Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-12-2024 18:25

General

  • Target

    JaffaCakes118_57ead80eb0d5a40d3f5d02e6b158ff015ab2b0b7ad2d75c03f5c83debb68d4f4.exe

  • Size

    1.3MB

  • MD5

    f07cef8d89eddbce1dc3336f6a762dd0

  • SHA1

    f513f06d0a505f8323d1309d4c974708167c3330

  • SHA256

    57ead80eb0d5a40d3f5d02e6b158ff015ab2b0b7ad2d75c03f5c83debb68d4f4

  • SHA512

    012669033bf79a23444af70ccc65f01c6eb0ddde59d70a1a080cd5f53da3d9c3d9b0eaa9f212884b46576e75f784ad0c11f1da33b451379ceca9440039e97d74

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 39 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 8 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 15 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Executes dropped EXE 13 IoCs
  • Loads dropped DLL 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 12 IoCs
  • Drops file in Program Files directory 7 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 39 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 28 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_57ead80eb0d5a40d3f5d02e6b158ff015ab2b0b7ad2d75c03f5c83debb68d4f4.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_57ead80eb0d5a40d3f5d02e6b158ff015ab2b0b7ad2d75c03f5c83debb68d4f4.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2380
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2356
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\providercommon\1zu9dW.bat" "
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2648
        • C:\providercommon\DllCommonsvc.exe
          "C:\providercommon\DllCommonsvc.exe"
          4⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3068
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:448
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\lsm.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2024
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Public\Music\Sample Music\smss.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2956
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\wininit.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2540
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\es-ES\audiodg.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3024
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\DllCommonsvc.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1156
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\taskhost.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:856
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\csrss.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1204
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Mail\WMIADAP.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1600
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\WMIADAP.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2484
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\4HzUfVZbmx.bat"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1000
            • C:\Windows\system32\w32tm.exe
              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
              6⤵
                PID:2720
              • C:\providercommon\DllCommonsvc.exe
                "C:\providercommon\DllCommonsvc.exe"
                6⤵
                • Executes dropped EXE
                • Drops file in Program Files directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:840
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'
                  7⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1860
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\VideoLAN\VLC\lua\modules\Idle.exe'
                  7⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2928
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\smss.exe'
                  7⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1436
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\services.exe'
                  7⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:600
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\csrss.exe'
                  7⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1424
                • C:\Program Files\VideoLAN\VLC\lua\modules\Idle.exe
                  "C:\Program Files\VideoLAN\VLC\lua\modules\Idle.exe"
                  7⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3060
                  • C:\Windows\System32\cmd.exe
                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\X8VSEkwS9E.bat"
                    8⤵
                      PID:2024
                      • C:\Windows\system32\w32tm.exe
                        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                        9⤵
                          PID:564
                        • C:\Program Files\VideoLAN\VLC\lua\modules\Idle.exe
                          "C:\Program Files\VideoLAN\VLC\lua\modules\Idle.exe"
                          9⤵
                          • Executes dropped EXE
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3020
                          • C:\Windows\System32\cmd.exe
                            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\3a8tNGcxSj.bat"
                            10⤵
                              PID:584
                              • C:\Windows\system32\w32tm.exe
                                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                11⤵
                                  PID:1180
                                • C:\Program Files\VideoLAN\VLC\lua\modules\Idle.exe
                                  "C:\Program Files\VideoLAN\VLC\lua\modules\Idle.exe"
                                  11⤵
                                  • Executes dropped EXE
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1376
                                  • C:\Windows\System32\cmd.exe
                                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\HD5NsnfB5C.bat"
                                    12⤵
                                      PID:2928
                                      • C:\Windows\system32\w32tm.exe
                                        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                        13⤵
                                          PID:572
                                        • C:\Program Files\VideoLAN\VLC\lua\modules\Idle.exe
                                          "C:\Program Files\VideoLAN\VLC\lua\modules\Idle.exe"
                                          13⤵
                                          • Executes dropped EXE
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:2644
                                          • C:\Windows\System32\cmd.exe
                                            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\VAhDAdBh8f.bat"
                                            14⤵
                                              PID:1568
                                              • C:\Windows\system32\w32tm.exe
                                                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                15⤵
                                                  PID:532
                                                • C:\Program Files\VideoLAN\VLC\lua\modules\Idle.exe
                                                  "C:\Program Files\VideoLAN\VLC\lua\modules\Idle.exe"
                                                  15⤵
                                                  • Executes dropped EXE
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:3008
                                                  • C:\Windows\System32\cmd.exe
                                                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ANE2RWndQ4.bat"
                                                    16⤵
                                                      PID:996
                                                      • C:\Windows\system32\w32tm.exe
                                                        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                        17⤵
                                                          PID:956
                                                        • C:\Program Files\VideoLAN\VLC\lua\modules\Idle.exe
                                                          "C:\Program Files\VideoLAN\VLC\lua\modules\Idle.exe"
                                                          17⤵
                                                          • Executes dropped EXE
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:3004
                                                          • C:\Windows\System32\cmd.exe
                                                            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\wRWwqJyPGw.bat"
                                                            18⤵
                                                              PID:2244
                                                              • C:\Windows\system32\w32tm.exe
                                                                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                19⤵
                                                                  PID:3056
                                                                • C:\Program Files\VideoLAN\VLC\lua\modules\Idle.exe
                                                                  "C:\Program Files\VideoLAN\VLC\lua\modules\Idle.exe"
                                                                  19⤵
                                                                  • Executes dropped EXE
                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:2380
                                                                  • C:\Windows\System32\cmd.exe
                                                                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Wqkq749RcZ.bat"
                                                                    20⤵
                                                                      PID:1244
                                                                      • C:\Windows\system32\w32tm.exe
                                                                        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                        21⤵
                                                                          PID:1988
                                                                        • C:\Program Files\VideoLAN\VLC\lua\modules\Idle.exe
                                                                          "C:\Program Files\VideoLAN\VLC\lua\modules\Idle.exe"
                                                                          21⤵
                                                                          • Executes dropped EXE
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:960
                                                                          • C:\Windows\System32\cmd.exe
                                                                            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\OS3CX563UF.bat"
                                                                            22⤵
                                                                              PID:2704
                                                                              • C:\Windows\system32\w32tm.exe
                                                                                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                23⤵
                                                                                  PID:1480
                                                                                • C:\Program Files\VideoLAN\VLC\lua\modules\Idle.exe
                                                                                  "C:\Program Files\VideoLAN\VLC\lua\modules\Idle.exe"
                                                                                  23⤵
                                                                                  • Executes dropped EXE
                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  PID:2580
                                                                                  • C:\Windows\System32\cmd.exe
                                                                                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\6M87tNVNy8.bat"
                                                                                    24⤵
                                                                                      PID:756
                                                                                      • C:\Windows\system32\w32tm.exe
                                                                                        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                        25⤵
                                                                                          PID:2804
                                                                                        • C:\Program Files\VideoLAN\VLC\lua\modules\Idle.exe
                                                                                          "C:\Program Files\VideoLAN\VLC\lua\modules\Idle.exe"
                                                                                          25⤵
                                                                                          • Executes dropped EXE
                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                          PID:2788
                                                                                          • C:\Windows\System32\cmd.exe
                                                                                            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\D9EGxcg3vT.bat"
                                                                                            26⤵
                                                                                              PID:2288
                                                                                              • C:\Windows\system32\w32tm.exe
                                                                                                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                                27⤵
                                                                                                  PID:2444
                                                                                                • C:\Program Files\VideoLAN\VLC\lua\modules\Idle.exe
                                                                                                  "C:\Program Files\VideoLAN\VLC\lua\modules\Idle.exe"
                                                                                                  27⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                  PID:1564
                                                                                                  • C:\Windows\System32\cmd.exe
                                                                                                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\mWzz7cjAeP.bat"
                                                                                                    28⤵
                                                                                                      PID:2172
                                                                                                      • C:\Windows\system32\w32tm.exe
                                                                                                        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                                        29⤵
                                                                                                          PID:2720
                                                • C:\Windows\system32\schtasks.exe
                                                  schtasks.exe /create /tn "lsml" /sc MINUTE /mo 9 /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\lsm.exe'" /f
                                                  1⤵
                                                  • Process spawned unexpected child process
                                                  • Scheduled Task/Job: Scheduled Task
                                                  PID:2592
                                                • C:\Windows\system32\schtasks.exe
                                                  schtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\lsm.exe'" /rl HIGHEST /f
                                                  1⤵
                                                  • Process spawned unexpected child process
                                                  • Scheduled Task/Job: Scheduled Task
                                                  PID:2768
                                                • C:\Windows\system32\schtasks.exe
                                                  schtasks.exe /create /tn "lsml" /sc MINUTE /mo 5 /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\lsm.exe'" /rl HIGHEST /f
                                                  1⤵
                                                  • Process spawned unexpected child process
                                                  • Scheduled Task/Job: Scheduled Task
                                                  PID:2692
                                                • C:\Windows\system32\schtasks.exe
                                                  schtasks.exe /create /tn "smsss" /sc MINUTE /mo 7 /tr "'C:\Users\Public\Music\Sample Music\smss.exe'" /f
                                                  1⤵
                                                  • Process spawned unexpected child process
                                                  • Scheduled Task/Job: Scheduled Task
                                                  PID:1912
                                                • C:\Windows\system32\schtasks.exe
                                                  schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Users\Public\Music\Sample Music\smss.exe'" /rl HIGHEST /f
                                                  1⤵
                                                  • Process spawned unexpected child process
                                                  • Scheduled Task/Job: Scheduled Task
                                                  PID:2576
                                                • C:\Windows\system32\schtasks.exe
                                                  schtasks.exe /create /tn "smsss" /sc MINUTE /mo 5 /tr "'C:\Users\Public\Music\Sample Music\smss.exe'" /rl HIGHEST /f
                                                  1⤵
                                                  • Process spawned unexpected child process
                                                  • Scheduled Task/Job: Scheduled Task
                                                  PID:2632
                                                • C:\Windows\system32\schtasks.exe
                                                  schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 11 /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\wininit.exe'" /f
                                                  1⤵
                                                  • Process spawned unexpected child process
                                                  • Scheduled Task/Job: Scheduled Task
                                                  PID:2836
                                                • C:\Windows\system32\schtasks.exe
                                                  schtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\wininit.exe'" /rl HIGHEST /f
                                                  1⤵
                                                  • Process spawned unexpected child process
                                                  • Scheduled Task/Job: Scheduled Task
                                                  PID:1220
                                                • C:\Windows\system32\schtasks.exe
                                                  schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 7 /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\wininit.exe'" /rl HIGHEST /f
                                                  1⤵
                                                  • Process spawned unexpected child process
                                                  • Scheduled Task/Job: Scheduled Task
                                                  PID:1472
                                                • C:\Windows\system32\schtasks.exe
                                                  schtasks.exe /create /tn "audiodga" /sc MINUTE /mo 5 /tr "'C:\Windows\es-ES\audiodg.exe'" /f
                                                  1⤵
                                                  • Process spawned unexpected child process
                                                  • Scheduled Task/Job: Scheduled Task
                                                  PID:2656
                                                • C:\Windows\system32\schtasks.exe
                                                  schtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Windows\es-ES\audiodg.exe'" /rl HIGHEST /f
                                                  1⤵
                                                  • Process spawned unexpected child process
                                                  • Scheduled Task/Job: Scheduled Task
                                                  PID:584
                                                • C:\Windows\system32\schtasks.exe
                                                  schtasks.exe /create /tn "audiodga" /sc MINUTE /mo 7 /tr "'C:\Windows\es-ES\audiodg.exe'" /rl HIGHEST /f
                                                  1⤵
                                                  • Process spawned unexpected child process
                                                  • Scheduled Task/Job: Scheduled Task
                                                  PID:1800
                                                • C:\Windows\system32\schtasks.exe
                                                  schtasks.exe /create /tn "DllCommonsvcD" /sc MINUTE /mo 12 /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\DllCommonsvc.exe'" /f
                                                  1⤵
                                                  • Process spawned unexpected child process
                                                  • Scheduled Task/Job: Scheduled Task
                                                  PID:1240
                                                • C:\Windows\system32\schtasks.exe
                                                  schtasks.exe /create /tn "DllCommonsvc" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\DllCommonsvc.exe'" /rl HIGHEST /f
                                                  1⤵
                                                  • Process spawned unexpected child process
                                                  • Scheduled Task/Job: Scheduled Task
                                                  PID:1888
                                                • C:\Windows\system32\schtasks.exe
                                                  schtasks.exe /create /tn "DllCommonsvcD" /sc MINUTE /mo 9 /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\DllCommonsvc.exe'" /rl HIGHEST /f
                                                  1⤵
                                                  • Process spawned unexpected child process
                                                  • Scheduled Task/Job: Scheduled Task
                                                  PID:320
                                                • C:\Windows\system32\schtasks.exe
                                                  schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 8 /tr "'C:\providercommon\taskhost.exe'" /f
                                                  1⤵
                                                  • Process spawned unexpected child process
                                                  • Scheduled Task/Job: Scheduled Task
                                                  PID:1916
                                                • C:\Windows\system32\schtasks.exe
                                                  schtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\providercommon\taskhost.exe'" /rl HIGHEST /f
                                                  1⤵
                                                  • Process spawned unexpected child process
                                                  • Scheduled Task/Job: Scheduled Task
                                                  PID:1952
                                                • C:\Windows\system32\schtasks.exe
                                                  schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 10 /tr "'C:\providercommon\taskhost.exe'" /rl HIGHEST /f
                                                  1⤵
                                                  • Process spawned unexpected child process
                                                  • Scheduled Task/Job: Scheduled Task
                                                  PID:2852
                                                • C:\Windows\system32\schtasks.exe
                                                  schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\csrss.exe'" /f
                                                  1⤵
                                                  • Process spawned unexpected child process
                                                  • Scheduled Task/Job: Scheduled Task
                                                  PID:1696
                                                • C:\Windows\system32\schtasks.exe
                                                  schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\csrss.exe'" /rl HIGHEST /f
                                                  1⤵
                                                  • Process spawned unexpected child process
                                                  • Scheduled Task/Job: Scheduled Task
                                                  PID:2732
                                                • C:\Windows\system32\schtasks.exe
                                                  schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 12 /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\csrss.exe'" /rl HIGHEST /f
                                                  1⤵
                                                  • Process spawned unexpected child process
                                                  • Scheduled Task/Job: Scheduled Task
                                                  PID:2856
                                                • C:\Windows\system32\schtasks.exe
                                                  schtasks.exe /create /tn "WMIADAPW" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Windows Mail\WMIADAP.exe'" /f
                                                  1⤵
                                                  • Process spawned unexpected child process
                                                  • Scheduled Task/Job: Scheduled Task
                                                  PID:2192
                                                • C:\Windows\system32\schtasks.exe
                                                  schtasks.exe /create /tn "WMIADAP" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Mail\WMIADAP.exe'" /rl HIGHEST /f
                                                  1⤵
                                                  • Process spawned unexpected child process
                                                  • Scheduled Task/Job: Scheduled Task
                                                  PID:1300
                                                • C:\Windows\system32\schtasks.exe
                                                  schtasks.exe /create /tn "WMIADAPW" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows Mail\WMIADAP.exe'" /rl HIGHEST /f
                                                  1⤵
                                                  • Process spawned unexpected child process
                                                  • Scheduled Task/Job: Scheduled Task
                                                  PID:2392
                                                • C:\Windows\system32\schtasks.exe
                                                  schtasks.exe /create /tn "WMIADAPW" /sc MINUTE /mo 7 /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\WMIADAP.exe'" /f
                                                  1⤵
                                                  • Process spawned unexpected child process
                                                  • Scheduled Task/Job: Scheduled Task
                                                  PID:1268
                                                • C:\Windows\system32\schtasks.exe
                                                  schtasks.exe /create /tn "WMIADAP" /sc ONLOGON /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\WMIADAP.exe'" /rl HIGHEST /f
                                                  1⤵
                                                  • Process spawned unexpected child process
                                                  • Scheduled Task/Job: Scheduled Task
                                                  PID:1016
                                                • C:\Windows\system32\schtasks.exe
                                                  schtasks.exe /create /tn "WMIADAPW" /sc MINUTE /mo 9 /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\WMIADAP.exe'" /rl HIGHEST /f
                                                  1⤵
                                                  • Process spawned unexpected child process
                                                  • Scheduled Task/Job: Scheduled Task
                                                  PID:668
                                                • C:\Windows\system32\schtasks.exe
                                                  schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 9 /tr "'C:\Program Files\VideoLAN\VLC\lua\modules\Idle.exe'" /f
                                                  1⤵
                                                  • Process spawned unexpected child process
                                                  • Scheduled Task/Job: Scheduled Task
                                                  PID:2904
                                                • C:\Windows\system32\schtasks.exe
                                                  schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files\VideoLAN\VLC\lua\modules\Idle.exe'" /rl HIGHEST /f
                                                  1⤵
                                                  • Process spawned unexpected child process
                                                  • Scheduled Task/Job: Scheduled Task
                                                  PID:2580
                                                • C:\Windows\system32\schtasks.exe
                                                  schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 13 /tr "'C:\Program Files\VideoLAN\VLC\lua\modules\Idle.exe'" /rl HIGHEST /f
                                                  1⤵
                                                  • Process spawned unexpected child process
                                                  • Scheduled Task/Job: Scheduled Task
                                                  PID:2084
                                                • C:\Windows\system32\schtasks.exe
                                                  schtasks.exe /create /tn "smsss" /sc MINUTE /mo 14 /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\smss.exe'" /f
                                                  1⤵
                                                  • Process spawned unexpected child process
                                                  • Scheduled Task/Job: Scheduled Task
                                                  PID:1912
                                                • C:\Windows\system32\schtasks.exe
                                                  schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\smss.exe'" /rl HIGHEST /f
                                                  1⤵
                                                  • Process spawned unexpected child process
                                                  • Scheduled Task/Job: Scheduled Task
                                                  PID:1524
                                                • C:\Windows\system32\schtasks.exe
                                                  schtasks.exe /create /tn "smsss" /sc MINUTE /mo 12 /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\smss.exe'" /rl HIGHEST /f
                                                  1⤵
                                                  • Process spawned unexpected child process
                                                  • Scheduled Task/Job: Scheduled Task
                                                  PID:1512
                                                • C:\Windows\system32\schtasks.exe
                                                  schtasks.exe /create /tn "servicess" /sc MINUTE /mo 10 /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\services.exe'" /f
                                                  1⤵
                                                  • Process spawned unexpected child process
                                                  • Scheduled Task/Job: Scheduled Task
                                                  PID:2032
                                                • C:\Windows\system32\schtasks.exe
                                                  schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\services.exe'" /rl HIGHEST /f
                                                  1⤵
                                                  • Process spawned unexpected child process
                                                  • Scheduled Task/Job: Scheduled Task
                                                  PID:2532
                                                • C:\Windows\system32\schtasks.exe
                                                  schtasks.exe /create /tn "servicess" /sc MINUTE /mo 12 /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\services.exe'" /rl HIGHEST /f
                                                  1⤵
                                                  • Process spawned unexpected child process
                                                  • Scheduled Task/Job: Scheduled Task
                                                  PID:2148
                                                • C:\Windows\system32\schtasks.exe
                                                  schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\csrss.exe'" /f
                                                  1⤵
                                                  • Process spawned unexpected child process
                                                  • Scheduled Task/Job: Scheduled Task
                                                  PID:1888
                                                • C:\Windows\system32\schtasks.exe
                                                  schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\csrss.exe'" /rl HIGHEST /f
                                                  1⤵
                                                  • Process spawned unexpected child process
                                                  • Scheduled Task/Job: Scheduled Task
                                                  PID:884
                                                • C:\Windows\system32\schtasks.exe
                                                  schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\csrss.exe'" /rl HIGHEST /f
                                                  1⤵
                                                  • Process spawned unexpected child process
                                                  • Scheduled Task/Job: Scheduled Task
                                                  PID:2112

                                                Network

                                                MITRE ATT&CK Enterprise v15

                                                Replay Monitor

                                                Loading Replay Monitor...

                                                Downloads

                                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                  Filesize

                                                  342B

                                                  MD5

                                                  b872020b108390e9e886f425869a59d7

                                                  SHA1

                                                  887b3a23e840891f4a0ebd3b5302008c24a2cc5a

                                                  SHA256

                                                  4939bb9a0d4fb6defd616aa39e6c5c6df8dd981d7ba2417616fb2a5c5cf1b5eb

                                                  SHA512

                                                  b39212caf1e6e8cc0f5153d034d54f34d8eda572dad2d82da84d04581de8b0220ef6b058c8e427089ebeee2656c7560f9bece8747b95946da2bc9e3584fc430e

                                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                  Filesize

                                                  342B

                                                  MD5

                                                  0cf08d8db9a5f8102480f40d9c4ef2f5

                                                  SHA1

                                                  2916eab733216cc87934570168b7e848f176fc84

                                                  SHA256

                                                  6488e28acbd7eda1c7de73d9564309d3ed4eeb1c479b14805d8a25672b7496ed

                                                  SHA512

                                                  96d93ad45eec0f73a82a6d82045c2bb84b65b66a68e51ea21b4e52850dd39ce4a18e7c0ba90cd5f2ebdb394e64b7c1b7eb8c0a0df1237c42b386c500e062cad7

                                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                  Filesize

                                                  342B

                                                  MD5

                                                  437a3264dc21955232c9bca8c3d6ecf1

                                                  SHA1

                                                  390ed283eb0773585bc5987a6626d20995db62f7

                                                  SHA256

                                                  82a10b489300206319d798de6fd19422a34a9058cd26a865390a1ea00e20bbbe

                                                  SHA512

                                                  39b9f0ebeccfd8a9700299bea3d8d0dbd043d7fcbb0e91099b668c54caab805de2fdd70f6a687d8c7f34bd99ee57496893f00e699c0305c3f5ae18c9ae820de2

                                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                  Filesize

                                                  342B

                                                  MD5

                                                  787fe511747c6e16e283bbc99700035c

                                                  SHA1

                                                  78a16a16e8ca49c21109dd3ffdca9b58ca1377a7

                                                  SHA256

                                                  283bd388b976a74c368b11686874d1403f3f39433a913942da5ef417e993e5d2

                                                  SHA512

                                                  80ca750ea0acfe4ca98870502042b43dea6795920e7e92e1e0d0f28f1e30419dfc337d5a4c542b7c20e863f05133ea7723fd8d47b7cafa7db0360af43729e771

                                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                  Filesize

                                                  342B

                                                  MD5

                                                  7a8b384e8d7cc42cb019f5ebcaf899d3

                                                  SHA1

                                                  dd002dead2a176cb0c696d3ceb7d423e6469c674

                                                  SHA256

                                                  f6e3cc9872c09cc152fcbc43ba5a4a861994a8c339cfae28360ecdd5813bc008

                                                  SHA512

                                                  9da54b07547b24a9152a80abfbfee60effaa9066e3af7b7d880eae0a760a19bb9e58a0064e55aff0430aef3bd5969ee9bc7d7204fd779a2820bc0cb00c2a39e1

                                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                  Filesize

                                                  342B

                                                  MD5

                                                  3174412f72e6139cbf880a6d04c0b3e4

                                                  SHA1

                                                  4ef88794e0c40dd08aea626a6c05acce4570203b

                                                  SHA256

                                                  d45b475adfdd071d22801f44811362a6be3c178b8e9af9b3392cfbfd4d65a0e4

                                                  SHA512

                                                  677eb1a505f666bcd6e08b793a9af1da54b5ef0d90064da98bb88ddad83bc6692c17236cc2523bf3b16eccf44b25f409df229e257857e4d7c461702506a985ab

                                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                  Filesize

                                                  342B

                                                  MD5

                                                  a89bc84ad22fb32597bbf79ba681bde1

                                                  SHA1

                                                  924e59701e98b61b2ea9520f4e623046fa936890

                                                  SHA256

                                                  e6d34ca83495d409539660e962e7cd84e9145dec190cdd640ada47e1b2356efd

                                                  SHA512

                                                  370ce93b5367a6a3ec9a0adcfe95ca32ce4bf9ba05ae9ff5f91f889e14323978c9bd4655ec3b255517593d4ee25521115d4db86f6c1f13cdf47e7607fb8d6189

                                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                  Filesize

                                                  342B

                                                  MD5

                                                  7440851dee6f25daf571dd3906b17f0d

                                                  SHA1

                                                  92c7ea70fa365a1254ce7029e025b183ee8bf484

                                                  SHA256

                                                  2245dd9988daeb6d97578ded4b920ac8d7d93497d8230b9f72aaefd21d307d7d

                                                  SHA512

                                                  ec23aec1454674d961e5b9dba4aa29f20b4f42c434d66a56cac3bb3c92e9bb133c07f43b46dd4eeee5178e617300c9ece2b017abe7b77da678242b251e150021

                                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                  Filesize

                                                  342B

                                                  MD5

                                                  8925ce31244857daabae83c4c7fdab08

                                                  SHA1

                                                  7ac41042fa9d39bfe024ceeff2ad6110263f1e62

                                                  SHA256

                                                  1d6436159613a930224b46a27d1129be57d1af3b6ad5d34fc3266b4acaab598b

                                                  SHA512

                                                  c61998698ce38de4c0d26ef06df49aa4e46a8fbd3788ed2e6127078fb658a13a2e1d6ed5776ac2e0b5a2da078d132921d7eee6937728321c4b85777fcc8aeba8

                                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                  Filesize

                                                  342B

                                                  MD5

                                                  8ab623917d3d4347d97c489458607107

                                                  SHA1

                                                  e5defd286cfd975960af8ae059f33fff5bd04900

                                                  SHA256

                                                  3fdfce15910cd1b1d37536f49ff05a40fc60797660b56acb0fa47b5316ca9d10

                                                  SHA512

                                                  3b17cf6ee75794bae011f3f0e0b3dc3d23b9a41a028d6971fddb8faf717dece043007cc00ce9df7115562a4948bfb27339d5a24c452af366072016daf52b69d4

                                                • C:\Users\Admin\AppData\Local\Temp\3a8tNGcxSj.bat

                                                  Filesize

                                                  215B

                                                  MD5

                                                  b69c59a403882ad547488bc13486440e

                                                  SHA1

                                                  54a9a3e97381a9b39f7f82144cf4182078c21ff2

                                                  SHA256

                                                  247d43a026cf96b66a2c335980ae58aa441b292cbfad394dddcf994cfacee08d

                                                  SHA512

                                                  60724b7fb57e24ea3b45235cbde387a0d4f7761b7ddd678f89ef5446d0b74735c77172ab5a1134ac9a18c34e8bec56882695754adfc9d1b9857565c2a6aa64d8

                                                • C:\Users\Admin\AppData\Local\Temp\4HzUfVZbmx.bat

                                                  Filesize

                                                  199B

                                                  MD5

                                                  0eaa96ff1f5384bfeb0771fc8bb0add1

                                                  SHA1

                                                  97ee41ca43c6e53a45d14a715716e3e1cbc74133

                                                  SHA256

                                                  16aeaf461964f757ed07ce0733c7d05d2947fbb782a71b6c145655a23ff7549b

                                                  SHA512

                                                  23d18f6440bfa638eb8fe8485796d52fb69a34b57255abb89270fd2d6548e1439a79a5b166fa72d3301b5c4c7f436774f4941059a2bfaa18b7c9297f58517676

                                                • C:\Users\Admin\AppData\Local\Temp\6M87tNVNy8.bat

                                                  Filesize

                                                  215B

                                                  MD5

                                                  590940e3d50c0ff5fba8502cbf9a850e

                                                  SHA1

                                                  2b6dd215b989fb24d36c13efb2bc19d47f48c1e9

                                                  SHA256

                                                  c8625195e4c8c001f742bddd636adfd418062d90ecf4d0544815f5ad164b7c8c

                                                  SHA512

                                                  ddfaafd382de30764e921a860545182f2b30cb53f7ea2ead38bf07c9187ff011b41bd3bfbb48995f02a91a6bbcee8b02d857b55ebed83504dc5f97072773f857

                                                • C:\Users\Admin\AppData\Local\Temp\ANE2RWndQ4.bat

                                                  Filesize

                                                  215B

                                                  MD5

                                                  a518d857dd00ad476f73811edd8cbefe

                                                  SHA1

                                                  3d9aee91509b32525239a22d1d476baad92a5770

                                                  SHA256

                                                  e26836541c010ba93ab1ebd36523224cd026685aa14397d679dc48c454dadaeb

                                                  SHA512

                                                  e155334eebfc341bd42bf6128bde9fe517a1a2d95d5cb9e28ce80630470d1787fa19644a7d9265ce5dfe6d0600615ae17bd4a3d7541c53cd9fc22a61ae9e9274

                                                • C:\Users\Admin\AppData\Local\Temp\Cab28D7.tmp

                                                  Filesize

                                                  70KB

                                                  MD5

                                                  49aebf8cbd62d92ac215b2923fb1b9f5

                                                  SHA1

                                                  1723be06719828dda65ad804298d0431f6aff976

                                                  SHA256

                                                  b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                                  SHA512

                                                  bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                                                • C:\Users\Admin\AppData\Local\Temp\D9EGxcg3vT.bat

                                                  Filesize

                                                  215B

                                                  MD5

                                                  b839d82af65b1b61d176fb8624656fce

                                                  SHA1

                                                  082b553a7932322a1dc53974b6525037dd919251

                                                  SHA256

                                                  c0e1659483a6a764f24064374d8edee342c1a7df6a1f000e44e84e8f606e248c

                                                  SHA512

                                                  f3aeb1bf9802d26625486113e5b2268d6be8732a3f443637e95aa952108f08aefac107406f2ec3488e4bc4ef0a360fc39418eba176e92e8e8bc3c31a37f880eb

                                                • C:\Users\Admin\AppData\Local\Temp\HD5NsnfB5C.bat

                                                  Filesize

                                                  215B

                                                  MD5

                                                  e8bfb33384bed38c2dda27b014a0ecd5

                                                  SHA1

                                                  56a7d618d92c5ecd65a9973539d1f089b2f0ece2

                                                  SHA256

                                                  f069505d9b51655656cbbeab4a542b91c1aed60bd20d6ef1c18dc3f9029e6d4e

                                                  SHA512

                                                  c7fb192b6421c3a982a21770641029b38a5abeef2b65a6d754dd025e15617de7e34ec2342a4ab5c1147f3f733f270a1e116ca5f821cff9081282295a5318af0b

                                                • C:\Users\Admin\AppData\Local\Temp\OS3CX563UF.bat

                                                  Filesize

                                                  215B

                                                  MD5

                                                  208708fd6077e1ebbee0fe6dc70d10ff

                                                  SHA1

                                                  936a6fea8b11fdb4ab0e2f49b0274c642e33a251

                                                  SHA256

                                                  19f0e01f93e569324de8d0b0379c5ece39463691f241460c18964846e62d9ac2

                                                  SHA512

                                                  00bdd6acd8ad94f9ede95caa7d6b4b968497a8e4676232ad0f641bf49e63556c3eea25d9df812f108bcfc365bd5aa36d4604bb853f53e76b32c9f9bfad2c7a83

                                                • C:\Users\Admin\AppData\Local\Temp\Tar28F9.tmp

                                                  Filesize

                                                  181KB

                                                  MD5

                                                  4ea6026cf93ec6338144661bf1202cd1

                                                  SHA1

                                                  a1dec9044f750ad887935a01430bf49322fbdcb7

                                                  SHA256

                                                  8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                                  SHA512

                                                  6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                                                • C:\Users\Admin\AppData\Local\Temp\VAhDAdBh8f.bat

                                                  Filesize

                                                  215B

                                                  MD5

                                                  cb22ffc3999c31887ee075e6def9cf45

                                                  SHA1

                                                  859429975668646dcdfe9a5454c2c1edcb356571

                                                  SHA256

                                                  44595b2e2d23131293a8793d629649a04dbfe979e8cad9493417d41584dbea53

                                                  SHA512

                                                  dccc06fd8fca92fe21dbcb772fe28aeefa9c18439ba6b2137fc1f9eadc072e372a7997ab06996709fdc590c6948559600ef6126692b94b04660bd9286f35bd98

                                                • C:\Users\Admin\AppData\Local\Temp\Wqkq749RcZ.bat

                                                  Filesize

                                                  215B

                                                  MD5

                                                  c06f0a15074dd76651766f17a056b7fa

                                                  SHA1

                                                  64100a97c3f70d3a975670d6f08fce2be5857603

                                                  SHA256

                                                  00762727554d334b1c804447e3c526c94d56b97c7139a8b5c9082db9080b2350

                                                  SHA512

                                                  4df24ae7925695693585ad77b2a2c313b470bda309502864b1856110819b9565a6957d224e3e3446ac70ea62edbc8f15120187333dcbbc6e3621b1779596b04b

                                                • C:\Users\Admin\AppData\Local\Temp\X8VSEkwS9E.bat

                                                  Filesize

                                                  215B

                                                  MD5

                                                  22eefcb2db8fcf39aeb52a4885a798b1

                                                  SHA1

                                                  2a4b5e9c1a0656e4c6e0cb7e9285bd1ca26e9071

                                                  SHA256

                                                  39e3bf01242d7db68c70afbc5535f62385b4d0361191f9650958973aaa56e307

                                                  SHA512

                                                  cd7647dba74cb404188cfbe5d25b613772fd4fa5579d17f14ad00f53c0ad7b2c292eefd312add82d525ca44b5b2261a12a30c5473a37d6cbaac05322b57faf4f

                                                • C:\Users\Admin\AppData\Local\Temp\mWzz7cjAeP.bat

                                                  Filesize

                                                  215B

                                                  MD5

                                                  4143d24bb9e388e2f0fd836ba2ba0350

                                                  SHA1

                                                  daf3d9be78ae664bcd179ca1bf3a84261ab56a7e

                                                  SHA256

                                                  dad3e501950dc712f6160e4f9a9f7d9393126352c92d72d0f473313017c0bed4

                                                  SHA512

                                                  6b6dc424ef27554faec540a9a24be188a2955d589c2a641515f924311e2330f8de18d8e05305c1310b288613ce8a829684608e25e79d84e8728166ddb5cb7b5d

                                                • C:\Users\Admin\AppData\Local\Temp\wRWwqJyPGw.bat

                                                  Filesize

                                                  215B

                                                  MD5

                                                  e8e8968bd18e7b7c504d21407638ae88

                                                  SHA1

                                                  ed05c7af0d0ed475a4e8064a2a701fd1caa75a52

                                                  SHA256

                                                  4105f88c3f3b9bb147de202852b5cbe8c462bb7af6a4147f96065a62897e37b3

                                                  SHA512

                                                  981eedd8047fa2248716c6160d28f083733fb3e4424d2abf1418d9bd0f4f966141433fffe60b72f25293906316a555012ab45c0001a1a3caab814d0071e94694

                                                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                  Filesize

                                                  7KB

                                                  MD5

                                                  d3b58d7358ee9e2dd5f1e57b5ceab4dc

                                                  SHA1

                                                  a6fd3f80ed1bc58004d6b5077f31043760836821

                                                  SHA256

                                                  67c90c11061c0c7c19109055d90b8ac7b164ed1cb1867112ba0d336f4ac40891

                                                  SHA512

                                                  92f6a0f50d3cd90d4d7b18ecaace2f289905232611220766e0412855d4e2f10835edd976f641020219b0bad587d8fa49191eb90dfac5127acb0d6497293c8997

                                                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                  Filesize

                                                  7KB

                                                  MD5

                                                  b6604720e5b1cfafa09072340861bed6

                                                  SHA1

                                                  522f6038bc4fdba597d6fbf3814ca58380f7ce08

                                                  SHA256

                                                  0cc2a1b55aa50dff3b479fda17d849b7749d7bb02af9ca328f0732550cb62c5b

                                                  SHA512

                                                  1de5d5db30ac66261fa7ee9d579bce30e24684f2f5041a7c3cde63e18ef0cc6eaee7271ccbd729c763158e13c75c0e972b1b56b8d99837a1e1093dfb87d93cc7

                                                • C:\providercommon\1zu9dW.bat

                                                  Filesize

                                                  36B

                                                  MD5

                                                  6783c3ee07c7d151ceac57f1f9c8bed7

                                                  SHA1

                                                  17468f98f95bf504cc1f83c49e49a78526b3ea03

                                                  SHA256

                                                  8ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322

                                                  SHA512

                                                  c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8

                                                • C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe

                                                  Filesize

                                                  197B

                                                  MD5

                                                  8088241160261560a02c84025d107592

                                                  SHA1

                                                  083121f7027557570994c9fc211df61730455bb5

                                                  SHA256

                                                  2072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1

                                                  SHA512

                                                  20d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478

                                                • \providercommon\DllCommonsvc.exe

                                                  Filesize

                                                  1.0MB

                                                  MD5

                                                  bd31e94b4143c4ce49c17d3af46bcad0

                                                  SHA1

                                                  f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                                  SHA256

                                                  b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                                  SHA512

                                                  f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                                • memory/840-93-0x00000000008F0000-0x0000000000A00000-memory.dmp

                                                  Filesize

                                                  1.1MB

                                                • memory/960-554-0x00000000002C0000-0x00000000002D2000-memory.dmp

                                                  Filesize

                                                  72KB

                                                • memory/1204-91-0x00000000027E0000-0x00000000027E8000-memory.dmp

                                                  Filesize

                                                  32KB

                                                • memory/1376-256-0x0000000000150000-0x0000000000162000-memory.dmp

                                                  Filesize

                                                  72KB

                                                • memory/1376-255-0x0000000000A40000-0x0000000000B50000-memory.dmp

                                                  Filesize

                                                  1.1MB

                                                • memory/1564-732-0x00000000001A0000-0x00000000002B0000-memory.dmp

                                                  Filesize

                                                  1.1MB

                                                • memory/1860-113-0x000000001B650000-0x000000001B932000-memory.dmp

                                                  Filesize

                                                  2.9MB

                                                • memory/1860-122-0x0000000001FF0000-0x0000000001FF8000-memory.dmp

                                                  Filesize

                                                  32KB

                                                • memory/2380-494-0x0000000000530000-0x0000000000542000-memory.dmp

                                                  Filesize

                                                  72KB

                                                • memory/2484-57-0x000000001B6E0000-0x000000001B9C2000-memory.dmp

                                                  Filesize

                                                  2.9MB

                                                • memory/2644-316-0x00000000012C0000-0x00000000013D0000-memory.dmp

                                                  Filesize

                                                  1.1MB

                                                • memory/3020-195-0x0000000000140000-0x0000000000250000-memory.dmp

                                                  Filesize

                                                  1.1MB

                                                • memory/3060-115-0x00000000010C0000-0x00000000011D0000-memory.dmp

                                                  Filesize

                                                  1.1MB

                                                • memory/3068-16-0x0000000000600000-0x000000000060C000-memory.dmp

                                                  Filesize

                                                  48KB

                                                • memory/3068-15-0x00000000005F0000-0x00000000005FC000-memory.dmp

                                                  Filesize

                                                  48KB

                                                • memory/3068-17-0x0000000000610000-0x000000000061C000-memory.dmp

                                                  Filesize

                                                  48KB

                                                • memory/3068-14-0x00000000005E0000-0x00000000005F2000-memory.dmp

                                                  Filesize

                                                  72KB

                                                • memory/3068-13-0x0000000000350000-0x0000000000460000-memory.dmp

                                                  Filesize

                                                  1.1MB