            Filesize

                                                            3.3MB

                                                          • memory/1444-198-0x0000000009350000-0x0000000009383000-memory.dmp

                                                            Filesize

                                                            204KB

                                                          • memory/1444-217-0x0000000009870000-0x0000000009904000-memory.dmp

                                                            Filesize

                                                            592KB

                                                          • memory/1444-475-0x00000000097F0000-0x000000000980A000-memory.dmp

                                                            Filesize

                                                            104KB

                                                          • memory/1444-209-0x0000000009490000-0x0000000009535000-memory.dmp

                                                            Filesize

                                                            660KB

                                                          • memory/1444-199-0x000000006C0D0000-0x000000006C11B000-memory.dmp

                                                            Filesize

                                                            300KB

                                                          • memory/1444-200-0x0000000009330000-0x000000000934E000-memory.dmp

                                                            Filesize

                                                            120KB

                                                          • memory/1444-483-0x00000000097E0000-0x00000000097E8000-memory.dmp

                                                            Filesize

                                                            32KB

                                                          • memory/1444-120-0x0000000008160000-0x00000000081AB000-memory.dmp

                                                            Filesize

                                                            300KB

                                                          • memory/2644-72-0x0000000000F50000-0x0000000001028000-memory.dmp

                                                            Filesize

                                                            864KB

                                                          • memory/3548-114-0x0000000010410000-0x0000000010471000-memory.dmp

                                                            Filesize

                                                            388KB

                                                          • memory/3548-187-0x0000000010480000-0x00000000104E1000-memory.dmp

                                                            Filesize

                                                            388KB

                                                          • memory/3548-117-0x0000000010480000-0x00000000104E1000-memory.dmp

                                                            Filesize

                                                            388KB

                                                          • memory/4072-565-0x0000000009400000-0x0000000009422000-memory.dmp

                                                            Filesize

                                                            136KB

                                                          • memory/4124-106-0x0000000006EE0000-0x0000000006EEE000-memory.dmp

                                                            Filesize

                                                            56KB

                                                          • memory/4124-74-0x0000000005810000-0x000000000581A000-memory.dmp

                                                            Filesize

                                                            40KB

                                                          • memory/4124-52-0x0000000000E30000-0x0000000000F0E000-memory.dmp

                                                            Filesize

                                                            888KB

                                                          • memory/4124-105-0x0000000006F70000-0x0000000007042000-memory.dmp

                                                            Filesize

                                                            840KB

                                                          • memory/4124-19694-0x0000000007120000-0x00000000071DE000-memory.dmp

                                                            Filesize

                                                            760KB

                                                          • memory/4504-38-0x0000000009860000-0x00000000098F2000-memory.dmp

                                                            Filesize

                                                            584KB

                                                          • memory/4504-7-0x0000000007DC0000-0x0000000007E26000-memory.dmp

                                                            Filesize

                                                            408KB

                                                          • memory/4504-28-0x00000000095B0000-0x00000000095CA000-memory.dmp

                                                            Filesize

                                                            104KB

                                                          • memory/4504-5-0x0000000007720000-0x0000000007D48000-memory.dmp

                                                            Filesize

                                                            6.2MB

                                                          • memory/4504-37-0x000000000A4A0000-0x000000000A99E000-memory.dmp

                                                            Filesize

                                                            5.0MB

                                                          • memory/4504-6-0x00000000074E0000-0x0000000007502000-memory.dmp

                                                            Filesize

                                                            136KB

                                                          • memory/4504-3-0x0000000004A80000-0x0000000004AB6000-memory.dmp

                                                            Filesize

                                                            216KB

                                                          • memory/4504-42-0x0000000072790000-0x0000000072E7E000-memory.dmp

                                                            Filesize

                                                            6.9MB

                                                          • memory/4504-27-0x0000000009E20000-0x000000000A498000-memory.dmp

                                                            Filesize

                                                            6.5MB

                                                          • memory/4504-4-0x0000000072790000-0x0000000072E7E000-memory.dmp

                                                            Filesize

                                                            6.9MB

                                                          • memory/4504-43-0x0000000072790000-0x0000000072E7E000-memory.dmp

                                                            Filesize

                                                            6.9MB

                                                          • memory/4504-0-0x000000007279E000-0x000000007279F000-memory.dmp

                                                            Filesize

                                                            4KB

                                                          • memory/4504-10-0x0000000007D50000-0x0000000007D6C000-memory.dmp

                                                            Filesize

                                                            112KB

                                                          • memory/4504-12-0x00000000084F0000-0x0000000008566000-memory.dmp

                                                            Filesize

                                                            472KB

                                                          • memory/4504-11-0x0000000008850000-0x000000000889B000-memory.dmp

                                                            Filesize

                                                            300KB

                                                          • memory/4504-8-0x0000000007E30000-0x0000000007E96000-memory.dmp

                                                            Filesize

                                                            408KB

                                                          • memory/4504-9-0x0000000007EA0000-0x00000000081F0000-memory.dmp

                                                            Filesize

                                                            3.3MB

                                                          • memory/4604-119-0x0000000002A60000-0x0000000002A61000-memory.dmp

                                                            Filesize

                                                            4KB

                                                          • memory/4604-118-0x00000000027A0000-0x00000000027A1000-memory.dmp

                                                            Filesize

                                                            4KB

                                                          • memory/4800-302-0x00000000000E0000-0x00000000000F2000-memory.dmp

                                                            Filesize

                                                            72KB

                                                          • memory/4800-303-0x0000000004970000-0x0000000004A0C000-memory.dmp

                                                            Filesize

                                                            624KB

                                                          • memory/5012-94-0x0000000000960000-0x0000000000A20000-memory.dmp

                                                            Filesize

                                                            768KB

                                                          • memory/5064-319-0x0000000000400000-0x000000000045C000-memory.dmp

                                                            Filesize

                                                            368KB

                                                          • memory/5064-322-0x0000000005000000-0x00000000050BA000-memory.dmp

                                                            Filesize

                                                            744KB

                                                          • memory/7772-10071-0x0000000000150000-0x0000000000336000-memory.dmp

                                                            Filesize

                                                            1.9MB

                                                          • memory/7772-10091-0x000000001B320000-0x000000001B370000-memory.dmp

                                                            Filesize

                                                            320KB

                                                          • memory/7772-10083-0x0000000000B50000-0x0000000000B5E000-memory.dmp

                                                            Filesize

                                                            56KB

                                                          • memory/7772-10085-0x000000001AF60000-0x000000001AF7C000-memory.dmp

                                                            Filesize

                                                            112KB

                                                          • memory/7772-10193-0x0000000002560000-0x000000000256C000-memory.dmp

                                                            Filesize

                                                            48KB

                                                          • memory/7772-10180-0x0000000002550000-0x000000000255E000-memory.dmp

                                                            Filesize

                                                            56KB

                                                          • memory/7772-10105-0x000000001AF80000-0x000000001AF98000-memory.dmp

                                                            Filesize

                                                            96KB

                                                          • memory/7916-10081-0x0000000000C70000-0x0000000000D64000-memory.dmp

                                                            Filesize

                                                            976KB

                                                          • memory/7916-10086-0x0000000002D40000-0x0000000002D4A000-memory.dmp

                                                            Filesize

                                                            40KB

                                                          • memory/7916-10150-0x0000000002D50000-0x0000000002D5C000-memory.dmp

                                                            Filesize

                                                            48KB

                                                          • memory/7916-10191-0x0000000002D60000-0x0000000002D6A000-memory.dmp

                                                            Filesize

                                                            40KB

                                                          • memory/9564-19700-0x00000148CD070000-0x00000148CD0E6000-memory.dmp

                                                            Filesize

                                                            472KB

                                                          • memory/9588-19690-0x000001ECAE650000-0x000001ECAE672000-memory.dmp

                                                            Filesize

                                                            136KB

                                                          • memory/15508-20024-0x000000006C0D0000-0x000000006C11B000-memory.dmp

                                                            Filesize

                                                            300KB

                                                          • memory/15756-20032-0x000000006C0D0000-0x000000006C11B000-memory.dmp

                                                            Filesize

                                                            300KB