Analysis

  • max time kernel
    148s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22/12/2024, 03:28 UTC

General

  • Target

    JaffaCakes118_2d466a27cce1f37d8a7cc2906da6c2e3ad52cfe56a66cc34606870c511c63a78.exe

  • Size

    1.3MB

  • MD5

    b88bc807eb6edc181281f6cb11ecda2b

  • SHA1

    bb238ddcded5ba8c72631f44e7e5726bf9fdb2a5

  • SHA256

    2d466a27cce1f37d8a7cc2906da6c2e3ad52cfe56a66cc34606870c511c63a78

  • SHA512

    58d3784ad541d2cf9afc4915bf6bde25599342581397f7203bf714c931017e4be023da3737b2df23f4795093c00ded5d4b15dea88565081b61e038c4e7b8343b

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 45 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 7 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 16 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Executes dropped EXE 12 IoCs
  • Loads dropped DLL 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 11 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 45 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 28 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2d466a27cce1f37d8a7cc2906da6c2e3ad52cfe56a66cc34606870c511c63a78.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2d466a27cce1f37d8a7cc2906da6c2e3ad52cfe56a66cc34606870c511c63a78.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2180
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2556
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\providercommon\1zu9dW.bat" "
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1868
        • C:\providercommon\DllCommonsvc.exe
          "C:\providercommon\DllCommonsvc.exe"
          4⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2772
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1772
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\lsass.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1468
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Defender\fr-FR\Idle.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1068
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\OSPPSVC.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1040
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Google\taskhost.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1316
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\System.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1108
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Media Player\fr-FR\taskhost.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:900
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\explorer.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2340
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\services.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2072
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\smss.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2600
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\winlogon.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1828
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\explorer.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1732
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Photo Viewer\ja-JP\WmiPrvSE.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1164
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Photo Viewer\DllCommonsvc.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1704
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\cmd.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1616
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Cartridges\smss.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1628
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\sBpp6JW2LH.bat"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2684
            • C:\Windows\system32\w32tm.exe
              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
              6⤵
                PID:2652
              • C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\System.exe
                "C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\System.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1932
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\D5faDLbbQ0.bat"
                  7⤵
                    PID:2244
                    • C:\Windows\system32\w32tm.exe
                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                      8⤵
                        PID:2564
                      • C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\System.exe
                        "C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\System.exe"
                        8⤵
                        • Executes dropped EXE
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1596
                        • C:\Windows\System32\cmd.exe
                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\LkcfmFI5TJ.bat"
                          9⤵
                            PID:808
                            • C:\Windows\system32\w32tm.exe
                              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                              10⤵
                                PID:536
                              • C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\System.exe
                                "C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\System.exe"
                                10⤵
                                • Executes dropped EXE
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2268
                                • C:\Windows\System32\cmd.exe
                                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\SK7IuFDp7o.bat"
                                  11⤵
                                    PID:1000
                                    • C:\Windows\system32\w32tm.exe
                                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                      12⤵
                                        PID:2800
                                      • C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\System.exe
                                        "C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\System.exe"
                                        12⤵
                                        • Executes dropped EXE
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:276
                                        • C:\Windows\System32\cmd.exe
                                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\X5pWA5YIY7.bat"
                                          13⤵
                                            PID:2808
                                            • C:\Windows\system32\w32tm.exe
                                              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                              14⤵
                                                PID:2480
                                              • C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\System.exe
                                                "C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\System.exe"
                                                14⤵
                                                • Executes dropped EXE
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:2428
                                                • C:\Windows\System32\cmd.exe
                                                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\IrNnSCw4rJ.bat"
                                                  15⤵
                                                    PID:1628
                                                    • C:\Windows\system32\w32tm.exe
                                                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                      16⤵
                                                        PID:352
                                                      • C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\System.exe
                                                        "C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\System.exe"
                                                        16⤵
                                                        • Executes dropped EXE
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:2452
                                                        • C:\Windows\System32\cmd.exe
                                                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\L9j9zErPDE.bat"
                                                          17⤵
                                                            PID:2832
                                                            • C:\Windows\system32\w32tm.exe
                                                              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                              18⤵
                                                                PID:2204
                                                              • C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\System.exe
                                                                "C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\System.exe"
                                                                18⤵
                                                                • Executes dropped EXE
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:2772
                                                                • C:\Windows\System32\cmd.exe
                                                                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\NfeiSKMyn5.bat"
                                                                  19⤵
                                                                    PID:1888
                                                                    • C:\Windows\system32\w32tm.exe
                                                                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                      20⤵
                                                                        PID:2780
                                                                      • C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\System.exe
                                                                        "C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\System.exe"
                                                                        20⤵
                                                                        • Executes dropped EXE
                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        PID:2860
                                                                        • C:\Windows\System32\cmd.exe
                                                                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\B7rL9EqqPR.bat"
                                                                          21⤵
                                                                            PID:2192
                                                                            • C:\Windows\system32\w32tm.exe
                                                                              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                              22⤵
                                                                                PID:1624
                                                                              • C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\System.exe
                                                                                "C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\System.exe"
                                                                                22⤵
                                                                                • Executes dropped EXE
                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                PID:2116
                                                                                • C:\Windows\System32\cmd.exe
                                                                                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\XC59y11ueh.bat"
                                                                                  23⤵
                                                                                    PID:1548
                                                                                    • C:\Windows\system32\w32tm.exe
                                                                                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                      24⤵
                                                                                        PID:1568
                                                                                      • C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\System.exe
                                                                                        "C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\System.exe"
                                                                                        24⤵
                                                                                        • Executes dropped EXE
                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                        PID:1668
                                                                                        • C:\Windows\System32\cmd.exe
                                                                                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\V61H6ynXXY.bat"
                                                                                          25⤵
                                                                                            PID:2092
                                                                                            • C:\Windows\system32\w32tm.exe
                                                                                              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                              26⤵
                                                                                                PID:328
                                                                                              • C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\System.exe
                                                                                                "C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\System.exe"
                                                                                                26⤵
                                                                                                • Executes dropped EXE
                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                PID:2420
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 13 /tr "'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\lsass.exe'" /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:2988
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\lsass.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:2660
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 7 /tr "'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\lsass.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:2768
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Defender\fr-FR\Idle.exe'" /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:2940
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Defender\fr-FR\Idle.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:2652
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows Defender\fr-FR\Idle.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:2456
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 9 /tr "'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\OSPPSVC.exe'" /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:2312
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\OSPPSVC.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:2676
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 6 /tr "'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\OSPPSVC.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:328
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Google\taskhost.exe'" /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:864
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Google\taskhost.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:2860
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Google\taskhost.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:2968
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 14 /tr "'C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\System.exe'" /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:580
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\System.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:1644
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 12 /tr "'C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\System.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:2864
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Windows Media Player\fr-FR\taskhost.exe'" /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:928
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Media Player\fr-FR\taskhost.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:536
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Windows Media Player\fr-FR\taskhost.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:2848
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "explorere" /sc MINUTE /mo 12 /tr "'C:\Users\Admin\explorer.exe'" /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:2380
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Users\Admin\explorer.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:2972
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "explorere" /sc MINUTE /mo 6 /tr "'C:\Users\Admin\explorer.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:1700
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "servicess" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\services.exe'" /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:2060
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\services.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:3004
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "servicess" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\services.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:3056
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "smsss" /sc MINUTE /mo 14 /tr "'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\smss.exe'" /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:2384
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\smss.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:2020
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "smsss" /sc MINUTE /mo 5 /tr "'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\smss.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:2532
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 8 /tr "'C:\providercommon\winlogon.exe'" /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:1976
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\providercommon\winlogon.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:3036
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 8 /tr "'C:\providercommon\winlogon.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:2192
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "explorere" /sc MINUTE /mo 9 /tr "'C:\providercommon\explorer.exe'" /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:780
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\providercommon\explorer.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:1560
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "explorere" /sc MINUTE /mo 6 /tr "'C:\providercommon\explorer.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:2004
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows Photo Viewer\ja-JP\WmiPrvSE.exe'" /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:2508
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Photo Viewer\ja-JP\WmiPrvSE.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:1544
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows Photo Viewer\ja-JP\WmiPrvSE.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:2816
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "DllCommonsvcD" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows Photo Viewer\DllCommonsvc.exe'" /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:776
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "DllCommonsvc" /sc ONLOGON /tr "'C:\Program Files\Windows Photo Viewer\DllCommonsvc.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:1784
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "DllCommonsvcD" /sc MINUTE /mo 12 /tr "'C:\Program Files\Windows Photo Viewer\DllCommonsvc.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:1672
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "cmdc" /sc MINUTE /mo 7 /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\cmd.exe'" /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:640
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\cmd.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:1756
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "cmdc" /sc MINUTE /mo 9 /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\cmd.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:2096
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "smsss" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Cartridges\smss.exe'" /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:568
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Cartridges\smss.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:2564
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "smsss" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Cartridges\smss.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:708

                                            Network

                                            • flag-us
                                              DNS
                                              raw.githubusercontent.com
                                              System.exe
                                              Remote address:
                                              8.8.8.8:53
                                              Request
                                              raw.githubusercontent.com
                                              IN A
                                              Response
                                              raw.githubusercontent.com
                                              IN A
                                              185.199.110.133
                                              raw.githubusercontent.com
                                              IN A
                                              185.199.108.133
                                              raw.githubusercontent.com
                                              IN A
                                              185.199.111.133
                                              raw.githubusercontent.com
                                              IN A
                                              185.199.109.133
                                            • 185.199.110.133:443
                                              raw.githubusercontent.com
                                              tls
                                              System.exe
                                              793 B
                                              4.2kB
                                              10
                                              11
                                            • 185.199.110.133:443
                                              raw.githubusercontent.com
                                              tls
                                              System.exe
                                              793 B
                                              4.2kB
                                              10
                                              11
                                            • 185.199.110.133:443
                                              raw.githubusercontent.com
                                              tls
                                              System.exe
                                              741 B
                                              4.1kB
                                              9
                                              10
                                            • 185.199.110.133:443
                                              raw.githubusercontent.com
                                              tls
                                              System.exe
                                              741 B
                                              4.1kB
                                              9
                                              10
                                            • 185.199.110.133:443
                                              raw.githubusercontent.com
                                              tls
                                              System.exe
                                              747 B
                                              4.2kB
                                              9
                                              11
                                            • 185.199.110.133:443
                                              raw.githubusercontent.com
                                              tls
                                              System.exe
                                              747 B
                                              4.2kB
                                              9
                                              11
                                            • 185.199.110.133:443
                                              raw.githubusercontent.com
                                              tls
                                              System.exe
                                              741 B
                                              4.1kB
                                              9
                                              10
                                            • 185.199.110.133:443
                                              raw.githubusercontent.com
                                              tls
                                              System.exe
                                              793 B
                                              4.2kB
                                              10
                                              11
                                            • 185.199.110.133:443
                                              raw.githubusercontent.com
                                              tls
                                              System.exe
                                              741 B
                                              4.1kB
                                              9
                                              10
                                            • 185.199.110.133:443
                                              raw.githubusercontent.com
                                              tls
                                              System.exe
                                              793 B
                                              4.2kB
                                              10
                                              11
                                            • 8.8.8.8:53
                                              raw.githubusercontent.com
                                              dns
                                              System.exe
                                              71 B
                                              135 B
                                              1
                                              1

                                              DNS Request

                                              raw.githubusercontent.com

                                              DNS Response

                                              185.199.110.133
                                              185.199.108.133
                                              185.199.111.133
                                              185.199.109.133

                                            MITRE ATT&CK Enterprise v15

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              342B

                                              MD5

                                              e084ab975f8bfa82325ab978f0780f22

                                              SHA1

                                              3cd60eb69eb753812682af2c4ef2ff5068f81bcb

                                              SHA256

                                              69aa8e0bb9f40a5b9f9bad6b0fe6c95ceff3c86b678a893004f27a5af82479bb

                                              SHA512

                                              df33a4235564918a86db6b2616fabf89558cec049bdb741339cc65c7b2893932292d570f9745eb161a2044b22638b00f5e798fa868023542207a5d47b81ee7be

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              342B

                                              MD5

                                              6410d19c17d06df4508fb7309ffb103b

                                              SHA1

                                              8edf8b819d8535477f8353fbbfec0d3b6e65cc1e

                                              SHA256

                                              4a1cc11da904a9a410f532508b94433101a3cb85ff8424a3b62aa2c0cea70f2e

                                              SHA512

                                              399d78b1b65d8817281e6a8c153f4089aaf79d2e26dcf9b1d09876a8cfb7cb7ad9208f98ae189cb76d36e00b422df8eec5ada96d186d4f746a4acfcd1a67bb6a

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              342B

                                              MD5

                                              ba7fc29de6ee540fae6edd3148e78fb4

                                              SHA1

                                              1b90b1f7155a6dfe7948980a4d5ba09b6baf8e21

                                              SHA256

                                              93f292a32bd3015e713ded2eccbd518aaa1a931ad43dc4745970e14570b5f95a

                                              SHA512

                                              e795ba01302ab66e4d13b69365607f02124ccbb953ca7e4bb60c070c03d0a6d102f5673ad7d169c659a3770635e1e43a25ae94656f2603de0cb5104ca52a72a4

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              342B

                                              MD5

                                              f0945ab01d242738b728bf474a45d10b

                                              SHA1

                                              cfd3e87ba74d0ccc54803c3bb354eb81854e38e9

                                              SHA256

                                              c1c73b86bbad11f4df553e5c95fc607c5ed466be78d8f58754aecf89b89e342b

                                              SHA512

                                              f31e5320f6f8a99e024e3fe909645850dd3d6b7af7f0ec103343c2367e008bad53453e65ab913bfce3cc5b36a4427a5e25c07e0b01a12e6073dd93294b3f9d1c

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              342B

                                              MD5

                                              ab71b035ecdc86112fc2dca35d1fdbe7

                                              SHA1

                                              f409e5b6bbdbcbbde14f9e586f9f42f840948119

                                              SHA256

                                              d222f9008e0c102cee03dc9635b6567dc7eaaf0c7b928116488bfcda79eb09ef

                                              SHA512

                                              2da016e7ae42bfb83992ba725d95ee9ea6fcfb691feb1c0d4d9ff0e8a8127673b2e666d1909c84cc4a191b8df3f1029e0dcc96d4c1de97be5325249b6e77c962

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              342B

                                              MD5

                                              ba17122799a452299d1f074407366ae6

                                              SHA1

                                              04d8019b3dbbd6fa09dd7dd1cd4a629d0de37cce

                                              SHA256

                                              55cb56a376c07e76f9e75a2fce8a26b242e5e206e4b2da0ee3ce45368d30c24f

                                              SHA512

                                              443f2ff87e3461616886303bf73fabc7b60441295959f5689fb87950a70c1f954b6d8d2e1560b3c6ab7a6b751a76cd454a3bc3b0977e1b7d912c3e4668fb2a43

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              342B

                                              MD5

                                              b08d649b9d3626bf3b2ddbabf37afe23

                                              SHA1

                                              ce7644affe7a5003290569623f207c31b93fcd76

                                              SHA256

                                              63e543a019c5cbacfbc980e3c469205c91b5f93cb86ae8b82086e5e7bbd13a58

                                              SHA512

                                              6bd243d247ece1b8655257a5652d1bef97b471f898b791d3cbc5508aa506e8b9908d6f43dca672111c098521a8615a6b927cd1b393b9dcd6e5f8cc0fd202d6e7

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              342B

                                              MD5

                                              f3cae965ef235d48d4c3384c14146432

                                              SHA1

                                              3042c0296ed0c1e029104ae1889bf7229bd62c40

                                              SHA256

                                              afb27664cca0c96efc0f0346360bec18ec91d65764e1b93c625d9278f4f55bb7

                                              SHA512

                                              5bb1c344db8a67ff7708b8f5c69d454581aa98a36a49ae43ac892fcc5b88050ea062f6a859bde9696a8fc8ad6206dd43ca6777de9652691b95b28eaae8773407

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              342B

                                              MD5

                                              fbc8e0e4b91ac194a172cb71f48e09a9

                                              SHA1

                                              a8de24ab6dbe28392ee72f15a7f33132af35c022

                                              SHA256

                                              f2c525be316c275794f7af8e510a987bd908e002682590912e741dd53a05763a

                                              SHA512

                                              44c5661ee0c710cfd3906f36c2eff6176bc98164d569ab7caf038b5d9a2755f128b541cf64d083dc0502f97f7a30a320bacfcf19b6438731e83ba3f1e190c3de

                                            • C:\Users\Admin\AppData\Local\Temp\B7rL9EqqPR.bat

                                              Filesize

                                              238B

                                              MD5

                                              7d6943f486406e6993324dc221d48d87

                                              SHA1

                                              7f1f2e3622a9fb7427fe481460ea83732e43a9a6

                                              SHA256

                                              a8b93dd0090ccfd0c4f5d70c29fa372c1d69181a3ed24f239ad47e5615ca8203

                                              SHA512

                                              c1305a59aa84f01efe110bbe8c3f58443b87e430baef47273bd92010af5b9711375f1cb9217978988dc2e11cc44eb4131f191e37d51e2dcd5a80fda450c9c2f3

                                            • C:\Users\Admin\AppData\Local\Temp\Cab57F.tmp

                                              Filesize

                                              70KB

                                              MD5

                                              49aebf8cbd62d92ac215b2923fb1b9f5

                                              SHA1

                                              1723be06719828dda65ad804298d0431f6aff976

                                              SHA256

                                              b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                              SHA512

                                              bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                                            • C:\Users\Admin\AppData\Local\Temp\D5faDLbbQ0.bat

                                              Filesize

                                              238B

                                              MD5

                                              18308ba72fd90030bdf866755ad911d3

                                              SHA1

                                              75ed46e87448b876e452be8f88a8f5c683afc1cc

                                              SHA256

                                              a0a4398745c897d815c5aa5f94f780892f7af14c60a1d87316b388a6d5cb2727

                                              SHA512

                                              a49ec760061982760f8833937dcc7eaa790fa83d63ea84127104cc8fdcf67285ce2f82157cfa296534e2c636840405df6d481fec3cdb7fd64f5abc2ea6146d1c

                                            • C:\Users\Admin\AppData\Local\Temp\IrNnSCw4rJ.bat

                                              Filesize

                                              238B

                                              MD5

                                              10446e69154a807b0f162daa4b75c97b

                                              SHA1

                                              d0b05d8347a0300756d2ff7ef1ccefb068368366

                                              SHA256

                                              a4234df396a0deb0ccc6285d07b4c4d19f52e1785af5c78886aab205421900c8

                                              SHA512

                                              ce4605377b20da5d6df5119e646e2f3510bddc17284e1d9714bcc9066410f9cee216fa18ecda2968486fde1035c4d177a4a8877e5db1273606ebf0295ec5b238

                                            • C:\Users\Admin\AppData\Local\Temp\L9j9zErPDE.bat

                                              Filesize

                                              238B

                                              MD5

                                              f31b29721aa20f2d1f4c958e7ec94d87

                                              SHA1

                                              635800ec290ff463e820ba625135e1fd8c6d3a00

                                              SHA256

                                              f0f4340fb609bc5428d7156251beb21413ae57fbe5ba17be0769146a594d07f6

                                              SHA512

                                              124dfb890660a5d542e8acdafccab5e2618872e0673e04d29054cc44751f0bf0d8c358fd80e6161414a5dcf7bcacb4f27c2cec9b0cf1d7f8b2fc655b7a010c7e

                                            • C:\Users\Admin\AppData\Local\Temp\LkcfmFI5TJ.bat

                                              Filesize

                                              238B

                                              MD5

                                              0bfe1f38c91b0514c0d510b9c6f5183e

                                              SHA1

                                              f94049fc2c01cb74397361e7c1acc0b93ab24770

                                              SHA256

                                              15f0bce1428b1e1e2addcd48ce34c5a3e85841bf76bc4b53e0d03cfd685b7d81

                                              SHA512

                                              7d8c81147099e8d42179d654dc9004d08e27065897a3b4ce86a2939014ceef307cda36d0a718b47217e3dce5d0e862625277e3451b5e7ba2799580fac8ca01f8

                                            • C:\Users\Admin\AppData\Local\Temp\NfeiSKMyn5.bat

                                              Filesize

                                              238B

                                              MD5

                                              1ca12e44b367a651e5b614637a20ff77

                                              SHA1

                                              eadb0a1978aeefdabe35fadd28e3244ed959bc23

                                              SHA256

                                              a8b50d4d22015c783bbc42f39b0010267ade533d5ad5ceb72dad46f5f1289f0b

                                              SHA512

                                              ea0eae18be9eeb8f242942db7fb314b22a9f4b4dc7defedfbfdad7b54b069ac67587d39dab488b08a9e5dd0408d521bd7a0ca4a27ae41bd37bf29b1ffe7670b1

                                            • C:\Users\Admin\AppData\Local\Temp\SK7IuFDp7o.bat

                                              Filesize

                                              238B

                                              MD5

                                              c81108a47009e5b0a905122a31fa30ac

                                              SHA1

                                              77c40f713ae24d4005345e67dacc82c0a2526d2e

                                              SHA256

                                              ebbb4f84b2db717efd6d539d587f5ce92cdac4e148072f46d0cc56c95bb7b452

                                              SHA512

                                              35bf06363cf8f7835da481cf3dce4dece63a82f8a4fd079f3804015dcead937f21657d521f9ec1eddc862523aedb1fab9651d78f55425fbf157cf5c595195c85

                                            • C:\Users\Admin\AppData\Local\Temp\Tar591.tmp

                                              Filesize

                                              181KB

                                              MD5

                                              4ea6026cf93ec6338144661bf1202cd1

                                              SHA1

                                              a1dec9044f750ad887935a01430bf49322fbdcb7

                                              SHA256

                                              8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                              SHA512

                                              6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                                            • C:\Users\Admin\AppData\Local\Temp\V61H6ynXXY.bat

                                              Filesize

                                              238B

                                              MD5

                                              8be356dda945748014d123563407d8a7

                                              SHA1

                                              c67ddf577869a5cfdb9087aefd34eed18aefc6d8

                                              SHA256

                                              cc9f39634c68ecd1f3957764162cd9dec565de557b29a2c71aef083903229983

                                              SHA512

                                              3237c6a3cd2fbb58581749958c44d30115ff2308893de24ee6967b748cac07b7e6b900aaa716cb5a5228abf8919ca8fe5761a2557f0c5b844f78e72f1adf141e

                                            • C:\Users\Admin\AppData\Local\Temp\X5pWA5YIY7.bat

                                              Filesize

                                              238B

                                              MD5

                                              9909ac994118e98a0a2debbc938acb1f

                                              SHA1

                                              f0ddf93ff0fd183d4189fe49c7a1ad44a8b45509

                                              SHA256

                                              94a6136c881613aa13d5c4ce3727f01f64437882694b713861ca69ba33211695

                                              SHA512

                                              b7b7dcd408d5e780bb7875f767d08f072dfd2b2eead8b516f02fb0297a5de1942a269b90090ffe3de0556538fb2f61999f5df041f974c4ce73b9f6d940f974a2

                                            • C:\Users\Admin\AppData\Local\Temp\XC59y11ueh.bat

                                              Filesize

                                              238B

                                              MD5

                                              62388879dfb298bc3d7d66880b919ee4

                                              SHA1

                                              638a7ac43469228b242fa7f50a53d67befdcf170

                                              SHA256

                                              5846b956d1424ece5534a94635699a790a2720871d310cfc65a1bedac69dba62

                                              SHA512

                                              83e2b5b426d90d52c16dd6d16b3961790ea25787eaf9e216e803cd77ccf9a0e843046de8aa2a16396f18b6391d309ed5510e67f46ffc85de2b526f4bf09aba89

                                            • C:\Users\Admin\AppData\Local\Temp\sBpp6JW2LH.bat

                                              Filesize

                                              238B

                                              MD5

                                              515d11d0bf942464677518f1947268bc

                                              SHA1

                                              8ab5708099fea6051ce1821bc30ef4a25c3023f4

                                              SHA256

                                              9f3cbf6e8c9ccd20c68a34341f2cf0b720549cd33532ef576a99a250b32ad2be

                                              SHA512

                                              c31a27b3dac322f81261bce56c7c947be3c5f6671fc4431237db3b515b110187cadc69a45e85c1dc266f452eae2085ebbdc7b24266518f4eedfa936dcb09ad04

                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\K9S4E03LCBMZVQIAMK3C.temp

                                              Filesize

                                              7KB

                                              MD5

                                              de5e691ee059ee29c74cfd946317720a

                                              SHA1

                                              36aee940adde1d212aea3ad2b4bb0e89790bb4be

                                              SHA256

                                              b6296666700d76eaae14b6c87828823befdf93a2ffe4c62f8ff9cd8eab9b3c8d

                                              SHA512

                                              38cab14ced025b1132b72bf641baabdb3ecb3ec904d77ee63ddfc7479dc7a7f652f4960522b051e551a530fc1fb9e466751f1db868737a2c1f606322b9bd4115

                                            • C:\providercommon\1zu9dW.bat

                                              Filesize

                                              36B

                                              MD5

                                              6783c3ee07c7d151ceac57f1f9c8bed7

                                              SHA1

                                              17468f98f95bf504cc1f83c49e49a78526b3ea03

                                              SHA256

                                              8ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322

                                              SHA512

                                              c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8

                                            • C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe

                                              Filesize

                                              197B

                                              MD5

                                              8088241160261560a02c84025d107592

                                              SHA1

                                              083121f7027557570994c9fc211df61730455bb5

                                              SHA256

                                              2072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1

                                              SHA512

                                              20d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478

                                            • \providercommon\DllCommonsvc.exe

                                              Filesize

                                              1.0MB

                                              MD5

                                              bd31e94b4143c4ce49c17d3af46bcad0

                                              SHA1

                                              f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                              SHA256

                                              b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                              SHA512

                                              f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                            • memory/1108-62-0x0000000002050000-0x0000000002058000-memory.dmp

                                              Filesize

                                              32KB

                                            • memory/1108-61-0x000000001B650000-0x000000001B932000-memory.dmp

                                              Filesize

                                              2.9MB

                                            • memory/1596-195-0x0000000001210000-0x0000000001320000-memory.dmp

                                              Filesize

                                              1.1MB

                                            • memory/1932-136-0x0000000001120000-0x0000000001230000-memory.dmp

                                              Filesize

                                              1.1MB

                                            • memory/2420-729-0x0000000000050000-0x0000000000160000-memory.dmp

                                              Filesize

                                              1.1MB

                                            • memory/2420-730-0x00000000003D0000-0x00000000003E2000-memory.dmp

                                              Filesize

                                              72KB

                                            • memory/2428-373-0x0000000000110000-0x0000000000220000-memory.dmp

                                              Filesize

                                              1.1MB

                                            • memory/2452-433-0x0000000001050000-0x0000000001160000-memory.dmp

                                              Filesize

                                              1.1MB

                                            • memory/2772-17-0x0000000000600000-0x000000000060C000-memory.dmp

                                              Filesize

                                              48KB

                                            • memory/2772-16-0x00000000003C0000-0x00000000003CC000-memory.dmp

                                              Filesize

                                              48KB

                                            • memory/2772-15-0x00000000005F0000-0x00000000005FC000-memory.dmp

                                              Filesize

                                              48KB

                                            • memory/2772-14-0x00000000003B0000-0x00000000003C2000-memory.dmp

                                              Filesize

                                              72KB

                                            • memory/2772-13-0x0000000000D70000-0x0000000000E80000-memory.dmp

                                              Filesize

                                              1.1MB

                                            We care about your privacy.

                                            This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.