Analysis
-
max time kernel
144s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-12-2024 16:50
Behavioral task
behavioral1
Sample
4c30e9d648579aa65b9ef36bfa72baa131269c3c5c32fb841108a43d29b26f49.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
4c30e9d648579aa65b9ef36bfa72baa131269c3c5c32fb841108a43d29b26f49.exe
Resource
win10v2004-20241007-en
General
-
Target
4c30e9d648579aa65b9ef36bfa72baa131269c3c5c32fb841108a43d29b26f49.exe
-
Size
1.3MB
-
MD5
68b34064a71f8a193b4bfd2e9ff3e603
-
SHA1
ea2d6af1ad55b8cc91582d0fb2c6ed9cfdee9541
-
SHA256
4c30e9d648579aa65b9ef36bfa72baa131269c3c5c32fb841108a43d29b26f49
-
SHA512
16e6d120bc7a5cdb84d1e7868d339bfe99c65b31a6ff2204dc67ee2d71c4e3ac28e6be476c843d8f3d9232174b1bb0fb1ba30c3abdc227a0b52d11510496f83f
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 54 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2616 2828 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2940 2828 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1612 2828 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 548 2828 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2224 2828 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2196 2828 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 760 2828 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2604 2828 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3000 2828 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 592 2828 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1760 2828 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1260 2828 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2936 2828 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3036 2828 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1460 2828 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1964 2828 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1668 2828 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2136 2828 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 264 2828 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1904 2828 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2452 2828 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2152 2828 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2356 2828 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2508 2828 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2468 2828 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2444 2828 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2192 2828 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1608 2828 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 872 2828 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 880 2828 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 952 2828 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2524 2828 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2028 2828 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1952 2828 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1292 2828 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 648 2828 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3004 2828 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1852 2828 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 328 2828 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2276 2828 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1304 2828 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1784 2828 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1488 2828 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2352 2828 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2300 2828 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1316 2828 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2332 2828 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2304 2828 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1568 2828 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2728 2828 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2872 2828 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2760 2828 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1972 2828 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2672 2828 schtasks.exe 34 -
resource yara_rule behavioral1/files/0x00080000000162e9-10.dat dcrat behavioral1/memory/2664-13-0x00000000002B0000-0x00000000003C0000-memory.dmp dcrat behavioral1/memory/2404-141-0x0000000000B10000-0x0000000000C20000-memory.dmp dcrat behavioral1/memory/2152-207-0x0000000000E30000-0x0000000000F40000-memory.dmp dcrat behavioral1/memory/2780-267-0x00000000000E0000-0x00000000001F0000-memory.dmp dcrat behavioral1/memory/1668-327-0x0000000000DE0000-0x0000000000EF0000-memory.dmp dcrat behavioral1/memory/904-387-0x0000000000070000-0x0000000000180000-memory.dmp dcrat behavioral1/memory/2620-448-0x00000000000C0000-0x00000000001D0000-memory.dmp dcrat behavioral1/memory/1088-509-0x0000000000180000-0x0000000000290000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 19 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2932 powershell.exe 336 powershell.exe 2660 powershell.exe 2252 powershell.exe 2684 powershell.exe 2336 powershell.exe 2996 powershell.exe 1036 powershell.exe 1920 powershell.exe 2668 powershell.exe 2344 powershell.exe 2704 powershell.exe 1612 powershell.exe 432 powershell.exe 2800 powershell.exe 2680 powershell.exe 2768 powershell.exe 820 powershell.exe 980 powershell.exe -
Executes dropped EXE 9 IoCs
pid Process 2664 DllCommonsvc.exe 2404 audiodg.exe 2152 audiodg.exe 2780 audiodg.exe 1668 audiodg.exe 904 audiodg.exe 2620 audiodg.exe 1088 audiodg.exe 2696 audiodg.exe -
Loads dropped DLL 2 IoCs
pid Process 3044 cmd.exe 3044 cmd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 8 IoCs
flow ioc 9 raw.githubusercontent.com 12 raw.githubusercontent.com 16 raw.githubusercontent.com 19 raw.githubusercontent.com 23 raw.githubusercontent.com 26 raw.githubusercontent.com 4 raw.githubusercontent.com 5 raw.githubusercontent.com -
Drops file in Program Files directory 8 IoCs
description ioc Process File created C:\Program Files\Windows Sidebar\es-ES\ebf1f9fa8afd6d DllCommonsvc.exe File created C:\Program Files (x86)\Google\Temp\lsm.exe DllCommonsvc.exe File created C:\Program Files (x86)\Google\Temp\101b941d020240 DllCommonsvc.exe File created C:\Program Files (x86)\Microsoft Office\Templates\Presentation Designs\cmd.exe DllCommonsvc.exe File created C:\Program Files (x86)\Microsoft Office\Templates\Presentation Designs\ebf1f9fa8afd6d DllCommonsvc.exe File created C:\Program Files\7-Zip\Lang\audiodg.exe DllCommonsvc.exe File created C:\Program Files\7-Zip\Lang\42af1c969fbb7b DllCommonsvc.exe File created C:\Program Files\Windows Sidebar\es-ES\cmd.exe DllCommonsvc.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\Globalization\Sorting\lsm.exe DllCommonsvc.exe File created C:\Windows\Globalization\Sorting\101b941d020240 DllCommonsvc.exe File created C:\Windows\Setup\State\sppsvc.exe DllCommonsvc.exe File created C:\Windows\Setup\State\0a1fd5f707cd16 DllCommonsvc.exe File created C:\Windows\L2Schemas\WmiPrvSE.exe DllCommonsvc.exe File created C:\Windows\L2Schemas\24dbde2999530e DllCommonsvc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4c30e9d648579aa65b9ef36bfa72baa131269c3c5c32fb841108a43d29b26f49.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 54 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2196 schtasks.exe 2524 schtasks.exe 2672 schtasks.exe 1952 schtasks.exe 1316 schtasks.exe 1972 schtasks.exe 548 schtasks.exe 2224 schtasks.exe 2936 schtasks.exe 2192 schtasks.exe 2728 schtasks.exe 2604 schtasks.exe 3036 schtasks.exe 1904 schtasks.exe 328 schtasks.exe 880 schtasks.exe 1784 schtasks.exe 1488 schtasks.exe 2356 schtasks.exe 952 schtasks.exe 1568 schtasks.exe 2616 schtasks.exe 1668 schtasks.exe 264 schtasks.exe 2304 schtasks.exe 592 schtasks.exe 2152 schtasks.exe 2508 schtasks.exe 2468 schtasks.exe 1304 schtasks.exe 1260 schtasks.exe 1608 schtasks.exe 1760 schtasks.exe 1852 schtasks.exe 2332 schtasks.exe 2136 schtasks.exe 1292 schtasks.exe 2300 schtasks.exe 2276 schtasks.exe 2028 schtasks.exe 760 schtasks.exe 648 schtasks.exe 3004 schtasks.exe 2352 schtasks.exe 1612 schtasks.exe 2452 schtasks.exe 2444 schtasks.exe 872 schtasks.exe 2940 schtasks.exe 3000 schtasks.exe 1460 schtasks.exe 1964 schtasks.exe 2872 schtasks.exe 2760 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 2664 DllCommonsvc.exe 2664 DllCommonsvc.exe 2664 DllCommonsvc.exe 2800 powershell.exe 2344 powershell.exe 2768 powershell.exe 2684 powershell.exe 2336 powershell.exe 432 powershell.exe 980 powershell.exe 2704 powershell.exe 1612 powershell.exe 820 powershell.exe 2252 powershell.exe 1036 powershell.exe 2660 powershell.exe 2680 powershell.exe 1920 powershell.exe 2996 powershell.exe 2668 powershell.exe 2932 powershell.exe 336 powershell.exe 2404 audiodg.exe 2152 audiodg.exe 2780 audiodg.exe 1668 audiodg.exe 904 audiodg.exe 2620 audiodg.exe 1088 audiodg.exe 2696 audiodg.exe -
Suspicious use of AdjustPrivilegeToken 28 IoCs
description pid Process Token: SeDebugPrivilege 2664 DllCommonsvc.exe Token: SeDebugPrivilege 2800 powershell.exe Token: SeDebugPrivilege 2344 powershell.exe Token: SeDebugPrivilege 2768 powershell.exe Token: SeDebugPrivilege 2684 powershell.exe Token: SeDebugPrivilege 2336 powershell.exe Token: SeDebugPrivilege 432 powershell.exe Token: SeDebugPrivilege 980 powershell.exe Token: SeDebugPrivilege 2704 powershell.exe Token: SeDebugPrivilege 1612 powershell.exe Token: SeDebugPrivilege 820 powershell.exe Token: SeDebugPrivilege 2252 powershell.exe Token: SeDebugPrivilege 1036 powershell.exe Token: SeDebugPrivilege 2660 powershell.exe Token: SeDebugPrivilege 2680 powershell.exe Token: SeDebugPrivilege 1920 powershell.exe Token: SeDebugPrivilege 2996 powershell.exe Token: SeDebugPrivilege 2404 audiodg.exe Token: SeDebugPrivilege 2668 powershell.exe Token: SeDebugPrivilege 2932 powershell.exe Token: SeDebugPrivilege 336 powershell.exe Token: SeDebugPrivilege 2152 audiodg.exe Token: SeDebugPrivilege 2780 audiodg.exe Token: SeDebugPrivilege 1668 audiodg.exe Token: SeDebugPrivilege 904 audiodg.exe Token: SeDebugPrivilege 2620 audiodg.exe Token: SeDebugPrivilege 1088 audiodg.exe Token: SeDebugPrivilege 2696 audiodg.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2776 wrote to memory of 2788 2776 4c30e9d648579aa65b9ef36bfa72baa131269c3c5c32fb841108a43d29b26f49.exe 30 PID 2776 wrote to memory of 2788 2776 4c30e9d648579aa65b9ef36bfa72baa131269c3c5c32fb841108a43d29b26f49.exe 30 PID 2776 wrote to memory of 2788 2776 4c30e9d648579aa65b9ef36bfa72baa131269c3c5c32fb841108a43d29b26f49.exe 30 PID 2776 wrote to memory of 2788 2776 4c30e9d648579aa65b9ef36bfa72baa131269c3c5c32fb841108a43d29b26f49.exe 30 PID 2788 wrote to memory of 3044 2788 WScript.exe 31 PID 2788 wrote to memory of 3044 2788 WScript.exe 31 PID 2788 wrote to memory of 3044 2788 WScript.exe 31 PID 2788 wrote to memory of 3044 2788 WScript.exe 31 PID 3044 wrote to memory of 2664 3044 cmd.exe 33 PID 3044 wrote to memory of 2664 3044 cmd.exe 33 PID 3044 wrote to memory of 2664 3044 cmd.exe 33 PID 3044 wrote to memory of 2664 3044 cmd.exe 33 PID 2664 wrote to memory of 2660 2664 DllCommonsvc.exe 89 PID 2664 wrote to memory of 2660 2664 DllCommonsvc.exe 89 PID 2664 wrote to memory of 2660 2664 DllCommonsvc.exe 89 PID 2664 wrote to memory of 2768 2664 DllCommonsvc.exe 90 PID 2664 wrote to memory of 2768 2664 DllCommonsvc.exe 90 PID 2664 wrote to memory of 2768 2664 DllCommonsvc.exe 90 PID 2664 wrote to memory of 2684 2664 DllCommonsvc.exe 91 PID 2664 wrote to memory of 2684 2664 DllCommonsvc.exe 91 PID 2664 wrote to memory of 2684 2664 DllCommonsvc.exe 91 PID 2664 wrote to memory of 2680 2664 DllCommonsvc.exe 93 PID 2664 wrote to memory of 2680 2664 DllCommonsvc.exe 93 PID 2664 wrote to memory of 2680 2664 DllCommonsvc.exe 93 PID 2664 wrote to memory of 2800 2664 DllCommonsvc.exe 94 PID 2664 wrote to memory of 2800 2664 DllCommonsvc.exe 94 PID 2664 wrote to memory of 2800 2664 DllCommonsvc.exe 94 PID 2664 wrote to memory of 2252 2664 DllCommonsvc.exe 95 PID 2664 wrote to memory of 2252 2664 DllCommonsvc.exe 95 PID 2664 wrote to memory of 2252 2664 DllCommonsvc.exe 95 PID 2664 wrote to memory of 2932 2664 DllCommonsvc.exe 97 PID 2664 wrote to memory of 2932 2664 DllCommonsvc.exe 97 PID 2664 wrote to memory of 2932 2664 DllCommonsvc.exe 97 PID 2664 wrote to memory of 820 2664 DllCommonsvc.exe 98 PID 2664 wrote to memory of 820 2664 DllCommonsvc.exe 98 PID 2664 wrote to memory of 820 2664 DllCommonsvc.exe 98 PID 2664 wrote to memory of 1920 2664 DllCommonsvc.exe 100 PID 2664 wrote to memory of 1920 2664 DllCommonsvc.exe 100 PID 2664 wrote to memory of 1920 2664 DllCommonsvc.exe 100 PID 2664 wrote to memory of 1036 2664 DllCommonsvc.exe 102 PID 2664 wrote to memory of 1036 2664 DllCommonsvc.exe 102 PID 2664 wrote to memory of 1036 2664 DllCommonsvc.exe 102 PID 2664 wrote to memory of 2336 2664 DllCommonsvc.exe 104 PID 2664 wrote to memory of 2336 2664 DllCommonsvc.exe 104 PID 2664 wrote to memory of 2336 2664 DllCommonsvc.exe 104 PID 2664 wrote to memory of 2668 2664 DllCommonsvc.exe 106 PID 2664 wrote to memory of 2668 2664 DllCommonsvc.exe 106 PID 2664 wrote to memory of 2668 2664 DllCommonsvc.exe 106 PID 2664 wrote to memory of 2344 2664 DllCommonsvc.exe 107 PID 2664 wrote to memory of 2344 2664 DllCommonsvc.exe 107 PID 2664 wrote to memory of 2344 2664 DllCommonsvc.exe 107 PID 2664 wrote to memory of 2996 2664 DllCommonsvc.exe 110 PID 2664 wrote to memory of 2996 2664 DllCommonsvc.exe 110 PID 2664 wrote to memory of 2996 2664 DllCommonsvc.exe 110 PID 2664 wrote to memory of 336 2664 DllCommonsvc.exe 111 PID 2664 wrote to memory of 336 2664 DllCommonsvc.exe 111 PID 2664 wrote to memory of 336 2664 DllCommonsvc.exe 111 PID 2664 wrote to memory of 980 2664 DllCommonsvc.exe 113 PID 2664 wrote to memory of 980 2664 DllCommonsvc.exe 113 PID 2664 wrote to memory of 980 2664 DllCommonsvc.exe 113 PID 2664 wrote to memory of 432 2664 DllCommonsvc.exe 114 PID 2664 wrote to memory of 432 2664 DllCommonsvc.exe 114 PID 2664 wrote to memory of 432 2664 DllCommonsvc.exe 114 PID 2664 wrote to memory of 1612 2664 DllCommonsvc.exe 115 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c30e9d648579aa65b9ef36bfa72baa131269c3c5c32fb841108a43d29b26f49.exe"C:\Users\Admin\AppData\Local\Temp\4c30e9d648579aa65b9ef36bfa72baa131269c3c5c32fb841108a43d29b26f49.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\providercommon\1zu9dW.bat" "3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\providercommon\DllCommonsvc.exe"C:\providercommon\DllCommonsvc.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2660
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\System.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2768
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Globalization\Sorting\lsm.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2684
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\audiodg.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2680
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Setup\State\sppsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2800
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\dwm.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2252
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Sidebar\es-ES\cmd.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2932
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\audiodg.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:820
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default User\DllCommonsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1920
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\NetHood\OSPPSVC.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1036
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\L2Schemas\WmiPrvSE.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2336
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\smss.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2668
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\All Users\Microsoft\Network\Connections\wininit.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2344
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Google\Temp\lsm.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2996
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\My Documents\lsm.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:336
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\Downloads\conhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:980
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Microsoft Office\Templates\Presentation Designs\cmd.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:432
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\All Users\audiodg.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1612
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\7-Zip\Lang\audiodg.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2704
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\hyrzEnCNwb.bat"5⤵PID:2004
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:1120
-
-
C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\audiodg.exe"C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\audiodg.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2404 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\n9GQh003RW.bat"7⤵PID:2132
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:28⤵PID:820
-
-
C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\audiodg.exe"C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\audiodg.exe"8⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2152 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\sWs9jrlB8v.bat"9⤵PID:1000
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:210⤵PID:1568
-
-
C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\audiodg.exe"C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\audiodg.exe"10⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2780 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\KteTxDTZHh.bat"11⤵PID:2500
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:212⤵PID:2940
-
-
C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\audiodg.exe"C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\audiodg.exe"12⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1668 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\rjauxUKpXQ.bat"13⤵PID:1996
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:214⤵PID:520
-
-
C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\audiodg.exe"C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\audiodg.exe"14⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:904 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\cYhs0sn2L6.bat"15⤵PID:1568
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:216⤵PID:2524
-
-
C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\audiodg.exe"C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\audiodg.exe"16⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2620 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\4rzlnKig63.bat"17⤵PID:2268
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:218⤵PID:2316
-
-
C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\audiodg.exe"C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\audiodg.exe"18⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1088 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\XIQ15LoDrx.bat"19⤵PID:2084
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:220⤵PID:2624
-
-
C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\audiodg.exe"C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\audiodg.exe"20⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2696
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 5 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2616
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2940
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 10 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1612
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 11 /tr "'C:\Windows\Globalization\Sorting\lsm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:548
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Windows\Globalization\Sorting\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2224
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 14 /tr "'C:\Windows\Globalization\Sorting\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2196
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 6 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\audiodg.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:760
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2604
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 12 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3000
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 8 /tr "'C:\Windows\Setup\State\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:592
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Windows\Setup\State\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1760
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 11 /tr "'C:\Windows\Setup\State\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1260
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 13 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\dwm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2936
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3036
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 14 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1460
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 11 /tr "'C:\Program Files\Windows Sidebar\es-ES\cmd.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1964
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Program Files\Windows Sidebar\es-ES\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1668
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Sidebar\es-ES\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2136
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 8 /tr "'C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\audiodg.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:264
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1904
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2452
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "DllCommonsvcD" /sc MINUTE /mo 7 /tr "'C:\Users\Default User\DllCommonsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2152
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "DllCommonsvc" /sc ONLOGON /tr "'C:\Users\Default User\DllCommonsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2356
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "DllCommonsvcD" /sc MINUTE /mo 9 /tr "'C:\Users\Default User\DllCommonsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2508
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 10 /tr "'C:\Users\Admin\NetHood\OSPPSVC.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2468
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Users\Admin\NetHood\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2444
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 7 /tr "'C:\Users\Admin\NetHood\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2192
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 10 /tr "'C:\Windows\L2Schemas\WmiPrvSE.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1608
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Windows\L2Schemas\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:872
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 14 /tr "'C:\Windows\L2Schemas\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:880
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 11 /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:952
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2524
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 12 /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2028
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 5 /tr "'C:\Users\All Users\Microsoft\Network\Connections\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1952
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Users\All Users\Microsoft\Network\Connections\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1292
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 6 /tr "'C:\Users\All Users\Microsoft\Network\Connections\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:648
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Google\Temp\lsm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3004
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Program Files (x86)\Google\Temp\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1852
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Google\Temp\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:328
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 8 /tr "'C:\Users\Admin\My Documents\lsm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2276
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Users\Admin\My Documents\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1304
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 12 /tr "'C:\Users\Admin\My Documents\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1784
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 12 /tr "'C:\Users\Default\Downloads\conhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1488
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Users\Default\Downloads\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2352
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 8 /tr "'C:\Users\Default\Downloads\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2300
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Microsoft Office\Templates\Presentation Designs\cmd.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1316
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Office\Templates\Presentation Designs\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2332
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Microsoft Office\Templates\Presentation Designs\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2304
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 8 /tr "'C:\Users\All Users\audiodg.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1568
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Users\All Users\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2728
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 9 /tr "'C:\Users\All Users\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2872
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 12 /tr "'C:\Program Files\7-Zip\Lang\audiodg.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2760
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Program Files\7-Zip\Lang\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1972
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 7 /tr "'C:\Program Files\7-Zip\Lang\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2672
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5179bc0841bf3e00f34cc1a4f6a641cd9
SHA133b6e5b678b30c1ecdc14672278a0093c10dea75
SHA2566de974ec12371969741dacd26380a33e381449771ec981152e9cb5c3e1e06dea
SHA512aebf58ef53abf1c8305eea16286b050d933f8b4229372396f2aff3bb4dd8403bf8ecb9e6fcadca5889f41b3d69093c928c6ea9c9f0fc45351123a0853b1c763a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ae281da77d13ca4e11c48236a1458d9
SHA193e63a91eb0013285cea203a14e9413b059c56e4
SHA25685f0e20d3e9eaa1d44f9f8dae52393cb3b2cb6a54edb10ff130e76456b6c8b0f
SHA512bed2683253dd1628be3a63884b8bd70f8834e420e13ea1884a610f39c05b289f06fc3dca2ff0a74a486ee0121a160e0d546918fa7a9c6384240800eb111b8bf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c5626ad02244510f34924937ca0ecd9
SHA1f4d75f129916bbcfc914740d5c648f39cf1672e3
SHA25690911190e5bc0893d7523183aaf35a939cfe86539737ef8538b5e7ff13947740
SHA51259eb9c2a8dc2e0660c639ecc5479974d4ffea21b83f972c755c865a5d05f7ff2a753d3c1a05bea5518fa66913543a40e7e22edb52ff606720f559e431d571d5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ec5470096c6263fe4b575ff6885ce80
SHA1458abdb633a3a7ba73303f9d26f644865b1881ac
SHA2563d5442cf79193f57747782ddd39201ee1875c32afab99e213a560e830f8d8052
SHA5120b36c976990710b02a3a97f5a9d6ad9e67e25a9b7914764db3a73148126fa07e65f247c9a7d57064847c6492f8a0ac96427a7e12113ca5c75fa2b49c5b92a27d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c660c3e99616ae7aff9ba4d20ee99ffb
SHA1522472622c055e6cc606ca178e8aa5d56386e949
SHA25616563fc6007d37e21085fdf16a9773410f13c74411eda4827283e5c9cd234514
SHA5127db9ab6cc5369df49bf1c0aa99ea4525b956fb18a2af8277f668b5dd3bc694de1a1027c757999515a04b317129ab3137672900c7da24df3043b6c641a9c780f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54384594360105e13526dbc52629c9ec2
SHA1a8df5320af07d23068fba2c78410fbd3c75a7414
SHA25697e5e7fa625f487adfeafe92cbc014e02bdb58d235f357fef7eedeb6fdfc61cb
SHA512838296214cd406c85c165f39f0554d28dc57d1c2ac9a6a09da634c524f1dc9f30dfcee01e4b00d8a48ba0426b8e36624b70e6742a28e3406a9861158fc8d22ef
-
Filesize
225B
MD53391f52e0d91e6dcbd0e9ebbecc8462c
SHA17e1bdcc9303f7ee0fdf00e08f021151b545fe006
SHA256a36bc68a3df97c4b6700bd4c4d94ecf4ef01557c11b0e6ee2d99693f31bc6df0
SHA51272c94a530b20a6a3361734b14d7ff559000ec31a220255feda59d66942282dd45619356b1715ec90ef8891de6ded4bd3cbe967fb8de5a596859faf67790e18c0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
225B
MD57e350a3dbc046d23b16225b2243c0c37
SHA1f00a37a22a7313ef3185a97b52842516ae9f757e
SHA25619261c7ccc949823376b63fc9b2dd6d95b4f2e3414c6b2bf15db5b3ff8a4009f
SHA512380dcec3a7e56f2358f02f65680a479b0699b9ad3c1031c500fab72f5c0823ab3121a332a38037d3b0a0b89fc26f4916a24fa923b2560f62b3ef0607e93f216e
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
225B
MD5e5dae5f210a4a21adece8ea2f5a6f354
SHA1c280d60671f6372afa531129459a18285eecd45c
SHA25600cf59c0e7c3046ed0b0616d7eaab5e36123213ee4334462e2caa5ada82cce98
SHA512adaaa0841584cd55f9d9552f724c278392809f320108e18e66b12ae7003d3d69883128f565d0d63edaf1e33be700a17ee3f6b6d35e8dc6a0099058d7b0081a0d
-
Filesize
225B
MD5674f53b560e6dbcecefe3c761993fc45
SHA1aa30f7bc0f176ef7afa94e63e7585556447221ca
SHA256ab11d532481fcaac9a27b3fa6f7ff82d30dddbdc9e794bf43c99fb264d769c7d
SHA51255c2345b2c1b5cf99e2fd1c7e7666813a60f695453d485d807282c5d0ad5e72c8e89bdf7da6e8d2d59c26cfc1684469025462739b5a57eefe4c503fedd16762d
-
Filesize
225B
MD579bfd8cf442e8c521304ce89b1fc1d32
SHA1a247906bec0df7e727e5f64159a14a4d1103f145
SHA2562bfebc12c7d94f65fde553ab15d9be14f133a97c253fe83223a9f9ebdefb57b1
SHA5120b317feb6ba3e55bdb097acb61100143d37859fde107e191ebd3411d840c020265817ecae8530157dd32d4df7352cbeb1b04dc86b22ab245e29f0cd697a2e3ab
-
Filesize
225B
MD5f43ebedd91ea873f9fc0ae54f4286c13
SHA1c826c65dd8cecf7765efcaa3d7ac0e073481a4fd
SHA256df269080784461e0a2d0c52cec1039362236381ce2eb7faa3eb1abb7f395a205
SHA512b463a03c6123ace60cbdad24833bc22a971598cc641f99be52992aebc746c567aaf1dbbaee5ad4eeebeab86d9517ace94797db663e1568f16b77c699586d27ed
-
Filesize
225B
MD5aa3f580c378c3aefd4cb15cac7e98132
SHA132dc78756953f104bf559e2a855e687673838cb6
SHA2567c4748fe28143018391a1e88c7337a96a5928ca912b91c3effcd90c72484781d
SHA5123370ea9c5613310fa96ea50dcf81e435ae037e7dda76397d37aad632c3c8a107563bb7b2b004d7a9d7e55c728cadfe70d5b3d10084ecce7f4183d758d6d961af
-
Filesize
225B
MD5c68f7d3a4d27c26779a09aab5732dc12
SHA10fd06bb22933cd2023302c67b53087179fa33771
SHA2566f0af590b74f95a91963c3e82fbcaa8fd9a06834a911332568d53171496fabf7
SHA512588870d5d31cdc0659bce31a2dae1acb4a60d8b1b062527bc2fd49b170ff60dcac7f2eb692afccdecdc6215a53c6a9e38e3473965443f3b44dbfcb8cf7e6ee9f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD53fad5fb566a6c364ac8288110dc5848f
SHA103a7c5299c07b259306940a55f56451ee49a55d6
SHA25695ab67435d0c7ad562475d0c923e6b16683cb5ee221d9474f3cbe6cbbdb9bb50
SHA5126b1a3a7914ed917ef5ef0bb607bf5c75241524a9b7ed4de9c9f5e06a7fe4c2e9c8180d3b89dc523afa85de6d7fdb668b3eb6e87a73a028ffcd5e21daac74b767
-
Filesize
36B
MD56783c3ee07c7d151ceac57f1f9c8bed7
SHA117468f98f95bf504cc1f83c49e49a78526b3ea03
SHA2568ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322
SHA512c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
197B
MD58088241160261560a02c84025d107592
SHA1083121f7027557570994c9fc211df61730455bb5
SHA2562072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1
SHA51220d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478