Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    163s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/10/2024, 03:36

General

  • Target

    77FFFEE187FABB45FFC7219D421EA83F.exe

  • Size

    1.4MB

  • MD5

    77fffee187fabb45ffc7219d421ea83f

  • SHA1

    3f21e5a79d674131678ac5de8eaf30bbfcbb177c

  • SHA256

    272d4708729e16b629b6ec2c3c04317f6579c2c8f24d171be0d9469dbbce4e26

  • SHA512

    3c27ed77b4e5c522804b48b94b70071bc07b4227ed3f5018d45160cb192136296f75a84af770caf72c797d2ea7fa36c8d897f2d68199f0fe0123c94781452b1f

  • SSDEEP

    24576:KufUOExyABqHwzAsZg7ySXHzf9gUQ4zWp2Wn7b5kXxK:K3zBqATEzf9gUQPn7b5kXx

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Modifies WinLogon for persistence 2 TTPs 15 IoCs
  • Process spawned unexpected child process 45 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 48 IoCs
  • DCRat payload 2 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Checks computer location settings 2 TTPs 16 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 15 IoCs
  • Adds Run key to start application 2 TTPs 30 IoCs
  • Checks whether UAC is enabled 1 TTPs 32 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 16 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 45 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 48 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\77FFFEE187FABB45FFC7219D421EA83F.exe
    "C:\Users\Admin\AppData\Local\Temp\77FFFEE187FABB45FFC7219D421EA83F.exe"
    1⤵
    • Modifies WinLogon for persistence
    • UAC bypass
    • Checks computer location settings
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1836
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\jiyYbf6xt0.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3968
      • C:\Windows\system32\w32tm.exe
        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
        3⤵
          PID:1556
        • C:\Program Files (x86)\Windows Defender\uk-UA\sppsvc.exe
          "C:\Program Files (x86)\Windows Defender\uk-UA\sppsvc.exe"
          3⤵
          • UAC bypass
          • Checks computer location settings
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:2904
          • C:\Windows\System32\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\e33fc0a8-44aa-40f9-afb9-9cbcf4d26912.vbs"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4048
            • C:\Program Files (x86)\Windows Defender\uk-UA\sppsvc.exe
              "C:\Program Files (x86)\Windows Defender\uk-UA\sppsvc.exe"
              5⤵
              • UAC bypass
              • Checks computer location settings
              • Executes dropped EXE
              • Checks whether UAC is enabled
              • Modifies registry class
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              • System policy modification
              PID:4384
              • C:\Windows\System32\WScript.exe
                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\e376e44b-06e5-4d4f-b95d-ee54ab6614c7.vbs"
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:3936
                • C:\Program Files (x86)\Windows Defender\uk-UA\sppsvc.exe
                  "C:\Program Files (x86)\Windows Defender\uk-UA\sppsvc.exe"
                  7⤵
                  • UAC bypass
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Checks whether UAC is enabled
                  • Modifies registry class
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  • System policy modification
                  PID:2864
                  • C:\Windows\System32\WScript.exe
                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\382d30c0-692c-46e5-bc9c-9d15fa535119.vbs"
                    8⤵
                    • Suspicious use of WriteProcessMemory
                    PID:4468
                    • C:\Program Files (x86)\Windows Defender\uk-UA\sppsvc.exe
                      "C:\Program Files (x86)\Windows Defender\uk-UA\sppsvc.exe"
                      9⤵
                      • UAC bypass
                      • Checks computer location settings
                      • Executes dropped EXE
                      • Checks whether UAC is enabled
                      • Modifies registry class
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      • System policy modification
                      PID:4896
                      • C:\Windows\System32\WScript.exe
                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\d36d35db-af5f-420d-89e4-9791e162fda1.vbs"
                        10⤵
                        • Suspicious use of WriteProcessMemory
                        PID:4680
                        • C:\Program Files (x86)\Windows Defender\uk-UA\sppsvc.exe
                          "C:\Program Files (x86)\Windows Defender\uk-UA\sppsvc.exe"
                          11⤵
                          • UAC bypass
                          • Checks computer location settings
                          • Executes dropped EXE
                          • Checks whether UAC is enabled
                          • Modifies registry class
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          • System policy modification
                          PID:2724
                          • C:\Windows\System32\WScript.exe
                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\2855e878-f16c-4549-b122-38133cf0d24b.vbs"
                            12⤵
                            • Suspicious use of WriteProcessMemory
                            PID:636
                            • C:\Program Files (x86)\Windows Defender\uk-UA\sppsvc.exe
                              "C:\Program Files (x86)\Windows Defender\uk-UA\sppsvc.exe"
                              13⤵
                              • UAC bypass
                              • Checks computer location settings
                              • Executes dropped EXE
                              • Checks whether UAC is enabled
                              • Modifies registry class
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of WriteProcessMemory
                              • System policy modification
                              PID:3544
                              • C:\Windows\System32\WScript.exe
                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\37468b60-5e11-4b8d-a0f2-cfef8da143a5.vbs"
                                14⤵
                                • Suspicious use of WriteProcessMemory
                                PID:2840
                                • C:\Program Files (x86)\Windows Defender\uk-UA\sppsvc.exe
                                  "C:\Program Files (x86)\Windows Defender\uk-UA\sppsvc.exe"
                                  15⤵
                                  • UAC bypass
                                  • Checks computer location settings
                                  • Executes dropped EXE
                                  • Checks whether UAC is enabled
                                  • Modifies registry class
                                  • Suspicious use of AdjustPrivilegeToken
                                  • Suspicious use of WriteProcessMemory
                                  • System policy modification
                                  PID:800
                                  • C:\Windows\System32\WScript.exe
                                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\f3ea7489-9f16-4b2b-aba1-24378178e98f.vbs"
                                    16⤵
                                    • Suspicious use of WriteProcessMemory
                                    PID:4692
                                    • C:\Program Files (x86)\Windows Defender\uk-UA\sppsvc.exe
                                      "C:\Program Files (x86)\Windows Defender\uk-UA\sppsvc.exe"
                                      17⤵
                                      • UAC bypass
                                      • Checks computer location settings
                                      • Executes dropped EXE
                                      • Checks whether UAC is enabled
                                      • Modifies registry class
                                      • Suspicious use of AdjustPrivilegeToken
                                      • Suspicious use of WriteProcessMemory
                                      • System policy modification
                                      PID:1072
                                      • C:\Windows\System32\WScript.exe
                                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\b9cee822-51f9-494d-805a-bc84f724a0c6.vbs"
                                        18⤵
                                        • Suspicious use of WriteProcessMemory
                                        PID:4216
                                        • C:\Program Files (x86)\Windows Defender\uk-UA\sppsvc.exe
                                          "C:\Program Files (x86)\Windows Defender\uk-UA\sppsvc.exe"
                                          19⤵
                                          • UAC bypass
                                          • Checks computer location settings
                                          • Executes dropped EXE
                                          • Checks whether UAC is enabled
                                          • Modifies registry class
                                          • Suspicious use of AdjustPrivilegeToken
                                          • Suspicious use of WriteProcessMemory
                                          • System policy modification
                                          PID:396
                                          • C:\Windows\System32\WScript.exe
                                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\05cc5801-db96-4442-9139-3b397acc61bf.vbs"
                                            20⤵
                                            • Suspicious use of WriteProcessMemory
                                            PID:3360
                                            • C:\Program Files (x86)\Windows Defender\uk-UA\sppsvc.exe
                                              "C:\Program Files (x86)\Windows Defender\uk-UA\sppsvc.exe"
                                              21⤵
                                              • UAC bypass
                                              • Checks computer location settings
                                              • Executes dropped EXE
                                              • Checks whether UAC is enabled
                                              • Modifies registry class
                                              • Suspicious use of AdjustPrivilegeToken
                                              • Suspicious use of WriteProcessMemory
                                              • System policy modification
                                              PID:1588
                                              • C:\Windows\System32\WScript.exe
                                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\b3696eaf-7a76-4b18-a04d-04b4fdf0c7de.vbs"
                                                22⤵
                                                  PID:4140
                                                  • C:\Program Files (x86)\Windows Defender\uk-UA\sppsvc.exe
                                                    "C:\Program Files (x86)\Windows Defender\uk-UA\sppsvc.exe"
                                                    23⤵
                                                    • UAC bypass
                                                    • Checks computer location settings
                                                    • Executes dropped EXE
                                                    • Checks whether UAC is enabled
                                                    • Modifies registry class
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    • System policy modification
                                                    PID:5032
                                                    • C:\Windows\System32\WScript.exe
                                                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\4497312d-b8e0-4a7f-a41b-5aae6078fa55.vbs"
                                                      24⤵
                                                        PID:1272
                                                        • C:\Program Files (x86)\Windows Defender\uk-UA\sppsvc.exe
                                                          "C:\Program Files (x86)\Windows Defender\uk-UA\sppsvc.exe"
                                                          25⤵
                                                          • UAC bypass
                                                          • Checks computer location settings
                                                          • Executes dropped EXE
                                                          • Checks whether UAC is enabled
                                                          • Modifies registry class
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          • System policy modification
                                                          PID:3864
                                                          • C:\Windows\System32\WScript.exe
                                                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\f21b1c62-4868-4854-abad-f72987dc4af8.vbs"
                                                            26⤵
                                                              PID:4772
                                                              • C:\Program Files (x86)\Windows Defender\uk-UA\sppsvc.exe
                                                                "C:\Program Files (x86)\Windows Defender\uk-UA\sppsvc.exe"
                                                                27⤵
                                                                • UAC bypass
                                                                • Checks computer location settings
                                                                • Executes dropped EXE
                                                                • Checks whether UAC is enabled
                                                                • Modifies registry class
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                • System policy modification
                                                                PID:3792
                                                                • C:\Windows\System32\WScript.exe
                                                                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\62272bdf-21ce-4c1e-89ea-7af74e81b8f5.vbs"
                                                                  28⤵
                                                                    PID:4640
                                                                    • C:\Program Files (x86)\Windows Defender\uk-UA\sppsvc.exe
                                                                      "C:\Program Files (x86)\Windows Defender\uk-UA\sppsvc.exe"
                                                                      29⤵
                                                                      • UAC bypass
                                                                      • Checks computer location settings
                                                                      • Executes dropped EXE
                                                                      • Checks whether UAC is enabled
                                                                      • Modifies registry class
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      • System policy modification
                                                                      PID:3552
                                                                      • C:\Windows\System32\WScript.exe
                                                                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\e5fcbf15-b6bb-4ae2-9bf7-434b0e2668bb.vbs"
                                                                        30⤵
                                                                          PID:2544
                                                                          • C:\Program Files (x86)\Windows Defender\uk-UA\sppsvc.exe
                                                                            "C:\Program Files (x86)\Windows Defender\uk-UA\sppsvc.exe"
                                                                            31⤵
                                                                            • UAC bypass
                                                                            • Checks computer location settings
                                                                            • Executes dropped EXE
                                                                            • Checks whether UAC is enabled
                                                                            • Modifies registry class
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            • System policy modification
                                                                            PID:1460
                                                                            • C:\Windows\System32\WScript.exe
                                                                              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\451f02aa-e2aa-4ac9-a602-e8be55773c4a.vbs"
                                                                              32⤵
                                                                                PID:3360
                                                                              • C:\Windows\System32\WScript.exe
                                                                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\b4babeee-ef40-4a00-af05-0f80cdf14e85.vbs"
                                                                                32⤵
                                                                                  PID:1664
                                                                            • C:\Windows\System32\WScript.exe
                                                                              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\a3c76076-2561-45c2-9c2e-f758d711f4d5.vbs"
                                                                              30⤵
                                                                                PID:3480
                                                                          • C:\Windows\System32\WScript.exe
                                                                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\46d0265c-7459-4c36-ac23-4afcc9750b57.vbs"
                                                                            28⤵
                                                                              PID:4360
                                                                        • C:\Windows\System32\WScript.exe
                                                                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\f506bec0-09a4-43bd-8ca9-17d15ca3703d.vbs"
                                                                          26⤵
                                                                            PID:2696
                                                                      • C:\Windows\System32\WScript.exe
                                                                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ef9c40d0-e953-41c7-a535-bf26d644720e.vbs"
                                                                        24⤵
                                                                          PID:3228
                                                                    • C:\Windows\System32\WScript.exe
                                                                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\866a0ee8-a7a3-4fa0-b865-2f99d97a2dad.vbs"
                                                                      22⤵
                                                                        PID:2484
                                                                  • C:\Windows\System32\WScript.exe
                                                                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\22841f8d-8ca0-461f-940f-dfaeafea62b3.vbs"
                                                                    20⤵
                                                                      PID:4432
                                                                • C:\Windows\System32\WScript.exe
                                                                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\3b4a6299-ac32-4359-b3a3-694050250aed.vbs"
                                                                  18⤵
                                                                    PID:5024
                                                              • C:\Windows\System32\WScript.exe
                                                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\33e13f7c-6485-49a3-af92-0cc553a1dda3.vbs"
                                                                16⤵
                                                                  PID:4104
                                                            • C:\Windows\System32\WScript.exe
                                                              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\9eabf991-6c2c-4ffd-b248-0d9c8f3f3fca.vbs"
                                                              14⤵
                                                                PID:4376
                                                          • C:\Windows\System32\WScript.exe
                                                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\6396ff6a-e98f-4b50-9ed4-6d3c36fbb502.vbs"
                                                            12⤵
                                                              PID:3632
                                                        • C:\Windows\System32\WScript.exe
                                                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\a41d19ab-9a6c-4ebb-a4ff-1ba6d045585b.vbs"
                                                          10⤵
                                                            PID:4976
                                                      • C:\Windows\System32\WScript.exe
                                                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\37e3f6a1-af1c-444a-87d5-2cc1da6c4206.vbs"
                                                        8⤵
                                                          PID:548
                                                    • C:\Windows\System32\WScript.exe
                                                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\e85bd8db-656b-4027-8af1-4518c58fb146.vbs"
                                                      6⤵
                                                        PID:1724
                                                  • C:\Windows\System32\WScript.exe
                                                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\4ca6e78a-d8e3-470b-9f86-1dd9d8f57101.vbs"
                                                    4⤵
                                                      PID:740
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "77FFFEE187FABB45FFC7219D421EA83F7" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\77FFFEE187FABB45FFC7219D421EA83F.exe'" /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:2616
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "77FFFEE187FABB45FFC7219D421EA83F" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\77FFFEE187FABB45FFC7219D421EA83F.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:4896
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "77FFFEE187FABB45FFC7219D421EA83F7" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\77FFFEE187FABB45FFC7219D421EA83F.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:1396
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "servicess" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\services.exe'" /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:4500
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\services.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:3696
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "servicess" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\services.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:3932
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows Portable Devices\backgroundTaskHost.exe'" /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:3660
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Portable Devices\backgroundTaskHost.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:4400
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Windows Portable Devices\backgroundTaskHost.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:4056
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 11 /tr "'C:\Windows\Resources\OfficeClickToRun.exe'" /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:2696
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Windows\Resources\OfficeClickToRun.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:1576
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 10 /tr "'C:\Windows\Resources\OfficeClickToRun.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:3272
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Windows Media Player\Network Sharing\unsecapp.exe'" /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:640
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Media Player\Network Sharing\unsecapp.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:5088
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Windows Media Player\Network Sharing\unsecapp.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:3488
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 12 /tr "'C:\Program Files\Windows Media Player\es-ES\RuntimeBroker.exe'" /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:2392
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files\Windows Media Player\es-ES\RuntimeBroker.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:1116
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 11 /tr "'C:\Program Files\Windows Media Player\es-ES\RuntimeBroker.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:4072
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Windows Mail\Idle.exe'" /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:1664
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Mail\Idle.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:1920
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows Mail\Idle.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:1844
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\System.exe'" /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:992
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\System.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:532
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\System.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:232
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:3676
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:1320
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:3584
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\dwm.exe'" /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:3544
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\dwm.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:3988
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\dwm.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:4504
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\backgroundTaskHost.exe'" /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:2376
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\backgroundTaskHost.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:1088
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\backgroundTaskHost.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:3176
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\lsass.exe'" /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:3628
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\lsass.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:2576
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\lsass.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:1940
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 8 /tr "'C:\Users\All Users\Templates\fontdrvhost.exe'" /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:1824
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Users\All Users\Templates\fontdrvhost.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:2880
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 7 /tr "'C:\Users\All Users\Templates\fontdrvhost.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:5056
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Windows Defender\uk-UA\sppsvc.exe'" /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:3704
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Defender\uk-UA\sppsvc.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:2132
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows Defender\uk-UA\sppsvc.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:3388
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 5 /tr "'C:\Program Files\dotnet\swidtag\unsecapp.exe'" /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:748
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\Program Files\dotnet\swidtag\unsecapp.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:1912
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 7 /tr "'C:\Program Files\dotnet\swidtag\unsecapp.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:1736

                                              Network

                                              MITRE ATT&CK Enterprise v15

                                              Replay Monitor

                                              Loading Replay Monitor...

                                              Downloads

                                              • C:\Program Files (x86)\Windows Media Player\Network Sharing\unsecapp.exe

                                                Filesize

                                                1.4MB

                                                MD5

                                                77fffee187fabb45ffc7219d421ea83f

                                                SHA1

                                                3f21e5a79d674131678ac5de8eaf30bbfcbb177c

                                                SHA256

                                                272d4708729e16b629b6ec2c3c04317f6579c2c8f24d171be0d9469dbbce4e26

                                                SHA512

                                                3c27ed77b4e5c522804b48b94b70071bc07b4227ed3f5018d45160cb192136296f75a84af770caf72c797d2ea7fa36c8d897f2d68199f0fe0123c94781452b1f

                                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\sppsvc.exe.log

                                                Filesize

                                                1KB

                                                MD5

                                                49b64127208271d8f797256057d0b006

                                                SHA1

                                                b99bd7e2b4e9ed24de47fb3341ea67660b84cca1

                                                SHA256

                                                2a5d403a2e649d8eceef8f785eeb0f6d33888ec6bbf251b3c347e34cb32b1e77

                                                SHA512

                                                f7c728923c893dc9bc88ad2159e0abcda41e1b40ff7e7756e6252d135ed238a2248a2662b3392449836dd1b0b580f0c866cc33e409527484fe4602e3d3f10e3e

                                              • C:\Users\Admin\AppData\Local\Temp\05cc5801-db96-4442-9139-3b397acc61bf.vbs

                                                Filesize

                                                731B

                                                MD5

                                                788d9dc0642caa451b9607b4e6608246

                                                SHA1

                                                900baa1e01cf6a5d28bf8b73cbf22af9d15f85df

                                                SHA256

                                                98964c97bd6ed3a8340cadfcd64d14521d28b86d8d0f3b8ea6bcd6385e7f20b7

                                                SHA512

                                                a2e2ae1d1c71c4659fc02ae6fe8fb953c6b4405447ed7bf5c8ffaaacc3f156fcc2bb36faf791e6ef4aa9aef02dd2b6b7bca704fb86e3762f9594a32167ebe512

                                              • C:\Users\Admin\AppData\Local\Temp\2855e878-f16c-4549-b122-38133cf0d24b.vbs

                                                Filesize

                                                732B

                                                MD5

                                                1113aebc9a398ed50911ded1192950f7

                                                SHA1

                                                845bf7b3df7729d5caa76a417f67e35226ccce79

                                                SHA256

                                                0dcaea296f3b8cc19bba132cf6001c20114b4c374b13d2d3d30fbb80da4f5070

                                                SHA512

                                                5d476d966f0994948a369960bf933062d6fb260c629b619174b9392d4e4aa1f5e7b65273b64b2ca4924ecc57de21d4a5acebbd9a9f9131834ee29632a8eeccb6

                                              • C:\Users\Admin\AppData\Local\Temp\37468b60-5e11-4b8d-a0f2-cfef8da143a5.vbs

                                                Filesize

                                                732B

                                                MD5

                                                9e2b9a378e88f0a0fc8fd3fdc341f918

                                                SHA1

                                                8068ec11e76be79acba1296b52fc129f18ee9ab3

                                                SHA256

                                                0c3f0c540d2169ee0a044872af6d37c71e82af6b88abaf7f6ca9d0a112109dc8

                                                SHA512

                                                8fc750f23d99a5ad6499ef77b0c7f183a3586ed109ea65117c3e9bafb982e41e2e9d241454edad81eb80fca270e255e16a6d75cab762509a9d1e873be3cdc99e

                                              • C:\Users\Admin\AppData\Local\Temp\382d30c0-692c-46e5-bc9c-9d15fa535119.vbs

                                                Filesize

                                                732B

                                                MD5

                                                d02226bff7eac04d0bad878f188e2571

                                                SHA1

                                                2fd92b540dea7775d938541137e4e021b41d1a24

                                                SHA256

                                                efb03823434d51d515b0aaeecc30cc883bbd18e27bb5e1bf4b3932e96963fbd3

                                                SHA512

                                                31ef3cbd1da1bafeb1dfaa22de4d7b770bb04c087719568788b5f1932b807f00931385e8081726eae413d7fc2419212cb22e3cd07c17878bcd43cf72a028e6ce

                                              • C:\Users\Admin\AppData\Local\Temp\4497312d-b8e0-4a7f-a41b-5aae6078fa55.vbs

                                                Filesize

                                                732B

                                                MD5

                                                2839d2c93cc88ad8ffc6102efbc3e3a6

                                                SHA1

                                                9e7861ec937a741d009f46ee60c6db5b2868234f

                                                SHA256

                                                b9089f565f7f39b6ffd0bcb3988ba28087d2c6c4b772a15bd1f3aea9c238f84d

                                                SHA512

                                                38e3da0a2cf313d1c0bbef9c91a2224b7cf1f55a9ade5f83fd4ffbfeb321f244c4d8b8e545f07ddd729fc6a9f46008b9601694e6282ac6de9e57d265f319812d

                                              • C:\Users\Admin\AppData\Local\Temp\451f02aa-e2aa-4ac9-a602-e8be55773c4a.vbs

                                                Filesize

                                                732B

                                                MD5

                                                d13bc86392f589a40f16a7e9ec875969

                                                SHA1

                                                84f4be4e0a606b0cd8b0dc88890b2786ccd2d85c

                                                SHA256

                                                a9b27a3518117ff585f3999b25b14d5e26da1e9a0a69a4ace45c8dca9c05448f

                                                SHA512

                                                8461082baed96e9d6c68af9b2dc255a07a7d138e37a8a798bc9fd57f01b4a186bba3fcd91201699473ba6d0290c62099428f7fc69c8f2baa37dc97c74074f2e6

                                              • C:\Users\Admin\AppData\Local\Temp\4ca6e78a-d8e3-470b-9f86-1dd9d8f57101.vbs

                                                Filesize

                                                508B

                                                MD5

                                                f6c4920059f7ee55ae5aea6355129ee7

                                                SHA1

                                                c8b9beb6139ee82809a8ea2e1fb5451697cf7899

                                                SHA256

                                                7610607d5fac190aa970690505134264bcec0c00c161504372291ef47d46e491

                                                SHA512

                                                0454b840abfcf9a20555de29809a5814aff5fe67c10f4663abb7ffe87e06ef3f9937ac2a2c92da1a1c61858ce36ed0024f00b6daa8007e261d484cf4c4241258

                                              • C:\Users\Admin\AppData\Local\Temp\62272bdf-21ce-4c1e-89ea-7af74e81b8f5.vbs

                                                Filesize

                                                732B

                                                MD5

                                                1fa09b0190b361a4bf862bb6e3fe20bb

                                                SHA1

                                                347f23b01c4996e7e356925b32aa7cd765cf260a

                                                SHA256

                                                765f9f44145e69a8869c498d0018f33d55f1ec27a07da8f2f0eaba136a2c9f85

                                                SHA512

                                                fb0577bc97648ac8574029063eedfeb2eb69623315fc4a98ae447ce751b02839366711e25a2890c6ce213e05de718fee2c6102403e8403e9396fd63f31f0f1d8

                                              • C:\Users\Admin\AppData\Local\Temp\b3696eaf-7a76-4b18-a04d-04b4fdf0c7de.vbs

                                                Filesize

                                                732B

                                                MD5

                                                ff05955456495fc39d4008b2c803a459

                                                SHA1

                                                57bf1ed8ba3a85950b368d7efd31f4c08fb13d46

                                                SHA256

                                                1945ae042f3772a137f7f9f3045ada809d57b206ff308a12f33be44c5c33e103

                                                SHA512

                                                1faa031cb83bd55c34dc14bb88078b36bb70187c9e9208dd2253764da0ee86342fc6d8d012630429d988980dc0e5834b6ffe9ff63529c804759a2824d919275c

                                              • C:\Users\Admin\AppData\Local\Temp\b9cee822-51f9-494d-805a-bc84f724a0c6.vbs

                                                Filesize

                                                732B

                                                MD5

                                                95d2f060666f283ce2f467a51b809afd

                                                SHA1

                                                1ecf2d33cb1689381213ffb688d9996c01b92a18

                                                SHA256

                                                c15e7aac38f031ae4f7cc1b7806e5b3c6a5fb56f45eabe755f45081c397e9254

                                                SHA512

                                                1a72bca7d623af7645bd03eec045f8087c04cc62525c4179db6c31767e626edc55094e56c187b978ef11e234f984458be80f38a22a4cdb44e34a54f18047b017

                                              • C:\Users\Admin\AppData\Local\Temp\d36d35db-af5f-420d-89e4-9791e162fda1.vbs

                                                Filesize

                                                732B

                                                MD5

                                                b679e44efa1d20c2a64a4c8f7a859590

                                                SHA1

                                                ff2b92bc50c9c569ac049e9db3b80acdd03ff05e

                                                SHA256

                                                540b1fe53861905da5bec04d45b7216d1785b0446c9595ee51705b446b35a8e0

                                                SHA512

                                                b03917d489e6e671f8349736b75627b95e180273324a38439572fd05c3665559d4b2d3514f977ef84d612ebed57c93f8ce636cd185147253982a3524afdfbb33

                                              • C:\Users\Admin\AppData\Local\Temp\e33fc0a8-44aa-40f9-afb9-9cbcf4d26912.vbs

                                                Filesize

                                                732B

                                                MD5

                                                ac962ee06bd3038f48f3f87dfd1db271

                                                SHA1

                                                7793e7c3c6c8951f1099227712dd578363906366

                                                SHA256

                                                41ea3519b1982586d0549cfdd00f52b60cf23edfc1559a90acf2a6d2517c0345

                                                SHA512

                                                73c64069fe519c2962110beb85902c455761d4b9314e52a9993bfe8afdfbe959338cb2cb5c2d0f95bdac83a9db499c994a81343ab1cdb333fe41353b48cc7895

                                              • C:\Users\Admin\AppData\Local\Temp\e376e44b-06e5-4d4f-b95d-ee54ab6614c7.vbs

                                                Filesize

                                                732B

                                                MD5

                                                5dac91857e3c1bca1794a1521f2c7c8f

                                                SHA1

                                                7bc33e30c4faa130c898b35e8e6f8a50ec6e3735

                                                SHA256

                                                ef44cfb56fd179292ae418ddcdd7dccf404e7552b9302779af307cfbc2bad1f9

                                                SHA512

                                                f0785dcbe2dc742a1946cbc5693624b32be61b5dcc418437bf645d44a25f4f6e43dfd52f957bf6285daeef605861463805299236bd398f8b2ce97651929687cd

                                              • C:\Users\Admin\AppData\Local\Temp\e5fcbf15-b6bb-4ae2-9bf7-434b0e2668bb.vbs

                                                Filesize

                                                732B

                                                MD5

                                                cd5539e3024c02e8630fa3d0e60a3b0a

                                                SHA1

                                                cc4abcc17d87e8351f332a8c41975dc3a084d4bd

                                                SHA256

                                                3df447979e7967a7da17135f1e0509ac58cfac368db78c03923c3e829efac73b

                                                SHA512

                                                c22a3408e00d57a7d79040b6c0ff61b143bec97594037e761d63f0edde79e49d6486a9c08d7575da2a0a5a19f59ddcfba1b7175850d9fa020da27fae2963da48

                                              • C:\Users\Admin\AppData\Local\Temp\f21b1c62-4868-4854-abad-f72987dc4af8.vbs

                                                Filesize

                                                732B

                                                MD5

                                                30dd7ed5bd7d955a73593a133c236061

                                                SHA1

                                                01d8249962240d8a6e912f084f7b6e14164ebd6d

                                                SHA256

                                                3663cfb5267e48d91bfc455a8a1edc4ca924bae41c9acb5c828a55e340a77e3e

                                                SHA512

                                                f9f5a196d2121e9340a0629636953cd7ba535ce44b67db598b8550507f9646a65977d49fd4b64e88ce41c00dbfb381e3775ff43aa3987056b85d876a24e25c64

                                              • C:\Users\Admin\AppData\Local\Temp\f3ea7489-9f16-4b2b-aba1-24378178e98f.vbs

                                                Filesize

                                                731B

                                                MD5

                                                609b5ad824bbe62c19f95e228748b086

                                                SHA1

                                                577dd5f664658eba8fc0d374e86f38674e059f89

                                                SHA256

                                                41ae978673a708d1e67985d673854e4d33fc58539a5088c1889cad9c3596614e

                                                SHA512

                                                0771091cd68738afd40638e068fdbbd15e830010093542e3349b58236dbf5d06f45d0f35fafd2f35222bb7c11b8bc03353284be1d11bda64cf098c6e7d18c8df

                                              • C:\Users\Admin\AppData\Local\Temp\jiyYbf6xt0.bat

                                                Filesize

                                                221B

                                                MD5

                                                63cdb72157bf9e0e3a05a6cdefae3a52

                                                SHA1

                                                ed8ccb03162d254c54e2fe05e2d7559ca0662552

                                                SHA256

                                                4e43fe5d39fdd792cf207f4dbe81852b3c086745d4f70d20292e6690d7c69a75

                                                SHA512

                                                043cbba0e874cb4162a870542003e4d2de1717701ec8130025414740b525a08d87962bef7687740c8932b91afe4a973312efb35b41499e0d79766416b48f5ca2

                                              • memory/396-144-0x0000000000AE0000-0x0000000000AF2000-memory.dmp

                                                Filesize

                                                72KB

                                              • memory/800-121-0x00000000028C0000-0x00000000028D2000-memory.dmp

                                                Filesize

                                                72KB

                                              • memory/1836-6-0x0000000002970000-0x0000000002978000-memory.dmp

                                                Filesize

                                                32KB

                                              • memory/1836-49-0x00007FFA9AB10000-0x00007FFA9B5D1000-memory.dmp

                                                Filesize

                                                10.8MB

                                              • memory/1836-5-0x000000001B500000-0x000000001B550000-memory.dmp

                                                Filesize

                                                320KB

                                              • memory/1836-12-0x00000000029E0000-0x00000000029EE000-memory.dmp

                                                Filesize

                                                56KB

                                              • memory/1836-9-0x000000001C190000-0x000000001C6B8000-memory.dmp

                                                Filesize

                                                5.2MB

                                              • memory/1836-10-0x00000000029C0000-0x00000000029CC000-memory.dmp

                                                Filesize

                                                48KB

                                              • memory/1836-0-0x00007FFA9AB13000-0x00007FFA9AB15000-memory.dmp

                                                Filesize

                                                8KB

                                              • memory/1836-8-0x0000000002990000-0x00000000029A2000-memory.dmp

                                                Filesize

                                                72KB

                                              • memory/1836-7-0x0000000002980000-0x000000000298A000-memory.dmp

                                                Filesize

                                                40KB

                                              • memory/1836-4-0x0000000002950000-0x000000000296C000-memory.dmp

                                                Filesize

                                                112KB

                                              • memory/1836-3-0x0000000002940000-0x000000000294E000-memory.dmp

                                                Filesize

                                                56KB

                                              • memory/1836-13-0x0000000002B10000-0x0000000002B1C000-memory.dmp

                                                Filesize

                                                48KB

                                              • memory/1836-2-0x00007FFA9AB10000-0x00007FFA9B5D1000-memory.dmp

                                                Filesize

                                                10.8MB

                                              • memory/1836-11-0x00000000029D0000-0x00000000029DA000-memory.dmp

                                                Filesize

                                                40KB

                                              • memory/1836-1-0x00000000006D0000-0x000000000083A000-memory.dmp

                                                Filesize

                                                1.4MB