Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-11-2024 15:19

General

  • Target

    f61d38016d33a0e5e85b32545e15f8deb3c3a9313492ee05ac4cfb4a9c29bcafN.exe

  • Size

    4.9MB

  • MD5

    362ac52b63b9f6608733e6da0f41b8a0

  • SHA1

    4351bcc1035d37bc58f641fb58b08f80949f9129

  • SHA256

    f61d38016d33a0e5e85b32545e15f8deb3c3a9313492ee05ac4cfb4a9c29bcaf

  • SHA512

    8f60c2beb708deef5de53c33ee8224456ac9d9a7e3ad1eeacd786b79f2511342626910d5653b6870ea2a8c5448f6ca46ca6cfa09adb0ed1407812e7522771203

  • SSDEEP

    49152:bl5MTGChZpxtlBBgxchXb/zqP6DUtRgs5q289dAnSz44hnW1XgnYu6fYmPkMSx8E:

Malware Config

Extracted

Family

colibri

Version

1.2.0

Botnet

Build1

C2

http://zpltcmgodhvvedxtfcygvbgjkvgvcguygytfigj.cc/gate.php

http://yugyuvyugguitgyuigtfyutdtoghghbbgyv.cx/gate.php

rc4.plain

Signatures

  • Colibri Loader

    A loader sold as MaaS first seen in August 2021.

  • Colibri family
  • DcRat 50 IoCs

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 42 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 39 IoCs
  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 22 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Checks computer location settings 2 TTPs 12 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 41 IoCs
  • Checks whether UAC is enabled 1 TTPs 26 IoCs
  • Suspicious use of SetThreadContext 12 IoCs
  • Drops file in Program Files directory 20 IoCs
  • Drops file in Windows directory 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 17 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 12 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 42 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 35 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 39 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f61d38016d33a0e5e85b32545e15f8deb3c3a9313492ee05ac4cfb4a9c29bcafN.exe
    "C:\Users\Admin\AppData\Local\Temp\f61d38016d33a0e5e85b32545e15f8deb3c3a9313492ee05ac4cfb4a9c29bcafN.exe"
    1⤵
    • DcRat
    • UAC bypass
    • Checks computer location settings
    • Checks whether UAC is enabled
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:4384
    • C:\Users\Admin\AppData\Local\Temp\tmp8E3A.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp8E3A.tmp.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4600
      • C:\Users\Admin\AppData\Local\Temp\tmp8E3A.tmp.exe
        "C:\Users\Admin\AppData\Local\Temp\tmp8E3A.tmp.exe"
        3⤵
        • Executes dropped EXE
        PID:3076
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2644
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1684
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1624
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1500
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4636
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4620
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:836
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3408
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4320
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3460
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3764
    • C:\Users\Admin\AppData\Local\Temp\f61d38016d33a0e5e85b32545e15f8deb3c3a9313492ee05ac4cfb4a9c29bcafN.exe
      "C:\Users\Admin\AppData\Local\Temp\f61d38016d33a0e5e85b32545e15f8deb3c3a9313492ee05ac4cfb4a9c29bcafN.exe"
      2⤵
      • UAC bypass
      • Checks computer location settings
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:540
      • C:\Users\Admin\AppData\Local\Temp\tmpB035.tmp.exe
        "C:\Users\Admin\AppData\Local\Temp\tmpB035.tmp.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:5004
        • C:\Users\Admin\AppData\Local\Temp\tmpB035.tmp.exe
          "C:\Users\Admin\AppData\Local\Temp\tmpB035.tmp.exe"
          4⤵
          • Executes dropped EXE
          PID:1980
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:/'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2000
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2608
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3260
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2080
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2916
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3104
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious use of AdjustPrivilegeToken
        PID:1320
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3956
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4632
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious use of AdjustPrivilegeToken
        PID:4060
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious use of AdjustPrivilegeToken
        PID:1496
      • C:\Users\Default\Pictures\SppExtComObj.exe
        "C:\Users\Default\Pictures\SppExtComObj.exe"
        3⤵
        • UAC bypass
        • Checks computer location settings
        • Executes dropped EXE
        • Checks whether UAC is enabled
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • System policy modification
        PID:964
        • C:\Windows\System32\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\51c82dce-5312-4145-b6d5-a694049ccbb8.vbs"
          4⤵
            PID:5472
            • C:\Users\Default\Pictures\SppExtComObj.exe
              C:\Users\Default\Pictures\SppExtComObj.exe
              5⤵
              • UAC bypass
              • Checks computer location settings
              • Executes dropped EXE
              • Checks whether UAC is enabled
              • Modifies registry class
              • Suspicious use of AdjustPrivilegeToken
              • System policy modification
              PID:5784
              • C:\Windows\System32\WScript.exe
                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ce590d51-0cb2-44dc-8e65-121e8153d484.vbs"
                6⤵
                  PID:5924
                  • C:\Users\Default\Pictures\SppExtComObj.exe
                    C:\Users\Default\Pictures\SppExtComObj.exe
                    7⤵
                    • UAC bypass
                    • Checks computer location settings
                    • Executes dropped EXE
                    • Checks whether UAC is enabled
                    • Modifies registry class
                    • Suspicious use of AdjustPrivilegeToken
                    • System policy modification
                    PID:1820
                    • C:\Windows\System32\WScript.exe
                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\148a01bf-bd23-4ec9-9c42-b1618ecd5007.vbs"
                      8⤵
                        PID:4508
                        • C:\Users\Default\Pictures\SppExtComObj.exe
                          C:\Users\Default\Pictures\SppExtComObj.exe
                          9⤵
                          • UAC bypass
                          • Checks computer location settings
                          • Executes dropped EXE
                          • Checks whether UAC is enabled
                          • Modifies registry class
                          • Suspicious use of AdjustPrivilegeToken
                          • System policy modification
                          PID:5140
                          • C:\Windows\System32\WScript.exe
                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\f723110b-7234-47ef-b0d7-4c1089c6d9e6.vbs"
                            10⤵
                              PID:4488
                              • C:\Users\Default\Pictures\SppExtComObj.exe
                                C:\Users\Default\Pictures\SppExtComObj.exe
                                11⤵
                                • UAC bypass
                                • Checks computer location settings
                                • Executes dropped EXE
                                • Checks whether UAC is enabled
                                • Modifies registry class
                                • Suspicious use of AdjustPrivilegeToken
                                • System policy modification
                                PID:2564
                                • C:\Windows\System32\WScript.exe
                                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\f0827014-d545-4ea1-992f-a56136e1993a.vbs"
                                  12⤵
                                    PID:4332
                                    • C:\Users\Default\Pictures\SppExtComObj.exe
                                      C:\Users\Default\Pictures\SppExtComObj.exe
                                      13⤵
                                      • UAC bypass
                                      • Checks computer location settings
                                      • Executes dropped EXE
                                      • Checks whether UAC is enabled
                                      • Modifies registry class
                                      • Suspicious use of AdjustPrivilegeToken
                                      • System policy modification
                                      PID:5696
                                      • C:\Windows\System32\WScript.exe
                                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\915bf969-118f-4c69-8afe-3197b5e00399.vbs"
                                        14⤵
                                          PID:5576
                                          • C:\Users\Default\Pictures\SppExtComObj.exe
                                            C:\Users\Default\Pictures\SppExtComObj.exe
                                            15⤵
                                            • UAC bypass
                                            • Checks computer location settings
                                            • Executes dropped EXE
                                            • Checks whether UAC is enabled
                                            • Modifies registry class
                                            • Suspicious use of AdjustPrivilegeToken
                                            • System policy modification
                                            PID:6140
                                            • C:\Windows\System32\WScript.exe
                                              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\b30bde46-d5ef-418f-a407-7c23f7b37c4b.vbs"
                                              16⤵
                                                PID:6072
                                                • C:\Users\Default\Pictures\SppExtComObj.exe
                                                  C:\Users\Default\Pictures\SppExtComObj.exe
                                                  17⤵
                                                  • UAC bypass
                                                  • Checks computer location settings
                                                  • Executes dropped EXE
                                                  • Checks whether UAC is enabled
                                                  • Modifies registry class
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  • System policy modification
                                                  PID:1388
                                                  • C:\Windows\System32\WScript.exe
                                                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\8ac4265a-98b4-465f-bddb-9022819b87ab.vbs"
                                                    18⤵
                                                      PID:3116
                                                      • C:\Users\Default\Pictures\SppExtComObj.exe
                                                        C:\Users\Default\Pictures\SppExtComObj.exe
                                                        19⤵
                                                        • UAC bypass
                                                        • Checks computer location settings
                                                        • Executes dropped EXE
                                                        • Checks whether UAC is enabled
                                                        • Modifies registry class
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        • System policy modification
                                                        PID:2064
                                                        • C:\Windows\System32\WScript.exe
                                                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\5939dafa-4376-45fd-8605-9d7a42c6d1ef.vbs"
                                                          20⤵
                                                            PID:64
                                                            • C:\Users\Default\Pictures\SppExtComObj.exe
                                                              C:\Users\Default\Pictures\SppExtComObj.exe
                                                              21⤵
                                                              • UAC bypass
                                                              • Checks computer location settings
                                                              • Executes dropped EXE
                                                              • Checks whether UAC is enabled
                                                              • Modifies registry class
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              • System policy modification
                                                              PID:4384
                                                              • C:\Windows\System32\WScript.exe
                                                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\0b7ba8ec-503f-4cc4-932f-b7e84e7daf00.vbs"
                                                                22⤵
                                                                  PID:5336
                                                                  • C:\Users\Default\Pictures\SppExtComObj.exe
                                                                    C:\Users\Default\Pictures\SppExtComObj.exe
                                                                    23⤵
                                                                    • UAC bypass
                                                                    • Executes dropped EXE
                                                                    • Checks whether UAC is enabled
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    • System policy modification
                                                                    PID:3140
                                                                • C:\Windows\System32\WScript.exe
                                                                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\47e3612d-9b29-40ca-97cf-8241ef7509e7.vbs"
                                                                  22⤵
                                                                    PID:3404
                                                                  • C:\Users\Admin\AppData\Local\Temp\tmp2BD9.tmp.exe
                                                                    "C:\Users\Admin\AppData\Local\Temp\tmp2BD9.tmp.exe"
                                                                    22⤵
                                                                    • Executes dropped EXE
                                                                    • Suspicious use of SetThreadContext
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:5400
                                                                    • C:\Users\Admin\AppData\Local\Temp\tmp2BD9.tmp.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\tmp2BD9.tmp.exe"
                                                                      23⤵
                                                                      • Executes dropped EXE
                                                                      PID:5404
                                                              • C:\Windows\System32\WScript.exe
                                                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\b53c5c15-b968-40d4-b516-d2fed4f1fa3e.vbs"
                                                                20⤵
                                                                  PID:4972
                                                                • C:\Users\Admin\AppData\Local\Temp\tmpF39.tmp.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\tmpF39.tmp.exe"
                                                                  20⤵
                                                                  • Executes dropped EXE
                                                                  • Suspicious use of SetThreadContext
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:3616
                                                                  • C:\Users\Admin\AppData\Local\Temp\tmpF39.tmp.exe
                                                                    "C:\Users\Admin\AppData\Local\Temp\tmpF39.tmp.exe"
                                                                    21⤵
                                                                    • Executes dropped EXE
                                                                    PID:2892
                                                            • C:\Windows\System32\WScript.exe
                                                              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\3f65f74e-89d7-41f6-b872-7425e9339386.vbs"
                                                              18⤵
                                                                PID:1624
                                                              • C:\Users\Admin\AppData\Local\Temp\tmpDDA9.tmp.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\tmpDDA9.tmp.exe"
                                                                18⤵
                                                                • Executes dropped EXE
                                                                • Suspicious use of SetThreadContext
                                                                • System Location Discovery: System Language Discovery
                                                                PID:2232
                                                                • C:\Users\Admin\AppData\Local\Temp\tmpDDA9.tmp.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\tmpDDA9.tmp.exe"
                                                                  19⤵
                                                                  • Executes dropped EXE
                                                                  PID:4444
                                                          • C:\Windows\System32\WScript.exe
                                                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\a2830e49-12ac-4424-90ed-7bc3465784b7.vbs"
                                                            16⤵
                                                              PID:5824
                                                            • C:\Users\Admin\AppData\Local\Temp\tmpAD14.tmp.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\tmpAD14.tmp.exe"
                                                              16⤵
                                                              • Executes dropped EXE
                                                              • System Location Discovery: System Language Discovery
                                                              PID:5992
                                                              • C:\Users\Admin\AppData\Local\Temp\tmpAD14.tmp.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\tmpAD14.tmp.exe"
                                                                17⤵
                                                                • Executes dropped EXE
                                                                • System Location Discovery: System Language Discovery
                                                                PID:4436
                                                                • C:\Users\Admin\AppData\Local\Temp\tmpAD14.tmp.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\tmpAD14.tmp.exe"
                                                                  18⤵
                                                                  • Executes dropped EXE
                                                                  • Suspicious use of SetThreadContext
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:3668
                                                                  • C:\Users\Admin\AppData\Local\Temp\tmpAD14.tmp.exe
                                                                    "C:\Users\Admin\AppData\Local\Temp\tmpAD14.tmp.exe"
                                                                    19⤵
                                                                    • Executes dropped EXE
                                                                    PID:5064
                                                        • C:\Windows\System32\WScript.exe
                                                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\522ae4ed-5c83-4f59-9ee4-6403a0ba39a3.vbs"
                                                          14⤵
                                                            PID:5212
                                                          • C:\Users\Admin\AppData\Local\Temp\tmp8E8F.tmp.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\tmp8E8F.tmp.exe"
                                                            14⤵
                                                            • Executes dropped EXE
                                                            • Suspicious use of SetThreadContext
                                                            • System Location Discovery: System Language Discovery
                                                            PID:5804
                                                            • C:\Users\Admin\AppData\Local\Temp\tmp8E8F.tmp.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\tmp8E8F.tmp.exe"
                                                              15⤵
                                                              • Executes dropped EXE
                                                              PID:5944
                                                      • C:\Windows\System32\WScript.exe
                                                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\3e015ce3-3a8c-425b-8ed2-2c03355d1220.vbs"
                                                        12⤵
                                                          PID:3820
                                                        • C:\Users\Admin\AppData\Local\Temp\tmp5DEA.tmp.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\tmp5DEA.tmp.exe"
                                                          12⤵
                                                          • Executes dropped EXE
                                                          • Suspicious use of SetThreadContext
                                                          • System Location Discovery: System Language Discovery
                                                          PID:4264
                                                          • C:\Users\Admin\AppData\Local\Temp\tmp5DEA.tmp.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\tmp5DEA.tmp.exe"
                                                            13⤵
                                                            • Executes dropped EXE
                                                            PID:5504
                                                    • C:\Windows\System32\WScript.exe
                                                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\581ecb92-2e02-4227-9946-640cf5abbdda.vbs"
                                                      10⤵
                                                        PID:5176
                                                      • C:\Users\Admin\AppData\Local\Temp\tmp2D35.tmp.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\tmp2D35.tmp.exe"
                                                        10⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of SetThreadContext
                                                        • System Location Discovery: System Language Discovery
                                                        PID:3108
                                                        • C:\Users\Admin\AppData\Local\Temp\tmp2D35.tmp.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\tmp2D35.tmp.exe"
                                                          11⤵
                                                          • Executes dropped EXE
                                                          PID:2012
                                                  • C:\Windows\System32\WScript.exe
                                                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\b9a4a5f5-fdf8-4559-9eec-5e6486109140.vbs"
                                                    8⤵
                                                      PID:1948
                                                    • C:\Users\Admin\AppData\Local\Temp\tmpFC32.tmp.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\tmpFC32.tmp.exe"
                                                      8⤵
                                                      • Executes dropped EXE
                                                      • System Location Discovery: System Language Discovery
                                                      PID:4596
                                                      • C:\Users\Admin\AppData\Local\Temp\tmpFC32.tmp.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\tmpFC32.tmp.exe"
                                                        9⤵
                                                        • Executes dropped EXE
                                                        • System Location Discovery: System Language Discovery
                                                        PID:5116
                                                        • C:\Users\Admin\AppData\Local\Temp\tmpFC32.tmp.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\tmpFC32.tmp.exe"
                                                          10⤵
                                                          • Executes dropped EXE
                                                          • Suspicious use of SetThreadContext
                                                          • System Location Discovery: System Language Discovery
                                                          PID:5168
                                                          • C:\Users\Admin\AppData\Local\Temp\tmpFC32.tmp.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\tmpFC32.tmp.exe"
                                                            11⤵
                                                            • Executes dropped EXE
                                                            PID:2104
                                                • C:\Windows\System32\WScript.exe
                                                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\b1b51caf-91c6-427d-8f58-c40896abb817.vbs"
                                                  6⤵
                                                    PID:5968
                                                  • C:\Users\Admin\AppData\Local\Temp\tmpDFD1.tmp.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\tmpDFD1.tmp.exe"
                                                    6⤵
                                                    • Executes dropped EXE
                                                    • System Location Discovery: System Language Discovery
                                                    PID:6056
                                                    • C:\Users\Admin\AppData\Local\Temp\tmpDFD1.tmp.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\tmpDFD1.tmp.exe"
                                                      7⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of SetThreadContext
                                                      • System Location Discovery: System Language Discovery
                                                      PID:6128
                                                      • C:\Users\Admin\AppData\Local\Temp\tmpDFD1.tmp.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\tmpDFD1.tmp.exe"
                                                        8⤵
                                                        • Executes dropped EXE
                                                        PID:1812
                                              • C:\Windows\System32\WScript.exe
                                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\f35d6936-9a7b-40ae-b481-da287ac57f8b.vbs"
                                                4⤵
                                                  PID:5516
                                                • C:\Users\Admin\AppData\Local\Temp\tmpC208.tmp.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\tmpC208.tmp.exe"
                                                  4⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetThreadContext
                                                  • System Location Discovery: System Language Discovery
                                                  PID:5596
                                                  • C:\Users\Admin\AppData\Local\Temp\tmpC208.tmp.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\tmpC208.tmp.exe"
                                                    5⤵
                                                    • Executes dropped EXE
                                                    PID:5668
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\System.exe'" /f
                                            1⤵
                                            • DcRat
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:3952
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\System.exe'" /rl HIGHEST /f
                                            1⤵
                                            • DcRat
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:1388
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\System.exe'" /rl HIGHEST /f
                                            1⤵
                                            • DcRat
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:1416
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "sihosts" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Windows Portable Devices\sihost.exe'" /f
                                            1⤵
                                            • DcRat
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:1680
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Portable Devices\sihost.exe'" /rl HIGHEST /f
                                            1⤵
                                            • DcRat
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:4340
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "sihosts" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Windows Portable Devices\sihost.exe'" /rl HIGHEST /f
                                            1⤵
                                            • DcRat
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2680
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 11 /tr "'C:\Users\Public\sppsvc.exe'" /f
                                            1⤵
                                            • DcRat
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2032
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Users\Public\sppsvc.exe'" /rl HIGHEST /f
                                            1⤵
                                            • DcRat
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:4372
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 6 /tr "'C:\Users\Public\sppsvc.exe'" /rl HIGHEST /f
                                            1⤵
                                            • DcRat
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:832
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "f61d38016d33a0e5e85b32545e15f8deb3c3a9313492ee05ac4cfb4a9c29bcafNf" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Media Player\es-ES\f61d38016d33a0e5e85b32545e15f8deb3c3a9313492ee05ac4cfb4a9c29bcafN.exe'" /f
                                            1⤵
                                            • DcRat
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:1528
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "f61d38016d33a0e5e85b32545e15f8deb3c3a9313492ee05ac4cfb4a9c29bcafN" /sc ONLOGON /tr "'C:\Program Files\Windows Media Player\es-ES\f61d38016d33a0e5e85b32545e15f8deb3c3a9313492ee05ac4cfb4a9c29bcafN.exe'" /rl HIGHEST /f
                                            1⤵
                                            • DcRat
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:4692
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "f61d38016d33a0e5e85b32545e15f8deb3c3a9313492ee05ac4cfb4a9c29bcafNf" /sc MINUTE /mo 13 /tr "'C:\Program Files\Windows Media Player\es-ES\f61d38016d33a0e5e85b32545e15f8deb3c3a9313492ee05ac4cfb4a9c29bcafN.exe'" /rl HIGHEST /f
                                            1⤵
                                            • DcRat
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2832
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\sppsvc.exe'" /f
                                            1⤵
                                            • DcRat
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2652
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\sppsvc.exe'" /rl HIGHEST /f
                                            1⤵
                                            • DcRat
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:4320
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\sppsvc.exe'" /rl HIGHEST /f
                                            1⤵
                                            • DcRat
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:3764
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 14 /tr "'C:\Program Files\dotnet\shared\OfficeClickToRun.exe'" /f
                                            1⤵
                                            • DcRat
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2276
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Program Files\dotnet\shared\OfficeClickToRun.exe'" /rl HIGHEST /f
                                            1⤵
                                            • DcRat
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:5084
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 13 /tr "'C:\Program Files\dotnet\shared\OfficeClickToRun.exe'" /rl HIGHEST /f
                                            1⤵
                                            • DcRat
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:1468
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 8 /tr "'C:\Program Files\VideoLAN\Idle.exe'" /f
                                            1⤵
                                            • DcRat
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:4612
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files\VideoLAN\Idle.exe'" /rl HIGHEST /f
                                            1⤵
                                            • DcRat
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:3636
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 13 /tr "'C:\Program Files\VideoLAN\Idle.exe'" /rl HIGHEST /f
                                            1⤵
                                            • DcRat
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:4924
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 9 /tr "'C:\Windows\PLA\RuntimeBroker.exe'" /f
                                            1⤵
                                            • DcRat
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:4288
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\PLA\RuntimeBroker.exe'" /rl HIGHEST /f
                                            1⤵
                                            • DcRat
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2548
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 7 /tr "'C:\Windows\PLA\RuntimeBroker.exe'" /rl HIGHEST /f
                                            1⤵
                                            • DcRat
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2608
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows Multimedia Platform\RuntimeBroker.exe'" /f
                                            1⤵
                                            • DcRat
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:3868
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files\Windows Multimedia Platform\RuntimeBroker.exe'" /rl HIGHEST /f
                                            1⤵
                                            • DcRat
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2336
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 13 /tr "'C:\Program Files\Windows Multimedia Platform\RuntimeBroker.exe'" /rl HIGHEST /f
                                            1⤵
                                            • DcRat
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:4400
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 5 /tr "'C:\Windows\Temp\MsEdgeCrashpad\reports\SppExtComObj.exe'" /f
                                            1⤵
                                            • DcRat
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2088
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Windows\Temp\MsEdgeCrashpad\reports\SppExtComObj.exe'" /rl HIGHEST /f
                                            1⤵
                                            • DcRat
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2300
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 6 /tr "'C:\Windows\Temp\MsEdgeCrashpad\reports\SppExtComObj.exe'" /rl HIGHEST /f
                                            1⤵
                                            • DcRat
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2524
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 10 /tr "'C:\Users\Admin\Desktop\fontdrvhost.exe'" /f
                                            1⤵
                                            • DcRat
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:4436
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Users\Admin\Desktop\fontdrvhost.exe'" /rl HIGHEST /f
                                            1⤵
                                            • DcRat
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:368
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 14 /tr "'C:\Users\Admin\Desktop\fontdrvhost.exe'" /rl HIGHEST /f
                                            1⤵
                                            • DcRat
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2936
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\dwm.exe'" /f
                                            1⤵
                                            • DcRat
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2076
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\dwm.exe'" /rl HIGHEST /f
                                            1⤵
                                            • DcRat
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:4708
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\dwm.exe'" /rl HIGHEST /f
                                            1⤵
                                            • DcRat
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:1976
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 12 /tr "'C:\Users\Default\Pictures\SppExtComObj.exe'" /f
                                            1⤵
                                            • DcRat
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2192
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Users\Default\Pictures\SppExtComObj.exe'" /rl HIGHEST /f
                                            1⤵
                                            • DcRat
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:5100
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 5 /tr "'C:\Users\Default\Pictures\SppExtComObj.exe'" /rl HIGHEST /f
                                            1⤵
                                            • DcRat
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:4668
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\Windows\DigitalLocker\en-US\csrss.exe'" /f
                                            1⤵
                                            • DcRat
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2228
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\DigitalLocker\en-US\csrss.exe'" /rl HIGHEST /f
                                            1⤵
                                            • DcRat
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:4692
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\Windows\DigitalLocker\en-US\csrss.exe'" /rl HIGHEST /f
                                            1⤵
                                            • DcRat
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:1436

                                          Network

                                          MITRE ATT&CK Enterprise v15

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads

                                          • C:\Recovery\WindowsRE\sppsvc.exe

                                            Filesize

                                            4.9MB

                                            MD5

                                            362ac52b63b9f6608733e6da0f41b8a0

                                            SHA1

                                            4351bcc1035d37bc58f641fb58b08f80949f9129

                                            SHA256

                                            f61d38016d33a0e5e85b32545e15f8deb3c3a9313492ee05ac4cfb4a9c29bcaf

                                            SHA512

                                            8f60c2beb708deef5de53c33ee8224456ac9d9a7e3ad1eeacd786b79f2511342626910d5653b6870ea2a8c5448f6ca46ca6cfa09adb0ed1407812e7522771203

                                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\SppExtComObj.exe.log

                                            Filesize

                                            1KB

                                            MD5

                                            4a667f150a4d1d02f53a9f24d89d53d1

                                            SHA1

                                            306e125c9edce66f28fdb63e6c4ca5c9ad6e8c97

                                            SHA256

                                            414659decfd237dde09625a49811e03b5b30ee06ee2ee97ea8bcfac394d281fd

                                            SHA512

                                            4edd8e73ce03488a6d92750a782cd4042fbb54a5b3f8d8ba3ea227fda0653c2cd84f0c5d64976c7cdc1f518a2fdc8ff10e2a015ec7acf3cd01b0d62bc98542d8

                                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\f61d38016d33a0e5e85b32545e15f8deb3c3a9313492ee05ac4cfb4a9c29bcafN.exe.log

                                            Filesize

                                            1KB

                                            MD5

                                            bbb951a34b516b66451218a3ec3b0ae1

                                            SHA1

                                            7393835a2476ae655916e0a9687eeaba3ee876e9

                                            SHA256

                                            eb70c64ae99d14ac2588b7a84854fbf3c420532d7fe4dfd49c7b5a70c869943a

                                            SHA512

                                            63bcbfcf8e7421c66855c487c31b2991a989bdea0c1edd4c40066b52fa3eb3d9d37db1cd21b8eb4f33dd5870cc20532c8f485eab9c0b4f6b0793a35c077f2d6f

                                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                            Filesize

                                            2KB

                                            MD5

                                            d85ba6ff808d9e5444a4b369f5bc2730

                                            SHA1

                                            31aa9d96590fff6981b315e0b391b575e4c0804a

                                            SHA256

                                            84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                                            SHA512

                                            8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                            Filesize

                                            944B

                                            MD5

                                            77d622bb1a5b250869a3238b9bc1402b

                                            SHA1

                                            d47f4003c2554b9dfc4c16f22460b331886b191b

                                            SHA256

                                            f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb

                                            SHA512

                                            d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9

                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                            Filesize

                                            944B

                                            MD5

                                            d28a889fd956d5cb3accfbaf1143eb6f

                                            SHA1

                                            157ba54b365341f8ff06707d996b3635da8446f7

                                            SHA256

                                            21e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45

                                            SHA512

                                            0b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c

                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                            Filesize

                                            944B

                                            MD5

                                            cadef9abd087803c630df65264a6c81c

                                            SHA1

                                            babbf3636c347c8727c35f3eef2ee643dbcc4bd2

                                            SHA256

                                            cce65b73cdfe9304bcd5207913e8b60fb69faa20cd3b684f2b0343b755b99438

                                            SHA512

                                            7278aa87124abb382d9024a645e881e7b7cf1b84e8894943b36e018dbf0399e6858392f77980b599fa5488e2e21bf757a0702fe6419417edac93b68e0c2ec085

                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                            Filesize

                                            944B

                                            MD5

                                            3a6bad9528f8e23fb5c77fbd81fa28e8

                                            SHA1

                                            f127317c3bc6407f536c0f0600dcbcf1aabfba36

                                            SHA256

                                            986366767de5873f1b170a63f2a33ce05132d1afd90c8f5017afbca8ef1beb05

                                            SHA512

                                            846002154a0ece6f3e9feda6f115d3161dc21b3789525dd62ae1d9188495171293efdbe7be4710666dd8a15e66b557315b5a02918a741ed1d5f3ff0c515b98e2

                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                            Filesize

                                            944B

                                            MD5

                                            bd5940f08d0be56e65e5f2aaf47c538e

                                            SHA1

                                            d7e31b87866e5e383ab5499da64aba50f03e8443

                                            SHA256

                                            2d2f364c75bd2897504249f42cdf1d19374f5230aad68fa9154ea3d03e3031a6

                                            SHA512

                                            c34d10c7e07da44a180fae9889b61f08903aa84e8ddfa80c31c272b1ef9d491b8cec6b8a4c836c3cb1583fe8f4955c6a8db872515de3a9e10eae09610c959406

                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                            Filesize

                                            944B

                                            MD5

                                            8220c01eca52a2bdab8e95d8485a7f97

                                            SHA1

                                            a9fc35edb35e1b2920b4048e4b615ffb24bd16a2

                                            SHA256

                                            6272b9448570434cd868d8ecd66e62446240de038974c15ef8b9ff230da1059d

                                            SHA512

                                            b9893184f10eeb9919a93c09513e2d778e111d04262ed3b1ae39dc8a2a77b59782e1dc6c6ea153d25ff4973c83a40fccc597f5f408e37e4349b3e897877926bb

                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                            Filesize

                                            944B

                                            MD5

                                            36c0eb4cc9fdffc5d2d368d7231ad514

                                            SHA1

                                            ce52fda315ce5c60a0af506f87edb0c2b3fdebcc

                                            SHA256

                                            f6efe796606c4be6422dfd070d8c8e1bcda5852520633e3ef071541ff29f359b

                                            SHA512

                                            4ad7de3b286152386c4cfecb07d004d9ee3976c4e397d6a13b1ddee6524c4cb78b1c4bc9c2f984f321082f6ed6da2a2cd93f9954fd378b46f24fbf19bd15fb54

                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                            Filesize

                                            944B

                                            MD5

                                            65a68df1062af34622552c4f644a5708

                                            SHA1

                                            6f6ecf7b4b635abb0b132d95dac2759dc14b50af

                                            SHA256

                                            718dc2f5f4a6dbb7fab7f3db05bd7f602fb16526caae7084ab46c3ab4e7bad35

                                            SHA512

                                            4e460eb566032942547b58411222dd26ae300a95f83cf5ae6df58ebd28594341123611b348bd4031a33bc7f38307d5cb8fb677bba8c896919e3eee677a104d4d

                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                            Filesize

                                            944B

                                            MD5

                                            3e242d3c4b39d344f66c494424020c61

                                            SHA1

                                            194e596f33d54482e7880e91dc05e0d247a46399

                                            SHA256

                                            f688037cb0c9f9c97b3b906a6c0636c91ad1864564feb17bba4973cde361172e

                                            SHA512

                                            27c1cd6d72554fdce3b960458a1a6bd3f740aa7c22a313a80b043db283a224bf390648b9e59e6bdbf48020d082d728fbde569bee4ee2a610f21d659a7b3dfa02

                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                            Filesize

                                            944B

                                            MD5

                                            be95052f298019b83e11336567f385fc

                                            SHA1

                                            556e6abda268afaeeec5e1ee65adc01660b70534

                                            SHA256

                                            ebc004fe961bed86adc4025cdbe3349699a5a1fc328cc3a37f3ff055e7e82027

                                            SHA512

                                            233df172f37f85d34448901057ff19f20792d6e139579a1235165d5f6056a2075c19c85bc9115a6bb74c9c949aebd7bb5391e2ae9f7b1af69e5c4aca3a48cff5

                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                            Filesize

                                            944B

                                            MD5

                                            4d7e01f2da5faf06203d0bdcf32f2aee

                                            SHA1

                                            972128bc0896422301531607773f6af989535547

                                            SHA256

                                            57df11f5726f22f6b65380a63c6ddeeced49bd543781cf05428932500c6e2cef

                                            SHA512

                                            2d446d1ed39875581a11fc433c9fd13c7b5ad4133c50f93cfc18e355339c1dd8937058864250c9e3d659049f4feb8cf8e1ce3fd90716eb5c9b8cd309b9ccc16d

                                          • C:\Users\Admin\AppData\Local\Temp\148a01bf-bd23-4ec9-9c42-b1618ecd5007.vbs

                                            Filesize

                                            718B

                                            MD5

                                            3c68cf171484f2e02153f0f85474f594

                                            SHA1

                                            804364ffe7cab1cbe575bd35cd2419023e7f7176

                                            SHA256

                                            69dd882463cf3396e02fca07ccd8c2610e27b6ea515f517806b566d521159963

                                            SHA512

                                            5d18bcf8d1b2a90d731565ba2b93ea19b72da4092aabe3c8da8dc5bc0ba1304df2a3a5f1c8047e6953fcbae50d64fadeb9566360c125f0e45c1146a604bcf815

                                          • C:\Users\Admin\AppData\Local\Temp\51c82dce-5312-4145-b6d5-a694049ccbb8.vbs

                                            Filesize

                                            717B

                                            MD5

                                            c652fe464282dffd05bb658b768c1c50

                                            SHA1

                                            d1e30a0c4b11bc909d6cdcc07f65cfc0c1389edd

                                            SHA256

                                            01f2dfbd7c46398e82d2d4674b2dbb644c3f46bbcaf39e56a374b0695e9d1930

                                            SHA512

                                            38a3954ffdd79d8ed34201db2a19f4777adfdaf7ab4bdaeb32eb0b2c05fddddc1f27ba99f1e9fea4842e7cc1487c470e2150e1ca410eb57a9fc3c324f9e9d100

                                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_b01wmmgm.0xy.ps1

                                            Filesize

                                            60B

                                            MD5

                                            d17fe0a3f47be24a6453e9ef58c94641

                                            SHA1

                                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                            SHA256

                                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                            SHA512

                                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                          • C:\Users\Admin\AppData\Local\Temp\ce590d51-0cb2-44dc-8e65-121e8153d484.vbs

                                            Filesize

                                            718B

                                            MD5

                                            0d169f9bb0aff6d99ec9eebdec709bfc

                                            SHA1

                                            406450b698341f66c531c26fde3331023d5009ea

                                            SHA256

                                            597275e2ade08cbae6ca7dbbe48dcadd0f0d09a02401309e4e91e12fe85df97f

                                            SHA512

                                            39f133895d56476a480b9a4a1ac3c53c4beee51906db83d25ada21e08677727754ee383373386d79ee421943523377d85c746cd9b8fc5a8aa58ef48ad8e82f53

                                          • C:\Users\Admin\AppData\Local\Temp\f0827014-d545-4ea1-992f-a56136e1993a.vbs

                                            Filesize

                                            718B

                                            MD5

                                            fbe2834ae93dd806f0a62679a4170c9f

                                            SHA1

                                            4da65b856bec741e4dcf8c91d93e2b6c41a93169

                                            SHA256

                                            c1581a76477b322000faf923068509bff87fe55d82e002c8fb24c7cce96dda0b

                                            SHA512

                                            3dc33406da28612499a1d4d5b12a30cb12e1ec4c45df9b71b15f9eef5d1082c67b2f5f45ed409b21d194c5ff93d63f8f415a30764315a6ae39eeb34de4374ce3

                                          • C:\Users\Admin\AppData\Local\Temp\f35d6936-9a7b-40ae-b481-da287ac57f8b.vbs

                                            Filesize

                                            494B

                                            MD5

                                            689266009311fc966895383347a45ceb

                                            SHA1

                                            4b5df90346066b983f4c180e920e726534daabd6

                                            SHA256

                                            e9a66b5ff7e323e45476350f2dc5149d02243d9568c8383cc4ef4ddf0dd0f865

                                            SHA512

                                            effca4b4787e16cced90a422ae88c4d6b5f1f35f28e8757c6434dd567a7a859027d46d5105e024fecb1fbb0453115c5af189860521e52b1699e1959a37351207

                                          • C:\Users\Admin\AppData\Local\Temp\f723110b-7234-47ef-b0d7-4c1089c6d9e6.vbs

                                            Filesize

                                            718B

                                            MD5

                                            683f8bb565d3135f478669229b142663

                                            SHA1

                                            20ad319cefe5567514c922e771b0db9c885d6fe7

                                            SHA256

                                            b09defdac30ce21b1b06d98e57595ed69d55c54b79135c65c8f4d9d56bc265e5

                                            SHA512

                                            31571158178e7567a56c1b3a16c26100b9acc5adea1ce1be789bba5184141422e9a16c951daa066308a9ae2c0a6a6f0b301b063e5a804dd568f1e76808f7dbbf

                                          • C:\Users\Admin\AppData\Local\Temp\tmp8E3A.tmp.exe

                                            Filesize

                                            75KB

                                            MD5

                                            e0a68b98992c1699876f818a22b5b907

                                            SHA1

                                            d41e8ad8ba51217eb0340f8f69629ccb474484d0

                                            SHA256

                                            2b00d8c2bcc6b48e90524cdd41a07735dc94548ed41925baff86e43a61a4c37f

                                            SHA512

                                            856854f5fd89ae1669e4b2db10b73b4a78496bf80117003244c83e781f75e533e2e2bea9aa6c1b3aba3db1ed92ea0ed9755fbfd78cd6c86ba95867d07fc0ece2

                                          • C:\Windows\Temp\MsEdgeCrashpad\reports\SppExtComObj.exe

                                            Filesize

                                            4.9MB

                                            MD5

                                            b2fb4202cfe66b5b17cf8e330059bb3a

                                            SHA1

                                            57ba5e3b143c6bf87dd901c98f2979ec82f66289

                                            SHA256

                                            b722c221da13a7e7aa2136aed91ee15a70e46be244bad21029799dd2bac83586

                                            SHA512

                                            e801a9e4e91029b49ba4dc86b5c8d9a85d1b0abe111d3e2f1bb4b816d4ad1aeba3fa04bd4f577f1630d9c3cc2fa3d6a31ed1bd9fe24b06255418b4acb64c52ce

                                          • memory/540-235-0x000000001BDB0000-0x000000001BDC2000-memory.dmp

                                            Filesize

                                            72KB

                                          • memory/964-433-0x000000001B870000-0x000000001B882000-memory.dmp

                                            Filesize

                                            72KB

                                          • memory/964-477-0x000000001CD30000-0x000000001CE32000-memory.dmp

                                            Filesize

                                            1.0MB

                                          • memory/1388-634-0x000000001C2B0000-0x000000001C3B2000-memory.dmp

                                            Filesize

                                            1.0MB

                                          • memory/1820-507-0x00000000032E0000-0x00000000032F2000-memory.dmp

                                            Filesize

                                            72KB

                                          • memory/2064-651-0x000000001D560000-0x000000001D662000-memory.dmp

                                            Filesize

                                            1.0MB

                                          • memory/2564-579-0x000000001CEC0000-0x000000001CFC2000-memory.dmp

                                            Filesize

                                            1.0MB

                                          • memory/2564-560-0x000000001B960000-0x000000001B972000-memory.dmp

                                            Filesize

                                            72KB

                                          • memory/3076-71-0x0000000000400000-0x0000000000407000-memory.dmp

                                            Filesize

                                            28KB

                                          • memory/4320-132-0x0000023BB47B0000-0x0000023BB47D2000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/4384-7-0x0000000002E90000-0x0000000002EA0000-memory.dmp

                                            Filesize

                                            64KB

                                          • memory/4384-16-0x000000001C1E0000-0x000000001C1E8000-memory.dmp

                                            Filesize

                                            32KB

                                          • memory/4384-10-0x000000001B9F0000-0x000000001B9FA000-memory.dmp

                                            Filesize

                                            40KB

                                          • memory/4384-9-0x000000001B9E0000-0x000000001B9F0000-memory.dmp

                                            Filesize

                                            64KB

                                          • memory/4384-8-0x000000001B9C0000-0x000000001B9D6000-memory.dmp

                                            Filesize

                                            88KB

                                          • memory/4384-12-0x000000001C700000-0x000000001CC28000-memory.dmp

                                            Filesize

                                            5.2MB

                                          • memory/4384-6-0x0000000002D00000-0x0000000002D08000-memory.dmp

                                            Filesize

                                            32KB

                                          • memory/4384-5-0x000000001BA10000-0x000000001BA60000-memory.dmp

                                            Filesize

                                            320KB

                                          • memory/4384-0-0x00007FFC14420000-0x00007FFC14775000-memory.dmp

                                            Filesize

                                            3.3MB

                                          • memory/4384-15-0x000000001C1D0000-0x000000001C1DE000-memory.dmp

                                            Filesize

                                            56KB

                                          • memory/4384-4-0x0000000002E70000-0x0000000002E8C000-memory.dmp

                                            Filesize

                                            112KB

                                          • memory/4384-668-0x000000001BD10000-0x000000001BE12000-memory.dmp

                                            Filesize

                                            1.0MB

                                          • memory/4384-3-0x000000001BBA0000-0x000000001BCCE000-memory.dmp

                                            Filesize

                                            1.2MB

                                          • memory/4384-14-0x000000001BB80000-0x000000001BB8E000-memory.dmp

                                            Filesize

                                            56KB

                                          • memory/4384-2-0x00007FFC14420000-0x00007FFC14775000-memory.dmp

                                            Filesize

                                            3.3MB

                                          • memory/4384-13-0x000000001BB70000-0x000000001BB7A000-memory.dmp

                                            Filesize

                                            40KB

                                          • memory/4384-11-0x000000001BA00000-0x000000001BA12000-memory.dmp

                                            Filesize

                                            72KB

                                          • memory/4384-1-0x0000000000760000-0x0000000000C54000-memory.dmp

                                            Filesize

                                            5.0MB

                                          • memory/4384-18-0x000000001C300000-0x000000001C30C000-memory.dmp

                                            Filesize

                                            48KB

                                          • memory/4384-223-0x00007FFC14420000-0x00007FFC14775000-memory.dmp

                                            Filesize

                                            3.3MB

                                          • memory/4384-17-0x000000001C1F0000-0x000000001C1F8000-memory.dmp

                                            Filesize

                                            32KB

                                          • memory/5696-596-0x000000001CB70000-0x000000001CC72000-memory.dmp

                                            Filesize

                                            1.0MB

                                          • memory/5784-480-0x0000000002AB0000-0x0000000002AC2000-memory.dmp

                                            Filesize

                                            72KB

                                          • memory/6140-617-0x000000001C870000-0x000000001C972000-memory.dmp

                                            Filesize

                                            1.0MB