Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22/12/2024, 02:40
Behavioral task
behavioral1
Sample
JaffaCakes118_4c3d76d6aa809cb091bb86d11b906b48922b3b6a8ff36198cf9ae3b1b44567f2.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JaffaCakes118_4c3d76d6aa809cb091bb86d11b906b48922b3b6a8ff36198cf9ae3b1b44567f2.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_4c3d76d6aa809cb091bb86d11b906b48922b3b6a8ff36198cf9ae3b1b44567f2.exe
-
Size
1.3MB
-
MD5
108bdb83f5f63d48a31e16595928911f
-
SHA1
785351352dcc0c8d961f7954c187d9a8d486a8ae
-
SHA256
4c3d76d6aa809cb091bb86d11b906b48922b3b6a8ff36198cf9ae3b1b44567f2
-
SHA512
27a05c8dfcb04a6a0d0f310bc5c7131a778edfaefacda0db21cf73d09317ee87a78ed7415f426dc4f586cf0e50686b3cf07420f1b22618258390aa9f730cde15
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 48 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2792 2608 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2832 2608 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2628 2608 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2656 2608 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2604 2608 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2644 2608 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2332 2608 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2460 2608 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 688 2608 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1708 2608 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2872 2608 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2860 2608 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1516 2608 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2840 2608 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2776 2608 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2136 2608 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 340 2608 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1640 2608 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2024 2608 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2984 2608 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1028 2608 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3004 2608 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2972 2608 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2244 2608 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2064 2608 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2056 2608 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2336 2608 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2176 2608 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2484 2608 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1036 2608 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2572 2608 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 708 2608 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1956 2608 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 804 2608 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 484 2608 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2568 2608 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 916 2608 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1660 2608 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 964 2608 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3064 2608 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3024 2608 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2524 2608 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1492 2608 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1500 2608 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1000 2608 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 900 2608 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1652 2608 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1692 2608 schtasks.exe 34 -
resource yara_rule behavioral1/files/0x00060000000191ad-9.dat dcrat behavioral1/memory/2692-13-0x0000000000B70000-0x0000000000C80000-memory.dmp dcrat behavioral1/memory/1624-56-0x0000000000C80000-0x0000000000D90000-memory.dmp dcrat behavioral1/memory/536-255-0x0000000000FF0000-0x0000000001100000-memory.dmp dcrat behavioral1/memory/2348-316-0x0000000001340000-0x0000000001450000-memory.dmp dcrat behavioral1/memory/1012-376-0x00000000013B0000-0x00000000014C0000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 17 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1756 powershell.exe 2168 powershell.exe 3036 powershell.exe 2544 powershell.exe 1716 powershell.exe 2232 powershell.exe 2344 powershell.exe 2000 powershell.exe 2384 powershell.exe 2276 powershell.exe 1564 powershell.exe 1592 powershell.exe 1960 powershell.exe 1324 powershell.exe 1596 powershell.exe 720 powershell.exe 2108 powershell.exe -
Executes dropped EXE 11 IoCs
pid Process 2692 DllCommonsvc.exe 1624 audiodg.exe 1492 audiodg.exe 536 audiodg.exe 2348 audiodg.exe 1012 audiodg.exe 1640 audiodg.exe 2316 audiodg.exe 1244 audiodg.exe 2408 audiodg.exe 644 audiodg.exe -
Loads dropped DLL 2 IoCs
pid Process 1852 cmd.exe 1852 cmd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 10 IoCs
flow ioc 4 raw.githubusercontent.com 9 raw.githubusercontent.com 13 raw.githubusercontent.com 20 raw.githubusercontent.com 26 raw.githubusercontent.com 29 raw.githubusercontent.com 32 raw.githubusercontent.com 5 raw.githubusercontent.com 16 raw.githubusercontent.com 23 raw.githubusercontent.com -
Drops file in Program Files directory 12 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Media Player\101b941d020240 DllCommonsvc.exe File created C:\Program Files\Internet Explorer\fr-FR\1610b97d3ab4a7 DllCommonsvc.exe File created C:\Program Files (x86)\Google\Temp\27d1bcfc3c54e0 DllCommonsvc.exe File created C:\Program Files (x86)\Windows Photo Viewer\en-US\services.exe DllCommonsvc.exe File created C:\Program Files (x86)\Windows Photo Viewer\en-US\c5b4cb5e9653cc DllCommonsvc.exe File created C:\Program Files\Windows Sidebar\lsass.exe DllCommonsvc.exe File created C:\Program Files\Windows Portable Devices\24dbde2999530e DllCommonsvc.exe File created C:\Program Files\Internet Explorer\fr-FR\OSPPSVC.exe DllCommonsvc.exe File created C:\Program Files (x86)\Google\Temp\System.exe DllCommonsvc.exe File created C:\Program Files\Windows Sidebar\6203df4a6bafc7 DllCommonsvc.exe File created C:\Program Files (x86)\Windows Media Player\lsm.exe DllCommonsvc.exe File created C:\Program Files\Windows Portable Devices\WmiPrvSE.exe DllCommonsvc.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\CSC\v2.0.6\dwm.exe DllCommonsvc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_4c3d76d6aa809cb091bb86d11b906b48922b3b6a8ff36198cf9ae3b1b44567f2.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 48 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2604 schtasks.exe 1708 schtasks.exe 964 schtasks.exe 1956 schtasks.exe 1660 schtasks.exe 3024 schtasks.exe 1492 schtasks.exe 2792 schtasks.exe 2332 schtasks.exe 2860 schtasks.exe 3004 schtasks.exe 2484 schtasks.exe 2568 schtasks.exe 2524 schtasks.exe 1652 schtasks.exe 1516 schtasks.exe 1640 schtasks.exe 2064 schtasks.exe 2336 schtasks.exe 2056 schtasks.exe 2176 schtasks.exe 1036 schtasks.exe 804 schtasks.exe 2832 schtasks.exe 2840 schtasks.exe 2136 schtasks.exe 2984 schtasks.exe 708 schtasks.exe 3064 schtasks.exe 900 schtasks.exe 2644 schtasks.exe 688 schtasks.exe 2872 schtasks.exe 340 schtasks.exe 2628 schtasks.exe 2024 schtasks.exe 1500 schtasks.exe 484 schtasks.exe 2776 schtasks.exe 2972 schtasks.exe 2244 schtasks.exe 2572 schtasks.exe 1000 schtasks.exe 1692 schtasks.exe 2656 schtasks.exe 2460 schtasks.exe 1028 schtasks.exe 916 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2692 DllCommonsvc.exe 2692 DllCommonsvc.exe 2692 DllCommonsvc.exe 2692 DllCommonsvc.exe 2692 DllCommonsvc.exe 1960 powershell.exe 1564 powershell.exe 2168 powershell.exe 2544 powershell.exe 1596 powershell.exe 2276 powershell.exe 1592 powershell.exe 720 powershell.exe 1716 powershell.exe 2384 powershell.exe 3036 powershell.exe 2108 powershell.exe 2000 powershell.exe 2232 powershell.exe 2344 powershell.exe 1756 powershell.exe 1624 audiodg.exe 1492 audiodg.exe 536 audiodg.exe 2348 audiodg.exe 1012 audiodg.exe 1640 audiodg.exe 2316 audiodg.exe 1244 audiodg.exe 2408 audiodg.exe 644 audiodg.exe -
Suspicious use of AdjustPrivilegeToken 27 IoCs
description pid Process Token: SeDebugPrivilege 2692 DllCommonsvc.exe Token: SeDebugPrivilege 1960 powershell.exe Token: SeDebugPrivilege 1564 powershell.exe Token: SeDebugPrivilege 2168 powershell.exe Token: SeDebugPrivilege 2544 powershell.exe Token: SeDebugPrivilege 1596 powershell.exe Token: SeDebugPrivilege 2276 powershell.exe Token: SeDebugPrivilege 1592 powershell.exe Token: SeDebugPrivilege 720 powershell.exe Token: SeDebugPrivilege 1716 powershell.exe Token: SeDebugPrivilege 2384 powershell.exe Token: SeDebugPrivilege 3036 powershell.exe Token: SeDebugPrivilege 2108 powershell.exe Token: SeDebugPrivilege 2000 powershell.exe Token: SeDebugPrivilege 2232 powershell.exe Token: SeDebugPrivilege 2344 powershell.exe Token: SeDebugPrivilege 1756 powershell.exe Token: SeDebugPrivilege 1624 audiodg.exe Token: SeDebugPrivilege 1492 audiodg.exe Token: SeDebugPrivilege 536 audiodg.exe Token: SeDebugPrivilege 2348 audiodg.exe Token: SeDebugPrivilege 1012 audiodg.exe Token: SeDebugPrivilege 1640 audiodg.exe Token: SeDebugPrivilege 2316 audiodg.exe Token: SeDebugPrivilege 1244 audiodg.exe Token: SeDebugPrivilege 2408 audiodg.exe Token: SeDebugPrivilege 644 audiodg.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2032 wrote to memory of 3020 2032 JaffaCakes118_4c3d76d6aa809cb091bb86d11b906b48922b3b6a8ff36198cf9ae3b1b44567f2.exe 30 PID 2032 wrote to memory of 3020 2032 JaffaCakes118_4c3d76d6aa809cb091bb86d11b906b48922b3b6a8ff36198cf9ae3b1b44567f2.exe 30 PID 2032 wrote to memory of 3020 2032 JaffaCakes118_4c3d76d6aa809cb091bb86d11b906b48922b3b6a8ff36198cf9ae3b1b44567f2.exe 30 PID 2032 wrote to memory of 3020 2032 JaffaCakes118_4c3d76d6aa809cb091bb86d11b906b48922b3b6a8ff36198cf9ae3b1b44567f2.exe 30 PID 3020 wrote to memory of 1852 3020 WScript.exe 31 PID 3020 wrote to memory of 1852 3020 WScript.exe 31 PID 3020 wrote to memory of 1852 3020 WScript.exe 31 PID 3020 wrote to memory of 1852 3020 WScript.exe 31 PID 1852 wrote to memory of 2692 1852 cmd.exe 33 PID 1852 wrote to memory of 2692 1852 cmd.exe 33 PID 1852 wrote to memory of 2692 1852 cmd.exe 33 PID 1852 wrote to memory of 2692 1852 cmd.exe 33 PID 2692 wrote to memory of 2276 2692 DllCommonsvc.exe 83 PID 2692 wrote to memory of 2276 2692 DllCommonsvc.exe 83 PID 2692 wrote to memory of 2276 2692 DllCommonsvc.exe 83 PID 2692 wrote to memory of 1756 2692 DllCommonsvc.exe 84 PID 2692 wrote to memory of 1756 2692 DllCommonsvc.exe 84 PID 2692 wrote to memory of 1756 2692 DllCommonsvc.exe 84 PID 2692 wrote to memory of 2544 2692 DllCommonsvc.exe 85 PID 2692 wrote to memory of 2544 2692 DllCommonsvc.exe 85 PID 2692 wrote to memory of 2544 2692 DllCommonsvc.exe 85 PID 2692 wrote to memory of 1324 2692 DllCommonsvc.exe 86 PID 2692 wrote to memory of 1324 2692 DllCommonsvc.exe 86 PID 2692 wrote to memory of 1324 2692 DllCommonsvc.exe 86 PID 2692 wrote to memory of 1564 2692 DllCommonsvc.exe 87 PID 2692 wrote to memory of 1564 2692 DllCommonsvc.exe 87 PID 2692 wrote to memory of 1564 2692 DllCommonsvc.exe 87 PID 2692 wrote to memory of 1596 2692 DllCommonsvc.exe 88 PID 2692 wrote to memory of 1596 2692 DllCommonsvc.exe 88 PID 2692 wrote to memory of 1596 2692 DllCommonsvc.exe 88 PID 2692 wrote to memory of 1716 2692 DllCommonsvc.exe 89 PID 2692 wrote to memory of 1716 2692 DllCommonsvc.exe 89 PID 2692 wrote to memory of 1716 2692 DllCommonsvc.exe 89 PID 2692 wrote to memory of 1592 2692 DllCommonsvc.exe 90 PID 2692 wrote to memory of 1592 2692 DllCommonsvc.exe 90 PID 2692 wrote to memory of 1592 2692 DllCommonsvc.exe 90 PID 2692 wrote to memory of 2168 2692 DllCommonsvc.exe 91 PID 2692 wrote to memory of 2168 2692 DllCommonsvc.exe 91 PID 2692 wrote to memory of 2168 2692 DllCommonsvc.exe 91 PID 2692 wrote to memory of 720 2692 DllCommonsvc.exe 92 PID 2692 wrote to memory of 720 2692 DllCommonsvc.exe 92 PID 2692 wrote to memory of 720 2692 DllCommonsvc.exe 92 PID 2692 wrote to memory of 2232 2692 DllCommonsvc.exe 93 PID 2692 wrote to memory of 2232 2692 DllCommonsvc.exe 93 PID 2692 wrote to memory of 2232 2692 DllCommonsvc.exe 93 PID 2692 wrote to memory of 3036 2692 DllCommonsvc.exe 94 PID 2692 wrote to memory of 3036 2692 DllCommonsvc.exe 94 PID 2692 wrote to memory of 3036 2692 DllCommonsvc.exe 94 PID 2692 wrote to memory of 1960 2692 DllCommonsvc.exe 95 PID 2692 wrote to memory of 1960 2692 DllCommonsvc.exe 95 PID 2692 wrote to memory of 1960 2692 DllCommonsvc.exe 95 PID 2692 wrote to memory of 2000 2692 DllCommonsvc.exe 96 PID 2692 wrote to memory of 2000 2692 DllCommonsvc.exe 96 PID 2692 wrote to memory of 2000 2692 DllCommonsvc.exe 96 PID 2692 wrote to memory of 2108 2692 DllCommonsvc.exe 97 PID 2692 wrote to memory of 2108 2692 DllCommonsvc.exe 97 PID 2692 wrote to memory of 2108 2692 DllCommonsvc.exe 97 PID 2692 wrote to memory of 2384 2692 DllCommonsvc.exe 98 PID 2692 wrote to memory of 2384 2692 DllCommonsvc.exe 98 PID 2692 wrote to memory of 2384 2692 DllCommonsvc.exe 98 PID 2692 wrote to memory of 2344 2692 DllCommonsvc.exe 100 PID 2692 wrote to memory of 2344 2692 DllCommonsvc.exe 100 PID 2692 wrote to memory of 2344 2692 DllCommonsvc.exe 100 PID 2692 wrote to memory of 1624 2692 DllCommonsvc.exe 117 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4c3d76d6aa809cb091bb86d11b906b48922b3b6a8ff36198cf9ae3b1b44567f2.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4c3d76d6aa809cb091bb86d11b906b48922b3b6a8ff36198cf9ae3b1b44567f2.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\providercommon\1zu9dW.bat" "3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\providercommon\DllCommonsvc.exe"C:\providercommon\DllCommonsvc.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2276
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\lsass.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1756
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Photo Viewer\en-US\services.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2544
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Sidebar\lsass.exe'5⤵
- Command and Scripting Interpreter: PowerShell
PID:1324
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default User\lsass.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1564
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\cmd.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1596
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\csrss.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1716
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Media Player\lsm.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1592
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Portable Devices\WmiPrvSE.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2168
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\Pictures\services.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:720
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default User\spoolsv.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2232
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\conhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3036
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\taskhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1960
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\audiodg.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2000
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Internet Explorer\fr-FR\OSPPSVC.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2108
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Google\Temp\System.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2384
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\Idle.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2344
-
-
C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\audiodg.exe"C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\audiodg.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1624 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\QOz0umrEhM.bat"6⤵PID:2872
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:27⤵PID:2588
-
-
C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\audiodg.exe"C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\audiodg.exe"7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1492 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\bo4ZIAkpMj.bat"8⤵PID:2312
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:29⤵PID:2460
-
-
C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\audiodg.exe"C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\audiodg.exe"9⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:536 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\HZWv28qLDz.bat"10⤵PID:1860
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:211⤵PID:2976
-
-
C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\audiodg.exe"C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\audiodg.exe"11⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2348 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\2RP5SY0RjS.bat"12⤵PID:1624
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:213⤵PID:1808
-
-
C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\audiodg.exe"C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\audiodg.exe"13⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1012 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\kp2dTY47HA.bat"14⤵PID:2624
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:215⤵PID:2832
-
-
C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\audiodg.exe"C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\audiodg.exe"15⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1640 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\s5uDoSCHZY.bat"16⤵PID:2392
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:217⤵PID:2936
-
-
C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\audiodg.exe"C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\audiodg.exe"17⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2316 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\lg1oIatdTn.bat"18⤵PID:1540
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:219⤵PID:1684
-
-
C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\audiodg.exe"C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\audiodg.exe"19⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1244 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ELjGFNzRMY.bat"20⤵PID:2536
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:221⤵PID:1864
-
-
C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\audiodg.exe"C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\audiodg.exe"21⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2408 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\eNTIt1NKYH.bat"22⤵PID:1912
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:223⤵PID:632
-
-
C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\audiodg.exe"C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\audiodg.exe"23⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:644
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 12 /tr "'C:\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2792
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2832
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2628
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Windows Photo Viewer\en-US\services.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2656
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Photo Viewer\en-US\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2604
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Windows Photo Viewer\en-US\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2644
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows Sidebar\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2332
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Program Files\Windows Sidebar\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2460
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 6 /tr "'C:\Program Files\Windows Sidebar\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:688
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 10 /tr "'C:\Users\Default User\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1708
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Users\Default User\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2872
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 13 /tr "'C:\Users\Default User\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2860
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 6 /tr "'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\cmd.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1516
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2840
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 12 /tr "'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2776
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2136
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:340
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1640
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Windows Media Player\lsm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2024
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Media Player\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2984
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Windows Media Player\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1028
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 7 /tr "'C:\Program Files\Windows Portable Devices\WmiPrvSE.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3004
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Program Files\Windows Portable Devices\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2972
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows Portable Devices\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2244
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 8 /tr "'C:\Users\Admin\Pictures\services.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2064
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Users\Admin\Pictures\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2056
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 13 /tr "'C:\Users\Admin\Pictures\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2336
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 14 /tr "'C:\Users\Default User\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2176
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Users\Default User\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2484
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 8 /tr "'C:\Users\Default User\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1036
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\conhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2572
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:708
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 7 /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1956
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 10 /tr "'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\taskhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:804
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:484
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 11 /tr "'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2568
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 14 /tr "'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\audiodg.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:916
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1660
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 8 /tr "'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:964
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 11 /tr "'C:\Program Files\Internet Explorer\fr-FR\OSPPSVC.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3064
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Program Files\Internet Explorer\fr-FR\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3024
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 5 /tr "'C:\Program Files\Internet Explorer\fr-FR\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2524
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Google\Temp\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1492
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Program Files (x86)\Google\Temp\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1500
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Google\Temp\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1000
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 5 /tr "'C:\Users\Admin\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:900
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Users\Admin\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1652
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 12 /tr "'C:\Users\Admin\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1692
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549c36152807623b272562ed866a746f9
SHA1af7b7c5d85f7c0b3339da88f555744339f07c48d
SHA256d2205e0112244a4b1489e7c0b4f1ced8285bbdc894bc3ba49ba0d5489d6cd4d7
SHA512ba38fcb944552ed02b4a33d90f67fe0e2ed917daea7d3c92b6880f50c733deb7598755b66f6f61864d2271c0bbd7c0309223fd2b125375f0c9735833e794414c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5532ce2f623341e4472919e87fab8c473
SHA1cf6a3ca9b03028305d734e0709829b06c7f57245
SHA2569bb3cee7d957216b416af69b1faf4e069d8795b9436a9896d5aaab645c48226b
SHA51213852130f07f8ce4fc0ae5bee28601edb594cd9e35199d1e2b20eea6f8f9669c713a7840eea4f9c1a30d9b7a5514c4ba53b62a20e52ff0da39d37c7941b166c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7cc8d386bdadc7def9071efec13aa85
SHA13c57daa4c198c1ce098b87b29c06bf24804ea6b3
SHA25634164225ce2c25bcbc23bcc82867794339d516214b9bc1b92bec2c1c71a652a9
SHA512f70b7ea912fe1b7c2d5e5b6b525e9126259ba877f63751cfb69ad5a46908fe88dea2a6f6ae19b8e30fb5b7a1db9101c016936bd0ab80e167cd477963e99bf2ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e633b0523fae14713be507f2d23a3621
SHA1727dfc32645325a421183386b3c4793ac97b6748
SHA25674a7cd2c7a76a730302f9410c04948ba4a6d0fac2421cd159a6da28e17394287
SHA512d0be7aa9df0f3c77ea710cf176f52d11a0daad8362347927178a4d05b3a94df0e9f90df01a5e4f0a59f7b640bf33a70e8e1c7341cdd172f2487e5fd55d7817e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5393b9c75a0c93ba0d4504909c3ad9727
SHA176a6777bc79af49ca88a7c3d0897a8c9a2503b32
SHA256c1ec98be0b8dd810ab604fa209022eb67248e9d64afaa3626edaae27d01f7429
SHA5123f085b020853052ff4c19edf8f5a19167d9694b5beac6cb2dfc6b4ea2c0636133f5c37270afd0cef9e5489df993295c551d647ad7f9818584c37a5b06afe10ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d056ab41183e6d99ffa1fab3d0b1ac6
SHA16de3c06504365c90bdfd14c57fe1b74467fcc666
SHA256387204d2a64d3e03fb1d0a2afb01152e88ca4f1624cec7193aa4d2baa1339489
SHA51231df078685e9e1d4bac2354bd4943c10addc958b73c1cac6e3847897e58bf8ddd6b57bd6f3c4cc7748e42d499502f5e251a343c6e07053124737fa7051b88b96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e317417185a600323abc5b53864cee4d
SHA1c56ed84dde1264a3ff73cfb4e8c2e8cbc97a5a4c
SHA256d840f4dd7203c51c10441e33f343da18bdf1cdc636402fb14a83325245d8485e
SHA512513bff74cd94ee53755fec3ac9460a6d0af3de77482f9c1f4ff777f3cc743fb41987763b02211e3516acfbbc23ffe8a0d4929779482f76ff2f3cb9a4be7b4834
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f108e3ea8db38ab1eeb2b0e3616dcffd
SHA162eb88ea13f9d601f9e246e7e22eae1f819b0648
SHA256672c2667fff2f3d4ddd99460a8663e3244837e16fa714dfebb266181b919b96c
SHA512848b3bc2208504a0ea0493b36f99f494030e10fb7f7e34e862bf84d855b2caac91f1b116af85d129816fe8096147f9a5e6fefc7c5b44df2c3b8d6f8429cde522
-
Filesize
225B
MD59cc9edf2797605e9c8730e22c5dc6d54
SHA1d25792450f8d314594276092bc04718e47687cdf
SHA25648179689517108bb6397f2d62239aa8ca4c534e8efa1aa264d2237ba21ab0831
SHA51228197c5ead3635cf6fdd8772a42396873a43e5f90d3035ad45f049aa78cc66500a74f78a208b814f5b794e3914b994981a4b33e9b711f656ee442318c81b4fbd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
225B
MD523072b554fe283a5f2e9150f3a14839c
SHA1511b71cd8c231d55c8d3706970841a096c5dea10
SHA256dd6b4bee0f9e630a27e6fa65cc727d5bc6ef7f0e7bff1187ec907a453b7b5728
SHA512a26b2ffddf1c7dd41796c89b5bcbf0a4ad3a87879f17de223beeed2c83968ae70040b5582cd10659496957222046040dbb649c8da7aee6289ec95c850f6868df
-
Filesize
225B
MD5aeecc52ec23c3a6ecf421f54f369cf78
SHA1eadb92798736925cd62b436c283a407dd8d35088
SHA2567d6fca930fb646037d3dbb66e924d8b8c7b62f8eaf9a09ecf03b11d3f5d4befe
SHA5126719b77d3e50ea1d9b3440db693cd7a7b6cdcf35af16752644e979b1c785ab2042fe1e7272de0607a4ab4bc8454b718d84f405f90c6d862b9daf558c06016d60
-
Filesize
225B
MD57e0cd9df46b00f4a68d6c357eb754025
SHA1a44c4646827fb3515b7637218aef9301199d4167
SHA2562ccf707f58471457dd312f1193eb0265a439594dce3c4e778e9c2607048f98ec
SHA512a9d663c6279bc5a5b7827d0fd0380f11f9c53d275229319e024a7c5d8b81a208cfdb32f77aa7ea6e0547779e8f39d7a66315db79e4cdda33297f754fc93c1713
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
225B
MD5f4a5607bb8a3555d115adf5bdef2368c
SHA11a923115a8abdf264d0eabe6eeb8a411b83fc62a
SHA25620f95bfb7ad8058008fec8ca6089188c09e9565aec0a0dc6a9202664b1660d53
SHA512adacd7cfe3e3c64faa3d7e7fe2e321f558b27953640f7822308862780dff3968aff1cdf3c5df87436ffca2de0a84eddb86c1383ab0675492b1f82c21e3ffdba9
-
Filesize
225B
MD59cbeef43898dfd3fb9e20c817af7e199
SHA1f31fdce9bceb01adaa759b55aa639fc0f1c26095
SHA25622dd973383be7668a067cbeda3070513363b1e0916331b674f25bcd08aa83ad1
SHA512827bc0d554bc873b326e3247d7e2c3a5e9fbcbedd0b03c423311e0fef933cd4a8c65f9ae2fecbbf6e06d36626c3d8f5e18fa3178113f9f205f262379146848d8
-
Filesize
225B
MD5d0e3ba7519336815aacc21452ba5a88a
SHA136253dab4fbd17425418c0e4d4fb4b2111dd1fa5
SHA2568ba49d462dddd09ce618e80f9eb6c26eb34bef81468b735adbc4ba9f0297993a
SHA512c799b0c53a62edc2a9df5ad23a3a5fb1f75d5f1c47a6d1530b44fa61a80e8917d14e7843cfe3b1db09e982874b7c7b5b33a3fde459cbc11e213d94c07f56e3bb
-
Filesize
225B
MD5e08479c1c226cf8a917f413d7df2fcb6
SHA153a16f37ff31e4e1141d6b901c78d6c3ed833111
SHA256c1aef163ef856bd2e2f002089bdff95d31b6c9bab71a95a3592e2e1e01901b5b
SHA512689c5be72deb09570dcaaed3336452436a1d52af3c17a232e80145a3087bff47d498915acc5120d66f5609f52357b77dd4a3121618e19d8e8bd280e028527cbe
-
Filesize
225B
MD5c67e92b45126c65c704e9ef9393aa2a0
SHA1ab4c571381cf01d508a7fbbefd0f63d743ca4c99
SHA2568c711e9da3fcade6f42c09a21e38b79df885bdae939786f4dd04e552b857fefb
SHA5128587f37dc967ce66c9238755fbb257a0cdc46c5da8438049d9dbcc00d46349b48f85810174e68ba3ae1825f46b363601b032a8c066c5a7c129d0b727454237d7
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD519de59ccfca80b0bc7671360681345f0
SHA1032bea253898dbb0722521c84dab232f672de488
SHA25654bc9cc2be59ce0e892eabd1dcb3b1355163dedcb1754af8617a2b8bd3a99ef4
SHA51272e5979005c598be05147e8bb0bab0a782734e32ca847ec7fcc74e6afb2030eea711568fef14f7e46fb08fa89e94bc432af1158def5a633fce10c7bf82af8758
-
Filesize
36B
MD56783c3ee07c7d151ceac57f1f9c8bed7
SHA117468f98f95bf504cc1f83c49e49a78526b3ea03
SHA2568ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322
SHA512c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8
-
Filesize
197B
MD58088241160261560a02c84025d107592
SHA1083121f7027557570994c9fc211df61730455bb5
SHA2562072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1
SHA51220d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394